Automated Attendance System using RFID and IoT
Volume-7 | Issue-3

IoT Enabled Smart Bin for Waste Management with Incentivized Rewards
Volume-6 | Issue-1

Smart and Explainable Credit Card Fraud Detection Using XGBoost and SHAP
Volume-7 | Issue-2

An IoT-based Smart Security Locker System with OTP Verification
Volume-5 | Issue-3

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

DDoS Detection using Machine Learning Techniques
Volume-4 | Issue-1

Design of Deep Learning Algorithm for IoT Application by Image based Recognition
Volume-3 | Issue-3

Cloud-based Library Management and Book Tracking through the Internet of Things
Volume-4 | Issue-4

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Advanced Traffic Light Controller using FPGA and ARDUINO
Volume-6 | Issue-2

Suspicious Human Activity Detection System
Volume-2 | Issue-4

ROBOT ASSISTED SENSING, CONTROL AND MANUFACTURE IN AUTOMOBILE INDUSTRY
Volume-1 | Issue-3

EFFICIENT RESOURCE ALLOCATION AND QOS ENHANCEMENTS OF IOT WITH FOG NETWORK
Volume-1 | Issue-2

Live Streaming Architectures for Video Data - A Review
Volume-2 | Issue-4

IoT Based Monitoring and Control System using Sensors
Volume-3 | Issue-2

Big Data Analytics for Improved Risk Management and Customer Segregation in Banking Applications
Volume-3 | Issue-3

A Novel Signal Processing Based Driver Drowsiness Detection System
Volume-3 | Issue-3

IoT BASED AIR AND SOUND POLLUTION MONITIORING SYSTEM USING MACHINE LEARNING ALGORITHMS
Volume-2 | Issue-1

Analysis of Serverless Computing Techniques in Cloud Software Framework
Volume-3 | Issue-3

Hybrid Intrusion Detection System for Internet of Things (IoT)
Volume-2 | Issue-4

Home / Archives / Volume-2 / Issue-1 / Article-1

Volume - 2 | Issue - 1 | march 2020

EFFICIENT AND SECURE DATA UTILIZATION IN MOBILE EDGE COMPUTING BY DATA REPLICATION
Pages: 1-12
DOI
10.36548/jismac.2020.1.001
Published
25 February, 2020
Abstract

The technological improvement at a rapid pace in the information and the communication fields has made the internet of things inevitable in our day today activities and takes a significant role in the every part of our regular schedule. The seamless communication through the internet of things is made possible, by connecting the tangible things around resulting in the numerous of advantages such as timely information delivery, servicing and monitoring. The inbuilt benefits of the IOT has made it more prominent among a wide range of application resulting in a huge data flow, though the congestion in the dataflow are managed using the cloud computing and the alternative sources such as the edge computing , the security of the data that are used are still under research. To manage the huge data flow and have secure data utilization in the internet of things, the paper has put forth the mobile edge computing integrated with the data duplication process taking into consideration the power utilization and the response time. The proposed method is simulated using the Network Simulator-2 and results obtained shows that the duplication process provides an enhancement in the bandwidth utilization along with the cut down in the power consumption and the response time.

Keywords

Data Replication (duplication) Cloud Computing Edge Computing Mobile Edge Computing Internet of Things

×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
15 USD
Open Access Fee Nil
Annual Subscription Fee
200 USD
After payment,
please send an email to irojournals.contact@gmail.com / journals@iroglobal.com requesting article access.
Subscription form: click here