Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front Comput Sci    0, Vol. Issue () : 660-667    https://doi.org/10.1007/s11704-012-1036-z
The Internet of data: a new idea to extend the IOT in the digital world
Wei FAN1, Zhengyong CHEN1,2(), Zhang XIONG1,2, Hui CHEN3
1. State Key Laboratory of Software Development Environment, Beihang University, Beijing 100191, China; 2. Research Institute of Beihang University in Shengzhen, Shenzhen 518057, China; 3. Sino-French Engineering School, Beihang University, Beijing 100191, China
 Download: PDF(492 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Increasingly powerful computational technology has caused enormous data growth both in size and complexity. A key issue is how to organize the data to adapt the challenges of data analysis. This paper borrows ideas from the Internet of things (IOT) into the digital world and organize the data entities to form a network, the Internet of data (IOD), which has huge potential in data-intensive applications. In the IOD, data hiding technology is utilized to embed virtual tags, which record all the activities of the data entities since they are created, into every data entity in the system. The IOD aims to organize the data to be interconnected as a network and collect useful information for data identification, data tracing, data vitalization and further data analysis.

Keywords Internet of data (IOD)      virtual tags      Internet of things (IOT)      data-intensive applications      data vitalization      data hiding     
Corresponding Author(s): CHEN Zhengyong,Email:chzhyong@cse.buaa.edu.cn   
Issue Date: 01 December 2012
 Cite this article:   
Zhengyong CHEN,Zhang XIONG,Wei FAN, et al. The Internet of data: a new idea to extend the IOT in the digital world[J]. Front Comput Sci, 0, (): 660-667.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-012-1036-z
https://academic.hep.com.cn/fcs/EN/Y0/V/I/660
1 Ashton K. That “Internet of things” thing. RFID Journal , 2009, 22: 97-114
2 SRI Consulting Business Intelligence. Appendix F: the Internet of things (background). http://www.dni.gov/nic/PDF_GIF_confreports/ disruptivetech/appendix_F.pdf
3 Gershenfeld N, Krikorian R, Cohen D. The Internet of things. Scientific American , 2004, 291(4): 76-81
doi: 10.1038/scientificamerican1004-76
4 Brock D L. The electronic product code (EPC) - a naming scheme for physical objects. Massachusetts: MIT Auto-ID Center White Paper, 2001
5 Huvio E, Gr?nvall J, Fr?mling K. Tracking and tracing parcels using a distributed computing approach. In: Proceedings of the 14th Annual Conference for Nordic Researchers in Logistics . 2002, 12-14
6 Wikipedia. Internet of things. http://en.wikipedia.org/wiki/Internet_ of_Things
7 Want R. An introduction to RFID technology. IEEE Pervasive Computing , 2006, 5(1): 25-33
doi: 10.1109/MPRV.2006.2
8 Hey A G T, Transley S, Tolle K M. The fourth paradigm: data-intensive scientific discovery. Microsoft Research , 2009
9 Collins J P. Sailing on an ocean of 0s and 1s. Science , 2010, 327(5972): 1455-1456
doi: 10.1126/science.1186123
10 Nielsen M. A guide to the day of big data. Nature , 2009, 462(7274): 722-723
doi: 10.1038/462722a
11 Markoff J. A deluge of data shapes a new era in computing. The New York Times , 2009
12 Chen Z, Fan W, Xiong Z, Zhang P, Luo L. Visual data security and management for smart cities. Frontiers of Computer Science in China , 2010, 4(3): 386-393
doi: 10.1007/s11704-010-0378-7
13 Xiong Z, Luo W, Chen L, Ni L M. Data vitalization: a new paradigm for large-scale dataset analysis. In: Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems . 2010, 251-258
doi: 10.1109/ICPADS.2010.102
14 Fan W, Chen Z, Chen M, Luo L, Xiong Z. Reversible data hiding with context modeling, generalized expansion and boundary map. Multimedia Tools and Applications (in Press)
15 Luo L, Chen Z, Chen M, Zeng X, Xiong Z. Reversible image watermarking using interpolation technique. IEEE Transactions on Information Forensics and Security , 2010, 5(1): 187-193
doi: 10.1109/TIFS.2009.2035975
16 Chen M, Chen Z, Zeng X, Xiong Z. Reversible data hiding using additive predictionerror expansion. In: Proceedings of the 11th ACMWorkshop on Multimedia and Security . 2009, 19-24
doi: 10.1145/1597817.1597822
17 Petitcolas F A P, Anderson R J, Kuhn M G. Information hiding-a survey. Proceedings of the IEEE , 1999, 87(7): 1062-1078
doi: 10.1109/5.771065
18 Moulin P, O’Sullivan J A. Information-theoreticanalysis of information hiding. IEEE Transactions on Information Theory , 2003, 49(3): 563-593
doi: 10.1109/TIT.2002.808134
19 Conner M. Sensors empower the “Internet of things”. EDN , 2010, 55(10): 32-38
20 Wikipedia. Internet. http://en.wikipedia.org/wiki/Internet
21 W3C. W3C semantic web frequently asked questions. http://www.w3. org/2001/sw/SW-FAQ
22 The SemanticWeb: An Introduction. http://infomesh.net/2001/swintro/
23 Tim B L, Hendler J, Lassila O. The semantic web. Scientific American Magazine , 2001
24 Wikipedia. Radio-frequency identification. http://en.wikipedia.org/ wiki/Radio-frequency_identification
25 Cox I J, Kilian J, Leighton F T, Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing , 1997, 6(12): 1673-1687
doi: 10.1109/83.650120
26 Cayre F, Fontaine C, Furon T. Watermarking security: theory and practice. IEEE Transactions on Signal Processing , 2005, 53(10): 3976-3987
doi: 10.1109/TSP.2005.855418
[1] Ningning CHEN, Huibiao ZHU. A proof system of the CaIT calculus[J]. Front. Comput. Sci., 2024, 18(2): 182401-.
[2] Lei CHEN, Mitchell TSENG, Xiang LIAN, . Development of foundation models for Internet of Things[J]. Front. Comput. Sci., 2010, 4(3): 376-385.
[3] Zhenyong CHEN, Wei FAN, Zhang XIONG, Pingan ZHANG, Lixin LUO, . Visual data security and management for smart cities[J]. Front. Comput. Sci., 2010, 4(3): 386-393.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed