Bimonthly    Since 1986
ISSN 1004-9037
Publication Details
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
 
   
      05 July 2023, Volume 38 Issue 3
    Article

    EFFECTIVE DATA REDUCTION TECHNIQUES FOR INTERNET OF THINGS (IOT)
    Nilima Dongre Jawade, Zeba Shaikh, Dr. Atul D. Raut, Dr. Mohammad Atique
    Journal of Data Acquisition and Processing, 2023, 38 (3): 3733-3746 . 

    Abstract

    The Internet of Things (IoT) has witnessed a rapid growth in the number of connected devices, leading to an exponential increase in data generated by these devices. This data explosion poses significant challenges in terms of storage, processing, and communication in IoT systems. To address these challenges, effective data reduction techniques have emerged as a promising solution. Data reduction techniques aim to reduce the volume, complexity, and redundancy of IoT data while preserving its key information and minimizing the impact on application quality. Data reduction techniques play a crucial role in managing the ever-growing volumes of data generated in various domains. Deduplication and compression are two popular approaches employed for data reduction. Deduplication eliminates redundant data by identifying and removing duplicate instances, while compression reduces data size by encoding it in a more compact form. It is mostly used in cloud to reduce the amount of storage space in the cloud. Among the data reduction techniques used are compression, data deletion, archiving and data deduplication. De-duplication supports the confidentiality of sensitive data. We propose a system based on client-side de-duplication technique which efficiently and effectively saves the storage space. The proposed system EDAA (Elimination, Dynamic Ownership, Authentication, Authorization) encrypts the data before uploading it to the cloud storage. EDAA supports de-duplication along with dynamic ownership to authorized user. We show that our proposed EDAA system sustain very little overhead as compared to normal operations.

    Keyword

    #


    PDF Download (click here)

SCImago Journal & Country Rank

ISSN 1004-9037

         

Home
Editorial Board
Author Guidelines
Subscription
Journal of Data Acquisition and Processing
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: info@sjcjycl.cn
 
  Copyright ©2015 JCST, All Rights Reserved