Storage and Data Processing Technology in the Era of Information Explosion: from Traditional to Edge Computing

Authors

  • Longhan Lin

DOI:

https://doi.org/10.54097/5v79vr69

Keywords:

Pyramid code, Internet of Things, Reed-Solomon code, IoT, Erasure Code, Edge computing.

Abstract

Data-intensive IoT gradually occupying the market, and efficient and reliable storage algorithms of signals and information are becoming increasingly important. The old-era storage algorithms no longer meet the needs of digital and intelligent cloud storage due to large space usage and low operating efficiency. One of the important topics in IoT cloud computing is to find a turning point from traditional storage methods to develop data-intensive and efficient storage methods. This research analyzed the principles, features, advantages, and disadvantages of many classic storage algorithms, including RS code, EVENODD code, Pyramid code, etc. It is to find storage algorithms suitable with higher storage efficiency in the IoT. Finally, Pyramid code is leading in data recovery efficiency and scalability and is suitable for higher and faster storage needs of the IoT. However, the shortcoming of Pyramid code also has challenges in the large number of failures that occur, due to its slower recovery speed.

Downloads

Download data is not yet available.

References

Peng, Ying, Yan Zhu, Jinling Luo. A network storage framework based on SAN. 2012 7th International Conference on Computer Science & Education (ICCSE), 2012, 7th: 818-821. 2012.

Toka, Laszlo, Matteo Dell'Amico, Pietro Michiardi. Data transfer scheduling for p2p storage. 2011 IEEE International Conference on Peer-to-Peer Computing, 2011: 132-141. 2011.

Wu, Jiyi, Lingdi Ping, Xiaoping Ge, Ya Wang, Jianqing Fu. Cloud storage as the infrastructure of cloud computing. 2010 International conference on intelligent computing and cognitive informatics, 2010: 380-381. 2010.

Chervenak, Ann, Vivekenand Vellanki, Zachary Kurmas. Protecting file systems: A survey of backup techniques. Joint NASA and IEEE Mass Storage Conference, Vol. 99. 1998.

Rizzo, Luigi. Effective erasure codes for reliable computer communication protocols. ACM SIGCOMM computer communication review, 1997, 27(2): 24-36.

Reed, Irving S., Gustave Solomon, polynomial codes over certain finite fields. Journal of the society for industrial and applied Mathematics, 1960,8(2): 300-304

Lone, Faisal Rasheed, Arjun Puri, Sudesh Kumar. Performance comparison of Reed Solomon code and BCH code over Rayleigh fading channel. arXiv preprint arXiv:1307.6930, 2013.

Sklar, Bernard. "Reed-solomon codes." Downloaded from URL http://www. informit. Com/content/images/art. sub.--sklar7. sub.--reed-solomo-n/elementLinks/art. sub.--sklar7. sub.--reed-solomon. Pdf (2001): 1-33.

Bianchi, Valentina, Marco Bassoli, Ilaria De Munari. Comparison of FPGA and microcontroller implementations of an innovative method for error magnitude evaluation in reed–solomon codes. Electronics, 2020, 9(1): 89.

Sun, Zhonghua, Cunsheng Ding. The extended codes of a family of reversible MDS cyclic codes. arXiv preprint arXiv:2307.04076, 2023.

Wang, Yihan. EVENODD Code Implementation and Generalizations. 2022 International Symposium on Advances in Informatics, Electronics and Education (ISAIEE), 2022: 64-68. 2022.

Wang, Zihao, Zheng Xie, Dan Tang. An Erasure Code with Low Recovery-overhead Based on a Particular Three-hierarchical Redundancy Structure. International Journal of Network Security, 2022, 24(5):965-974.

Barbi, Roberta. Pyramid Codes to the rescue: A preliminary evaluation for cloud storage systems. Proceedings of the Doctoral Symposium of the 17th International Middleware Conference, 2016: 1-2.

Huang, Cheng, Minghua Chen, Jin Li. Pyramid codes: Flexible schemes to trade space for access efficiency in reliable data storage systems. ACM Transactions on Storage (TOS), 2013, 9(1): 1-28.

Huang, Cheng, Huseyin Simitci, Yikang Xu, Aaron Ogus, Brad Calder, Parikshit Gopalan, Jin Li, Sergey Yekhanin. Erasure Coding in Windows Azure Storage, 2012 USENIX Annual Technical Conference (USENIX ATC 12), 2012: 15-26.

Tawalbeh, Lo’ai, Fadi Muheidat, Mais Tawalbeh, Muhannad Quwaider. IoT Privacy and security: Challenges and solutions. Applied Sciences, 2020,10(12): 4102.

Grammatikis, Panagiotis I. Radoglou, Panagiotis G. Sarigiannidis, Ioannis D. Moscholios. Securing the Internet of Things: challenges, threats and solutions, Internet of Things, 2018, 5: 41-70.

Lee, Changmin, Luca Zappaterra, Kwanghee Choi, Hyeong-Ah Choi. Securing smart home: Technologies, security challenges, and security requirements, 2014 IEEE Conference on Communications and Network Security, 2014, 67-72.

Mahbub, Mobasshir, M. Mofazzal Hossain, Md Shamrat Apu Gazi. IoT-Cognizant cloud-assisted energy efficient embedded system for indoor intelligent lighting, air quality monitoring, and ventilation. Internet of things, 2020, 11: 100266.

Ma, Benedict Jun, Yi Zhang, Shuai Liu, Yishuo Jiang, Yifan He, Ke Yan. Operational strategies for IoT-enabled Brick-and-Mortar retailers in a competitive market, Computers & Industrial Engineering, 2022, 173: 108665.

U.S. Energy Information Administration. (2021). Annual Energy Outlook 2021-With Porjections to 2050. Accessed: Jun. 30, 2021. [Online]. Available: https://www.eia.gov/outlooks/aeo/

Saleem, M. Usman, M. Rehan Usman, M. Arslan Usman, Christos Politis. Design, deployment and performance evaluation of an IoT based smart energy management system for demand side management in smart grid. IEEE Access 10, 2022: 15261-15278.

Nižetić, Sandro, Petar Šolić, Diego Lopez-de-Ipiña Gonzalez-De, Luigi Patrono. Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future. Journal of cleaner production, 2020, 274: 122877.

Bisio, Igor, Chiara Garibotto, Mehrnaz Hamedani, Fabio Lavagetto, Valeria Prada, Andrea Sciarrone. Towards IoT-based eHealth services: A smart prototype system for home rehabilitation. 2019 IEEE Global Communications Conference (GLOBECOM), IEEE, 2019.

Gulati, Kamal, Raja Sarath Kumar Boddu, Dhiraj Kapila, Sunil L. Bangare, Neeraj Chandnani, G. Saravanan. A review paper on wireless sensor network techniques in Internet of Things (IoT). Materials Today: Proceedings, 2022, 51: 161-165.

Zambrano, Benjamin, Esteban Garzón, Sebastiano Strangio, Felice Crupi, Marco Lanuzza. A 0.05 mm², 350 mV, 14 nW Fully-Integrated Temperature Sensor in 180-nm CMOS. IEEE Transactions on Circuits and Systems II: Express Briefs, 2021, 69(3): 749-753.

Ahmad, M. D., SZ Mohammad Noor, NF Abdul Rahman, Faranadia Abdul Haris. Lux meter integrated with internet of things (IoT) and data storage (LMX20). 2021 IEEE International Conference in Power Engineering Application (ICPEA). 2021.

Chang, Qijie, Daofu Wu, Yanyi Huang, Chengyao Liang, Libo Liu, Huanbin Liu, Yan Liu, Jing Qiu, Xiaosheng Tang, Genquan Han. Ultrahigh Response Humidity Sensor Based on Lead-Free Cs 2 SnCl 6 Perovskite Films. IEEE Electron Device Letters, 2022, 43(5): 805-808.

Nasar, Mohammad, and Mohammad Abu Kausar. Suitability of influxdb database for iot applications. International Journal of Innovative Technology and Exploring Engineering, 2019, 8(10): 1850-1857.

Wang, Jin, Jiahao Chen, Neal Xiong, Osama Alfarraj, Amr Tolba, Yongjun Ren. S-BDS: An effective blockchain-based data storage scheme in zero-trust IoT. ACM Transactions on Internet Technology, 2023, 23(3): 1-23.

Li, Junxia, Jinjin Cai, Fazlullah Khan, Ateeq Ur Rehman, Venki Balasubramaniam, Jiangfeng Sun, P. Venu. A secured framework for sdn-based edge computing in IOT-enabled healthcare system. IEEE Access, 2020, 8: 135479-135490.

Downloads

Published

26-03-2024

How to Cite

Lin, L. (2024). Storage and Data Processing Technology in the Era of Information Explosion: from Traditional to Edge Computing. Highlights in Science, Engineering and Technology, 87, 66-75. https://doi.org/10.54097/5v79vr69