Detection of duplicated data with minimum overhead and secure data transmission for sensor big data

被引:3
|
作者
Beulah, S. [1 ]
Dhanaseelan, F. Ramesh [2 ]
机构
[1] Noorul Islam Ctr Higher Educ, Dept Comp Applicat, Kanyakumari, Tamil Nadu, India
[2] St Xaviers Catholic Coll Engn, Dept Comp Applicat, Kanyakumari, Tamil Nadu, India
关键词
Secure transmission; De-duplication; Cluster formation; Pattern generation; Pattern matching; DEDUPLICATION;
D O I
10.1007/s10586-017-1079-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Big data refers to the data sets that are difficult to deal with traditional data processing applications because of its speed, size and variety of data. The big data were generated from activities, sensing devices, mobile devices, Internet, RFID readers etc. One of the key sources of big data is the data from the sensor. The significant amounts of the data from the sensor are either redundant or almost similar. It initiates the requirement of de-duplication of the sensor data. The data from the sensors need to be stored for further process or analysis which requires end-to-end security for the data. Amethod is proposed in this paper for detecting the similar data with light-weight process using pattern analysis and matching. The distributed encoding process is proposed here for imposing end-to-end security for the generated data with reduced communication overhead. The data received in the processing server are decoded, analyzed and matched with patterns for removing similar and duplicated data. The result shows that the proposed system secures data during transmission with light-weighted processes. The duplicated and similar data are detected efficiently through inline process before the data enter into the storage. Experimental results are given as proof of the above mentioned concept.
引用
收藏
页码:10467 / 10479
页数:13
相关论文
共 50 条
  • [1] Detection of duplicated data with minimum overhead and secure data transmission for sensor big data
    S. Beulah
    F. Ramesh Dhanaseelan
    [J]. Cluster Computing, 2019, 22 : 10467 - 10479
  • [2] A Secure Transmission Scheme for Textual Data with Least Overhead
    Bhattacharjee, Shiladitya
    Ab Rahim, Lukman Bin
    Aziz, Izzatdin B. A.
    [J]. 2014 TWENTIETH NATIONAL CONFERENCE ON COMMUNICATIONS (NCC), 2014,
  • [3] A Solution Supporting Secure Transmission of Big Data
    Ling, Haonan
    Gao, Yan
    Wang, Huibin
    Chen, Ming
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2023, 28 (05) : 838 - 848
  • [4] Fake Sensor Detection and Secure Data Transmission Based on Predictive Parser in WSNs
    D. Joseph Jeyakumar
    S. Lingeshwari
    [J]. Wireless Personal Communications, 2020, 110 : 531 - 544
  • [5] Fake Sensor Detection and Secure Data Transmission Based on Predictive Parser in WSNs
    Joseph Jeyakumar, D.
    Lingeshwari, S.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 110 (01) : 531 - 544
  • [6] Identity-based secure data aggregation in big data wireless sensor networks
    Maivizhi, Radhakrishnan
    Yogesh, Palanichamy
    [J]. INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 41 (01) : 16 - 28
  • [7] Reduction Scheme for Sensor-Data Transmission on a Big Data Streaming Platform
    Huang, Yi-Wei
    Cheng, Sheng-Tzong
    [J]. 2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 244 - 249
  • [8] Contextual Anomaly Detection in Big Sensor Data
    Hayes, Michael A.
    Capretz, Miriam A. M.
    [J]. 2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS), 2014, : 64 - 71
  • [9] Methods and Tools for Secure Sensor Data Transmission and Data Mining in Energy SCADA System
    Finogeev, Alexey
    Fionova, Ludmila
    Finogeev, Anton
    Nefedova, Irina
    Finogeev, Egor
    Thai Quang Vinh
    Kamaev, Valery
    [J]. CREATIVITY IN INTELLIGENT TECHNOLOGIES AND DATA SCIENCE, CIT&DS 2015, 2015, 535 : 474 - 487
  • [10] Secure Computation for Big Data
    Malkin, Tal
    [J]. THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 355 - 355