Abstract
Following the considerable evolution of new technologies, as well as the computerization of different exchanges and gadgets in lot of areas lately, and with the appearance of the new generation 5G, the quantity of connected devices will increase in expanded way. Similarly, the creation of data in its different structures will be important. Consequently, the value of studying the distinctive storage methods. This paper introduces the different stockpiling techniques, which enables average readers to have an overview of the distinctive methods including the definition and architecture.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Elhoseny, M., Abdelaziz, A., Salama, A., Riad, A.M., Sangaiah, A.K., Muhammad, K.: A hybrid model of internet of things and cloud computing to manage big data in health services applications. Futur. Gener. Comput. 86, 1383–1394 (2018)
Elhoseny, M., Shankar, K., Lakshmanaprabu, S.K., Maseleno, A., Arunkumar, N.: Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Comput. Appl. 1–15 (2018). https://doi.org/10.1007/s00521-018-3801-x
Hurrah, N.N., Parah, S.A., Loan, N.A., Sheikh, J.A., Elhoseny, M., Muhammad, K.: Dual watermarking framework for privacy protection and content authentication of multimedia. Futur. Gener. Comput. Syst. 94, 654–667 (2019)
Muhammad, K., Khan, S., Elhoseny, M., Ahmed, S.H., Baik, S.W.: Efficient fire detection for uncertain surveillance environment. IEEE Trans. Ind. Inform. (2019)
Boveiri, H.R., Elhoseny, M.: A-COA: an adaptive cuckoo optimization algorithm for continuous and combinatorial optimization. Neural Comput. Appl. DOI:https://doi.org/10.1007/s00521-018-3928-9 (First Online: 15 December 2018)
Rao, H., Shi, X., Rodrigue, A.K., Feng, J., Xia, Y., Elhoseny, M., Yuan, X., Gu, L.: Feature selection based on artificial bee colony and gradient boosting decision tree. Appl. Soft Comput. DOI:https://doi.org/10.1016/j.asoc.2018.10.036 (Online: 5 November 2018)
Rappaport, T.S., et al.: Millimeter wave mobile communications for 5G cellular: it will work! IEEE Access 1, 335–349 (2013)
Myung, H.G., Goodman, D.J.: Single Carrier FDMA: A New Air Interface for Long Term Evolution. Wiley, Chichester, UK (2008)
Jindal, N., Goldsmith, A.: Dirty-paper coding versus TDMA for MIMO broadcast channels. IEEE Trans. Inf. Theory 51(5), 1783–1794 (2005)
G PPP Architecture Working Group view on 5G Architecture. WP-July-2016
GSMA, 5G, the Internet of Things (IoT) and Wearable Devices. September-2017
Jungnickel, V., et al.: The role of small cells, coordinated multipoint, and massive MIMO in 5G. IEEE Commun. Mag. 52(5), 44–51 (2014)
mobicom10-duplex.pdf
Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50 (2010)
Jadeja, Y., Modi, K.: Cloud computing - concepts, architecture and challenges. In: 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), Nagercoil, Tamil Nadu, India, pp. 877–880 (2012)
Rimal, B.P, Choi, E., Lumb, I.: A taxonomy and survey of cloud computing systems. In: 2009 Fifth International Joint Conference on INC, IMS and IDC, Seoul, South Korea, pp. 44–51 (2009)
Mathur, P., Nishchal, N.: Cloud computing: new challenge to the entire computer industry. In: 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010), Solan, India, pp. 223–228 (2010)
Mathur, P., Nishchal, N.: Cloud computing: new challenge to the entire computer industry (:unav), october 2010 (2010)
Guan, L., Ke, X., Song, M., Song, J.: A survey of research on mobile cloud computing. In: 2011 10th IEEE/ACIS International Conference on Computer and Information Science, Sanya, China, pp. 387–392 (2011)
Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14–23 (2009)
Black, M., Edgar, W.: Exploring mobile devices as Grid resources: using an x86 virtual machine to run BOINC on an iPhone. In 2009 10th IEEE/ACM International Conference on Grid Computing, pp. 9–16 (2009)
Ibtissame, K., Yassine, R., Habiba, C.: Real time processing technologies in big data: comparative study. In 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, pp. 256–262 (2017)
Paakkonen, J., Hollanti, C., Tirkkonen, O.: Device-to-device data storage for mobile cellular systems. In: 2013 IEEE Globecom Workshops (GC Wkshps), Atlanta, GA, pp. 671–676 (2013)
Sharma, P.P., Navdeti, C.P.: Securing big data hadoop: a review of security issues, threats and solution. Int. J. Comput. Sci. Inf. Technol. 5, 6 (2014)
Gandotra, P., Kumar Jha, R., Jain, S., A survey on device-to-device (D2D) communication: architecture and security issues. J. Netw. Comput. Appl. 78, 9–29 (2017)
Jararweh, Y., Doulat, A., Darabseh, A., Alsmirat, M., Al-Ayyoub, M, Benkhelifa, E.: SDMEC: software defined system for mobile edge computing. In: 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), Berlin, Germany, pp. 88–93 (2016)
Darabseh, A., Al-Ayyoub, M., Jararweh, Y., Benkhelifa, E., Vouk, M., Rindos, A.: SDStorage: a software defined storage experimental framework. In: 2015 IEEE International Conference on Cloud Engineering, Tempe, AZ, USA, pp. 341–346 (2015)
Christensen, J.H.: Using RESTful web-services and cloud computing to create next generation mobile applications. In: Proceedings of the 24th ACM SIGPLAN Conference Companion on Object Oriented Programming Systems Languages and Applications, New York, NY, USA, pp. 627–634 (2009)
Suo, H., Liu, Z., Wan, J., Zhou, K.: Security and privacy in mobile cloud computing. In: 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, Italy, pp. 655–659 (2013)
CloudAV: N-Version Antivirus in the Network Cloud
Fernando, N., Loke, S.W., Rahayu,W.: Mobile cloud computing: a survey. Futur. Gener. Comput. Syst. 29(1), 84–106 (2013)
Khan, A.N., Mat Kiah, M.L., Khan, S.U., Madani, S.A.: Towards secure mobile cloud computing: a survey. Futur. Gener. Comput. Syst. 29(5), 1278–1299 (2013)
Darabseh, A., Freris, N.M.: A software defined architecture for cyberphysical systems. In: 2017 Fourth International Conference on Software Defined Systems (SDS), Valencia, Spain, pp. 54–60 (2017)
Burt, J.: Fog computing aims to reduce processing burden of cloud systems. eWeek (2010)
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges - ScienceDirect
Shirazi, S.N., Gouglidis, A., Farshad, A., Hutchison, D.: The extended cloud: review and analysis of mobile edge computing and fog from a security and resilience perspective. IEEE J. Sel. Areas Commun. 35(11), 2586–2595 (2017)
Xiao, L., Wan, X., Dai, C., Du, X., Chen, X., Guizani, M.: Security in mobile edge caching with reinforcement learning. IEEE Wirel. Commun. 25(3), 116–122 (2018)
El-Sayed, H., et al.: Edge of things: the big picture on the integration of edge, IoT and the cloud in a distributed computing environment. IEEE Access 6, 1706–1717 (2018)
Abouelmehdi, K., Beni-Hssane, A., Khaloufi, H., Saadi, M.: Big data emerging issues: hadoop security and privacy. In: 2016 5th International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, Morocco, pp. 731–736 (2016)
Adluru, P., Datla, S.S., Zhang, X.: Hadoop eco system for big data security and privacy. In: 2015 Long Island Systems, Applications and Technology, Farmingdale, NY, USA, pp. 1–6 (2015)
Zhang, D.-W., Sun, F.-Q., Cheng, X., Liu, C.: Research on hadoop-based enterprise file cloud storage system. In: 2011 3rd International Conference on Awareness Science and Technology (iCAST), Dalian, China, pp. 434–437 (2011)
Zhou, B., Hu, H., Huang, S.-Q., Chen, H.-H.: Intracluster device-to-device relay algorithm with optimal resource utilization. IEEE Trans. Veh. Technol. 62(5), 2315–2326 (2013)
Feng, D., Lu, L., Yuan-Wu, Y., Li, G.Y., Feng, G., Li, S.: Device-to-device communications underlaying cellular networks. IEEE Trans. Commun. 61(8), 3541–3551 (2013)
Chen, B., Zheng, J., Zhang, Y.: A time division scheduling resource allocation algorithm for D2D communication in cellular networks. In: 2015 IEEE International Conference on Communications (ICC), London, pp. 5422–5428 (2015)
Zheng, J., Chen, B., Zhang, Y.: An adaptive time division scheduling based resource allocation algorithm for D2D communication underlaying cellular networks, (:unav), december 2014 (2014)
Shen, W., Hong, W., Cao, X., Yin, B., Shila, D.M., Cheng, Y.: Secure key establishment for device-to-device communications. In: 2014 IEEE Global Communications Conference, Austin, TX, USA, pp. 336–340 (2014)
Abd-Elrahman, E., Ibn-khedher, H., Afifi, H., Toukabri, T.: Fast group discovery and non-repudiation in D2D communications using IBE. In: 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), Dubrovnik, Croatia, pp. 616–621 (2015)
Jayasinghe, K., Jayasinghe, P., Rajatheva, N., Latva-aho, M.: Physical layer security for relay assisted MIMO D2D communication. In: 2015 IEEE International Conference on Communication Workshop (ICCW), London, United Kingdom, pp. 651–656 (2015)
Zhang, A., Chen, J., Hu, R.Q., Qian, Y.: SeDS: secure data sharing strategy for D2D communication in LTE-advanced networks. IEEE Trans. Veh. Technol. 65(4), 2659–2672 (2016)
Shvachko, K., Kuang, H., Radia, S., Chansler, R.: The hadoop distributed file system. In: 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), Incline Village, NV, USA, pp. 1–10 (2010)
Liu, H., Eldarrat, F., Alqahtani, H., Reznik, A., de Foy, X., Zhang, Y.: Mobile edge cloud system: architectures, challenges, and approaches. IEEE Syst. J. 12(3), 2495–2508 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Manale, B., Tomader, M. (2020). A Survey of Different Storage Methods for NGN Mobile Networks: Storage Capacity, Security and Response Time. In: Elhoseny, M., Hassanien, A. (eds) Emerging Technologies for Connected Internet of Vehicles and Intelligent Transportation System Networks. Studies in Systems, Decision and Control, vol 242. Springer, Cham. https://doi.org/10.1007/978-3-030-22773-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-22773-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22772-2
Online ISBN: 978-3-030-22773-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)