2016
DOI: 10.1007/978-981-10-1678-3_1
|View full text |Cite
|
Sign up to set email alerts
|

Experimental Analysis on Big Data in IOT-Based Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…The system offers proper scalability and real time processing of security events. The IoT based model proposed by Bera 144 offers parallel query execution for big IoT data processing and thus reduces time and cost with reduced redundancy. Primary data mining techniques employed in this method is classification and processing.…”
Section: Big Data Mining In 5g‐driven Iot Environmentmentioning
confidence: 99%
“…The system offers proper scalability and real time processing of security events. The IoT based model proposed by Bera 144 offers parallel query execution for big IoT data processing and thus reduces time and cost with reduced redundancy. Primary data mining techniques employed in this method is classification and processing.…”
Section: Big Data Mining In 5g‐driven Iot Environmentmentioning
confidence: 99%
“…There are several aspects of the IoT that present security problems, including IoT device communications, constrained resources (e.g., limited battery life), variety (e.g., different types of devices made by multiple manufacturers), and scale (billions of devices) [41]. Among the plethora of recent research solutions [5,15,24,27,39] for protecting IoT data, some related research (e.g., [15,24,32]) focuses on security and privacy preservation policies while others (e.g., [5,15,27,39]) focus on encryption frameworks for the IoT [28].…”
Section: Overview Of Techniques For Holistic Iot Securitymentioning
confidence: 99%