Your browser doesn't support javascript.
loading
Fog-assisted de-duplicated data exchange in distributed edge computing networks.
Said, Ghawar; Ghani, Anwar; Ullah, Ata; Alzahrani, Abdulrahman; Azeem, Muhammad; Ahmad, Rashid; Kim, Do-Hyeun.
Affiliation
  • Said G; Department of Computer Science, International Islamic University, Islamabad, 44000, Pakistan.
  • Ghani A; Department of Computing and Technology, Iqra University, H-9 Campus, Islamabad, 44000, Pakistan.
  • Ullah A; Department of Computer Science, International Islamic University, Islamabad, 44000, Pakistan. anwar.ghani@iiu.edu.pk.
  • Alzahrani A; Big Data Research Center, Jeju National University, Jeju-si, Jeju-do, 63243, South Korea. anwar.ghani@iiu.edu.pk.
  • Azeem M; Department of Computer Science, National University of Modern Languages, Islamabad, 44000, Pakistan.
  • Ahmad R; Department of Information Systems and Technology, University of Jeddah, 21959, Jeddah, Saudi Arabia.
  • Kim DH; Department of Computer Science, International Islamic University, Islamabad, 44000, Pakistan.
Sci Rep ; 14(1): 20595, 2024 Sep 04.
Article in En | MEDLINE | ID: mdl-39232132
ABSTRACT
The Internet of Things (IoT) generates substantial data through sensors for diverse applications, such as healthcare services. This article addresses the challenge of efficiently utilizing resources in resource-scarce IoT-enabled sensors to enhance data collection, transmission, and storage. Redundant data transmission from sensors covering overlapping areas incurs additional communication and storage costs. Existing schemes, namely Asymmetric Extremum (AE) and Rapid Asymmetric Maximum (RAM), employ fixed and variable-sized windows during chunking. However, these schemes face issues while selecting the index value to decide the variable window size, which may remain zero or very low, resulting in poor deduplication. This article resolves this issue in the proposed Controlled Cut-point Identification Algorithm (CCIA), designed to restrict the variable-sized window to a certain threshold. The index value for deciding the threshold will always be larger than the half size of the fixed window. It helps to find more duplicates, but the upper limit offset is also applied to avoid the unnecessarily large-sized window, which may cause extensive computation costs. The extensive simulations are performed by deploying Windows Communication Foundation services in the Azure cloud. The results demonstrate the superiority of CCIA in various metrics, including chunk number, average chunk size, minimum and maximum chunk number, variable chunking size, and probability of failure for cut point identification. In comparison to its competitors, RAM and AE, CCIA exhibits better performance across key parameters. Specifically, CCIA outperforms in total number of chunks (6.81%, 14.17%), average number of chunks (4.39%, 18.45%), and minimum chunk size (153%, 190%). These results highlight the effectiveness of CCIA in optimizing data transmission and storage within IoT systems, showcasing its potential for improved resource utilization and reduced operational costs.

Full text: 1 Collection: 01-internacional Database: MEDLINE Language: En Journal: Sci Rep Year: 2024 Document type: Article Affiliation country: Pakistan Country of publication: United kingdom

Full text: 1 Collection: 01-internacional Database: MEDLINE Language: En Journal: Sci Rep Year: 2024 Document type: Article Affiliation country: Pakistan Country of publication: United kingdom