Data replication techniques in the Internet of Things: a systematic literature review

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Xianke Sun ◽  
Gaoliang Wang ◽  
Liuyang Xu ◽  
Honglei Yuan

PurposeIn data grids, replication has been regarded as a crucial optimization strategy. Computing tasks are performed on IoT gateways at the cloud edges to obtain a prompt response. So, investigating the data replication mechanisms in the IoT is necessary. Henceforth, a systematic survey of data replication strategies in IoT techniques is presented in this paper, and some suggestions are offered for the upcoming works. In two key classifications, various parameters dependent on the analysis of the prevalent approaches are considered. The pros and cons associated with chosen strategies have been explored, and the essential problems of them have been presented to boost the future of more effective data replication strategies. We have also discovered gaps in papers and provided solutions for them.Design/methodology/approachProgress in Information Technology (IT) growth has brought the Internet of Things (IoT) into life to take a vital role in our everyday lifestyles. Big IoT-generated data brings tremendous data processing challenges. One of the most challenging problems is data replication to improve fault-tolerance, reliability, and accessibility. In this way, if the primary data source fails, a replica can be swapped in immediately. There is a significant influence on the IoT created by data replication techniques, but no extensive and systematic research exists in this area. There is still no systematic and full way to address the relevant methods and evaluate them. Hence, in the present investigation, a literature review is indicated on the IoT-based data replication from papers published until 2021. Based on the given guidelines, chosen papers are reviewed. After establishing exclusion and inclusion criteria, an independent systematic search in Google Scholar, ACM, Scopus, Eric, Science Direct, Springer link, Emerald, Global ProQuest, and IEEE for relevant studies has been performed, and 21(6 paper analyzed in section 1 and 15 paper analyzed in section 3) papers have been analyzed.FindingsThe results showed that data replication mechanisms in the IoT algorithms outperform other algorithms regarding impressive network utilization, job implementation time, hit ratio, total replication number, and the portion of utilized storage in percentage. Although a few ideas have been suggested that fix different facets of IoT data management, we predict that there is still space for development and more study. Thus, in order to design innovative and more effective methods for future IoT-based structures, we explored open research directions in the domain of efficient data processing.Research limitations/implicationsThe present investigation encountered some drawbacks. First of all, only certain papers published in English were included. It is evident that some papers exist on data replication processes in the IoT written in other languages, but they were not included in our research. Next, the current report has only analyzed the mined based on data replication processes and IoT keyword discovery. The methods for data replication in the IoT would not be printed with keywords specified. In this review, the papers presented in national conferences and journals are neglected. In order to achieve the highest ability, this analysis contains papers from major global academic journals.Practical implicationsTo appreciate the significance and accuracy of the data often produced by different entities, the article illustrates that data provenance is essential. The results contribute to providing strong suggestions for future IoT studies. To be able to view the data, administrators have to modify novel abilities. The current analysis will deal with the speed of publications and suggest the findings of research and experience as a future path for IoT data replication decision-makers.Social implicationsIn general, the rise in the knowledge degree of scientists, academics, and managers will enhance administrators' positive and consciously behavioral actions in handling IoT environments. We anticipate that the consequences of the present report could lead investigators to produce more efficient data replication methods in IoT regarding the data type and data volume.Originality/valueThis report provides a detailed literature review on data replication strategies relying on IoT. The lack of such papers increases the importance of this paper. Utilizing the responses to the study queries, data replication's primary purpose, current problems, study concepts, and processes in IoT are summarized exclusively. This approach will allow investigators to establish a more reliable IoT technique for data replication in the future. To the best of our understanding, our research is the first to provide a thorough overview and evaluation of the current solutions by categorizing them into static/dynamic replication and distributed replication subcategories. By outlining possible future study paths, we conclude the article.

2016 ◽  
Vol 117 (3/4) ◽  
pp. 289-292 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons who use library networks and devices with calm, logical and transparent answers to those questions concerning what they are doing to ensure that security and privacy vulnerabilities are regularly addressed. Originality/value – The value in concentrating on this topic is to provide background and suggest several approaches to security and privacy concerns regarding the IOT.


Info ◽  
2016 ◽  
Vol 18 (1) ◽  
pp. 67-84 ◽  
Author(s):  
Simon Forge

Purpose The aim of this paper is to consider whether it is possible to identify the future spectrum bands most suitable for the Internet of Things (IoT) from the operating factors of a novel set of radio services for a very wide range of applications, as an aid to policy makers now facing decisions in this area. Design/methodology/approach The approach uses characteristics of spectrum bands against the applications’ requirements to focus on specific major traits that can be matched. Findings The main choice factors for spectrum are the practical application needs and the network cost model, and these are fairly useful as matching parameters. It is forecast that multiple bands will be needed and that these should be of a licence-exempt form to seed the unfettered innovation of IoT technologies and pre-empt the formation of significant market power by concerned interests. Practical implications The way in which spectrum is allocated today will need to be reconsidered, in the light of evolving IoT requirements, which will have increasing economic and social impacts. Policy recommendations for IoT spectrum demands are outlined, and key policy options to ensure a dynamic and trustworthy development of the IoT are put forward. For instance, regulatory barriers globally will need to be removed. Originality/value Current interests in the technical requirements of the IoT have not yet given a suitable analysis of the potential spectrum uses, because too often, it is assumed that previous models of spectrum allocation will continue in the future, without consideration of the economic pressures and social context.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ammar Mohamed Aamer ◽  
Mohammed Ali Al-Awlaqi ◽  
Ifadhila Affia ◽  
Silvia Arumsari ◽  
Nabeel Mandahawi

PurposeThe food supply chain (FSC) challenges coupled with global disruptions, such as the recent coronavirus disease 2019 (COVID-19) pandemic outbreak, exacerbate its vulnerability. The Internet of things (IoT) is one of the disruptive technologies being adopted in food supply chain management (FSCM). This study aims to address the challenges of IoT adoption in the FSC by systematically analyzing the prior pertinent literature.Design/methodology/approachA structured literature review was used to collate a list of peer-reviewed and relevant publications. A total of 72 out of 210 articles were selected for the final evaluation.FindingsThe literature review findings suggest five themes: technical, financial, social, operational, educational and governmental related challenges. A total of 15 challenges were devised from the review related literature of IoT adoption. The study concludes with future research recommendations for scholars and practical implications for practitioners.Research limitations/implicationsWhile this study focuses on the overall FSC, further research should address other domains in the FSC such as cold supply chain, agriculture and perishable food to gain a better contextual understanding of the specific case.Originality/valueThe topic of IoT adoption in the FSCM is still considered emerging. Therefore, the present work contributes to the limited studies and documentation on the level of IoT implementation in the FSCM. This study should help organizations to assimilate how to adopt and manage the IoT application by addressing the factors and challenges presented in this research.


2016 ◽  
Vol 44 (4) ◽  
pp. 18-25 ◽  
Author(s):  
Saul J. Berman ◽  
Peter J. Korsten ◽  
Anthony Marshall

Purpose Digital reinvention helps organizations create unique, compelling experiences for their customers, partners, employees and other stakeholders. Design/methodology/approach Digital reinvention combines the capabilities of multiple technologies, including cloud, cognitive, mobile and the Internet of Things (IoT) to rethink customer and partner relationships from a perspective of fundamental customer need, use or aspiration. Findings The most successful digitally reinvented businesses establish a platform of engagement for their customers, with the business acting as enabler, conduit and partner Practical implications For successful digital reinvention, organizations need to pursue a new strategic focus, build new expertise and establish new ways of working. Originality/value The article offers a blueprint for digital reinvention that involves rethinking customer and partner relationships from a perspective of fundamental customer need, use or aspiration.


2018 ◽  
Vol 33 (6) ◽  
pp. 749-767 ◽  
Author(s):  
Seppo Leminen ◽  
Mervi Rajahonka ◽  
Mika Westerlund ◽  
Robert Wendelin

Purpose This study aims to understand their emergence and types of business models in the Internet of Things (IoT) ecosystems. Design/methodology/approach The paper builds upon a systematic literature review of IoT ecosystems and business models to construct a conceptual framework on IoT business models, and uses qualitative research methods to analyze seven industry cases. Findings The study identifies four types of IoT business models: value chain efficiency, industry collaboration, horizontal market and platform. Moreover, it discusses three evolutionary paths of new business model emergence: opening up the ecosystem for industry collaboration, replicating the solution in multiple services and return to closed ecosystem as technology matures. Research limitations/implications Identifying business models in rapidly evolving fields such as the IoT based on a small number of case studies may result in biased findings compared to large-scale surveys and globally distributed samples. However, it provides more thorough interpretations. Practical implications The study provides a framework for analyzing the types and emergence of IoT business models, and forwards the concept of “value design” as an ecosystem business model. Originality/value This paper identifies four archetypical IoT business models based on a novel framework that is independent of any specific industry, and argues that IoT business models follow an evolutionary path from closed to open, and reversely to closed ecosystems, and the value created in the networks of organizations and things will be shareable value rather than exchange value.


Author(s):  
Paul Fremantle ◽  
Philip Scott

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.


Intexto ◽  
2019 ◽  
pp. 139-165
Author(s):  
André Luiz Martins Lemos ◽  
Daniel Góis Rabêlo Marques ◽  
Elias Cunha Bitencourt

The article describes how the Brazilian media shows the Internet of Things. The corpus is composed of 165 texts of Folha de São Paulo published online between 2011 and 2016. A data scraping tool was developed to extract the texts, which were analyzed using Atlas.ti. As criterion of analysis, we sought to identify the most cited objects, the qualities attributed to them, as well as the most recurrent IoT definitions. We also observed the main themes found in the texts and the judgment implied by the articles. We conclude that IoT is defined by the connectivity between intelligent objects, linked to technical and economic issues and to the imaginary of the future. These objects work mostly in the residential, health and transportation areas. Privacy issues still do not dominate the discussions.


Crimen ◽  
2020 ◽  
Vol 11 (3) ◽  
pp. 255-271
Author(s):  
Sanja Milivojević ◽  
Elizabeth Radulski

The Internet of Things (IoT) is poised to revolutionise the way we live and communicate, and the manner in which we engage with our social and natural world. In the IoT, objects such as household items, vending machines and cars have the ability to sense and share data with other things, via wireless, Bluetooth, or Radio Frequency IDentification (RFID) technology. "Smart things" have the capability to control their performance, as well as our experiences and decisions. In this exploratory paper, we overview recent developments in the IoT technology, and their relevance for criminology. Our aim is to partially fill the gap in the literature, by flagging emerging issues criminologists and social scientists ought to engage with in the future. The focus is exclusively on the IoT while other advances, such as facial recognition technology, are only lightly touched upon. This paper, thus, serves as a starting point in the conversation, as we invite scholars to join us in forecasting-if not preventing-the unwanted consequences of the "future Internet".


Sign in / Sign up

Export Citation Format

Share Document