|
|
The Internet of data: a new idea to extend the IOT in the digital world |
Wei FAN1, Zhengyong CHEN1,2( ), Zhang XIONG1,2, Hui CHEN3 |
1. State Key Laboratory of Software Development Environment, Beihang University, Beijing 100191, China; 2. Research Institute of Beihang University in Shengzhen, Shenzhen 518057, China; 3. Sino-French Engineering School, Beihang University, Beijing 100191, China |
|
|
Abstract Increasingly powerful computational technology has caused enormous data growth both in size and complexity. A key issue is how to organize the data to adapt the challenges of data analysis. This paper borrows ideas from the Internet of things (IOT) into the digital world and organize the data entities to form a network, the Internet of data (IOD), which has huge potential in data-intensive applications. In the IOD, data hiding technology is utilized to embed virtual tags, which record all the activities of the data entities since they are created, into every data entity in the system. The IOD aims to organize the data to be interconnected as a network and collect useful information for data identification, data tracing, data vitalization and further data analysis.
|
Keywords
Internet of data (IOD)
virtual tags
Internet of things (IOT)
data-intensive applications
data vitalization
data hiding
|
Corresponding Author(s):
CHEN Zhengyong,Email:chzhyong@cse.buaa.edu.cn
|
Issue Date: 01 December 2012
|
|
1 |
Ashton K. That “Internet of things” thing. RFID Journal , 2009, 22: 97-114
|
2 |
SRI Consulting Business Intelligence. Appendix F: the Internet of things (background). http://www.dni.gov/nic/PDF_GIF_confreports/ disruptivetech/appendix_F.pdf
|
3 |
Gershenfeld N, Krikorian R, Cohen D. The Internet of things. Scientific American , 2004, 291(4): 76-81 doi: 10.1038/scientificamerican1004-76
|
4 |
Brock D L. The electronic product code (EPC) - a naming scheme for physical objects. Massachusetts: MIT Auto-ID Center White Paper, 2001
|
5 |
Huvio E, Gr?nvall J, Fr?mling K. Tracking and tracing parcels using a distributed computing approach. In: Proceedings of the 14th Annual Conference for Nordic Researchers in Logistics . 2002, 12-14
|
6 |
Wikipedia. Internet of things. http://en.wikipedia.org/wiki/Internet_ of_Things
|
7 |
Want R. An introduction to RFID technology. IEEE Pervasive Computing , 2006, 5(1): 25-33 doi: 10.1109/MPRV.2006.2
|
8 |
Hey A G T, Transley S, Tolle K M. The fourth paradigm: data-intensive scientific discovery. Microsoft Research , 2009
|
9 |
Collins J P. Sailing on an ocean of 0s and 1s. Science , 2010, 327(5972): 1455-1456 doi: 10.1126/science.1186123
|
10 |
Nielsen M. A guide to the day of big data. Nature , 2009, 462(7274): 722-723 doi: 10.1038/462722a
|
11 |
Markoff J. A deluge of data shapes a new era in computing. The New York Times , 2009
|
12 |
Chen Z, Fan W, Xiong Z, Zhang P, Luo L. Visual data security and management for smart cities. Frontiers of Computer Science in China , 2010, 4(3): 386-393 doi: 10.1007/s11704-010-0378-7
|
13 |
Xiong Z, Luo W, Chen L, Ni L M. Data vitalization: a new paradigm for large-scale dataset analysis. In: Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems . 2010, 251-258 doi: 10.1109/ICPADS.2010.102
|
14 |
Fan W, Chen Z, Chen M, Luo L, Xiong Z. Reversible data hiding with context modeling, generalized expansion and boundary map. Multimedia Tools and Applications (in Press)
|
15 |
Luo L, Chen Z, Chen M, Zeng X, Xiong Z. Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security , 2010, 5(1): 187-193 doi: 10.1109/TIFS.2009.2035975
|
16 |
Chen M, Chen Z, Zeng X, Xiong Z. Reversible data hiding using additive predictionerror expansion. In: Proceedings of the 11th ACMWorkshop on Multimedia and Security . 2009, 19-24 doi: 10.1145/1597817.1597822
|
17 |
Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-a survey. Proceedings of the IEEE , 1999, 87(7): 1062-1078 doi: 10.1109/5.771065
|
18 |
Moulin P, O’Sullivan J A. Information-theoreticanalysis of information hiding. IEEE Transactions on Information Theory , 2003, 49(3): 563-593 doi: 10.1109/TIT.2002.808134
|
19 |
Conner M. Sensors empower the “Internet of things”. EDN , 2010, 55(10): 32-38
|
20 |
Wikipedia. Internet. http://en.wikipedia.org/wiki/Internet
|
21 |
W3C. W3C semantic web frequently asked questions. http://www.w3. org/2001/sw/SW-FAQ
|
22 |
The SemanticWeb: An Introduction. http://infomesh.net/2001/swintro/
|
23 |
Tim B L, Hendler J, Lassila O. The semantic web. Scientific American Magazine , 2001
|
24 |
Wikipedia. Radio-frequency identification. http://en.wikipedia.org/ wiki/Radio-frequency_identification
|
25 |
Cox I J, Kilian J, Leighton F T, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing , 1997, 6(12): 1673-1687 doi: 10.1109/83.650120
|
26 |
Cayre F, Fontaine C, Furon T. Watermarking security: theory and practice. IEEE Transactions on Signal Processing , 2005, 53(10): 3976-3987 doi: 10.1109/TSP.2005.855418
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|