Challenges of Distributed Storage Systems in Internet of Things

  • Madhvaraj M. Shetty
  • D. H. Manjaiah
Part of the Studies in Big Data book series (SBD, volume 25)


Internet of things presents a general concept of the strength of different network devices to sense and collect important information from the world around it, and then it share this information across the internet where it accessed, processed and utilized for various other interesting purposes. This concept of internet of things will be an integrated part of the future internet. But in order to gain more benefits, it is essential to store heterogeneous data captured by various devices for further analysis. But it requires vast amount of storage space which cannot be handled using traditional centralized storage system. So it is achieved using the concept of distributed storage systems and the growth of these storage devices impose many challenges related to topologies and interconnection protocols, data consistency, error handling, security and privacy, etc. Ensuring security and privacy to the users is a major challenge considering the sensitive, personal or confidential nature of the data stored in the system. This chapter, discusses various issues related to fusion, privacy, security and trust in distributed storage systems.


File System Data Fusion Access Control Model Hadoop Distribute File System Access Control List 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Evangelos, A., Kosmatos, A., Nikolaos, D.T., Anthony, C.B.: Integrating RFIDs and smart objects into a unified internet of things architecture. Adv. Internet Things 13(2), 45–55 (2011)Google Scholar
  2. 2.
    Atzori, K., Luigi, D., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(5), 2787–2805 (2010)CrossRefzbMATHGoogle Scholar
  3. 3.
    Li, H., Lin, X., Yang, H., Liang, X., Lu, R., Shen, X.: EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid. IEEE Trans. Parallel Distrib. Syst. 25(8), 2053–2064 (2014)CrossRefGoogle Scholar
  4. 4.
    Dong, M., Ota, K., Li, H., Du, S., Zhu, H., Guo, S.: RENDEZVOUS: towards fast event detecting in wireless sensor and actor networks. Wirel. Sens. Netw. Secur. 23(5), 230–245 (2012)Google Scholar
  5. 5.
    Li, H., Lin, X., Yang, H., Liang, X., Lu, R., Shen, X.: An efficient merkle-tree-based authentication scheme for smart grid. IEEE Syst. J. 8(2), 655–663 (2014)CrossRefGoogle Scholar
  6. 6.
    Rhea, F., Sean, H.: Maintenance-free global data storage. IEEE J. Internet Comput. 5, 40–49 (2001)CrossRefGoogle Scholar
  7. 7.
    Dabek, F., et al.: Wide-area cooperative storage with CFS. J. ACM SIGOPS Oper. Syst. Rev. 35(5), 202–215 (2001)Google Scholar
  8. 8.
    Hu, A., Yuchong, D., Xi, W.: Cooperative recovery of distributed storage systems from multiple losses with network coding. IEEE J. Sel. Areas Commun. 28(2), 268–276 (2010)CrossRefGoogle Scholar
  9. 9.
    Yu, W., Gao, X., Li, W.X.: A new network storage architecture based on NAS and SAN. In: Proceedings of 10th International Conference on Control, Automation, Robotics and Vision, pp. 345–349 (2008)Google Scholar
  10. 10.
    Ghemawat, H., Sanjay, K., Gobioff, H., Leung, S.T.: The google file system. J. ACM SIGOPS Oper. Syst. Rev. 37(5), 345–356 (2003)Google Scholar
  11. 11.
    Shvachko, K., Konstantin, L., Ramesh, H.: The hadoop distributed file system. In: Proceedings of IEEE 26th Symposium on Mass Storage Systems and Technologies, pp. 234–240 (2010)Google Scholar
  12. 12.
    Schmuck, D., Frank, B., Haskin, R.L.: GPFS: a shared-disk file system for large computing clusters. J. Comput. 2(3), 112–121 (2002)Google Scholar
  13. 13.
    Braam, G., Peter, J.: The lustre storage architecture. J. Sci. Environ. 11(4), 67–77 (2004)Google Scholar
  14. 14.
    Satyanarayanan, K., Mahadev, F.: Integrating security in a large distributed system. ACM Trans. Comput. Syst. 7(3), 247–280 (1989)CrossRefGoogle Scholar
  15. 15.
    Lewicki, H., Roy, J., Tomlinson, E.C.: Trust and trust building. J. Beyond intractability 5(3), 305–315 (2003)Google Scholar
  16. 16.
    Blaze, F., Matt, K., Keromytis, A.D.: The key note trust-management system version 2. J. Sci. Technol. 12(2), 56–67 (1999)Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.Department of Computer ScienceMangalore UniversityMangaloreIndia

Personalised recommendations