2020
DOI: 10.3390/s20051517
|View full text |Cite
|
Sign up to set email alerts
|

Smart Privacy Protection for Big Video Data Storage Based on Hierarchical Edge Computing

Abstract: Recently, the rapid development of the Internet of Things (IoT) has led to an increasing exponential growth of non-scalar data (e.g., images, videos). Local services are far from satisfying storage requirements, and the cloud computing fails to effectively support heterogeneous distributed IoT environments, such as wireless sensor network. To effectively provide smart privacy protection for video data storage, we take full advantage of three patterns (multi-access edge computing, cloudlets and fog computing) o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…The average communication overheads for PPMDS, EPA, and SPPDA are ⩽ 2000bits, ⩽ 3900bits, and ⩽ 4600 bits, respectively. Nowadays, multi-edge computations can handle up to 8 GB of data storage and computation [39].…”
Section: E Complexity Analysismentioning
confidence: 99%
“…The average communication overheads for PPMDS, EPA, and SPPDA are ⩽ 2000bits, ⩽ 3900bits, and ⩽ 4600 bits, respectively. Nowadays, multi-edge computations can handle up to 8 GB of data storage and computation [39].…”
Section: E Complexity Analysismentioning
confidence: 99%
“…Users are authenticated and authorised by correlating information sources such as data points, user identity, service or workload, location, data classification, device health, and anomalies. Password-based user authentication has been proven to be ineffective and inefficient without enhancements like two-factor authentication requiring human intervention [47]. With the modernisation of user authentication, enabling Single Sign-On (SSO) capability may elevate access control and improve user experience.…”
Section: Securing the Trust Pillarsmentioning
confidence: 99%
“…The amount of data that each user has varied from GBs to TBs, and the local storage cannot keep up with this enormous demand on its own. Because of this, adopting a low-complexity, high-security cloud storage service is now a must in today's world [2]. In any case, the primary concern raised by these data is security, as they are stored in the fog.…”
Section: Introductionmentioning
confidence: 99%