Downloads: 7 | Views: 170 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers | Computer Science and Information Technology | United States of America | Volume 13 Issue 5, May 2024 | Popularity: 5.7 / 10
Navigating Key-Value Stores in Cloud Edge Computing and IoT
Shyam Burkule, Ramprasad Chinthekindi, Senthilbharanidhar Boganavijayakumar
Abstract: Embedded key-value stores play a crucial role in enabling efficient data management in Internet of Things(IoT) and edge computing contexts, where local processing and storage capabilities are vital. The primary objective of this study is to investigate the management of key-value stores in cloud edge computing and the IoT. The study utilized the Systematic Literature Review technique. This study conducted a thorough analysis of various embedded key-value stores, such as RocksDB, LevelDB, and LMDB, to assess their applicability and performance in limited contexts. In addition, the study examined optimization tactics specifically designed for embedded systems, including compression algorithms, wear levelling approaches for non-volatile memory, and energy-efficient data operations that are crucial for battery-powered devices. The results demonstrated clear trade-offs between performance and resource utilization among the examined key-value stores. This provides valuable guidance for developers and system architects when choosing and optimizing embedded databases based on specific application needs and environmental limitations. This study enhanced the field by offering a comprehensive analysis of the performance characteristics of embedded key-value stores in IoT and edge environments. This analysis lays the foundation for developing data management solutions that are optimized, resilient, and resource conscious. Consequently, in future, it could help in creating more intelligent and efficient IoT ecosystems.
Keywords: IoT, Key Value Stores, Cloud Edge Computing, Data Storage, Data Management
Edition: Volume 13 Issue 5, May 2024
Pages: 1324 - 1328
DOI: https://www.doi.org/10.21275/SR24521024239
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 180 | Views: 326 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science and Information Technology, India, Volume 9 Issue 4, April 2020
Pages: 187 - 189Wearable Forensic Traces and Security Challenges
Divya Premchandran
Downloads: 180 | Views: 384 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science and Information Technology, India, Volume 9 Issue 7, July 2020
Pages: 1296 - 1299Quantum Computing
Shaifali Rastogi
Downloads: 177 | Views: 349 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science and Information Technology, India, Volume 9 Issue 8, August 2020
Pages: 618 - 621Recognition of Vehicle by Number Plate by Automatic Number Plate Recognition System
Maruthi ST, Dr. Sanjay Pande MB, Bindhu K M, Divya I, Gauri N S, Megha V
Downloads: 156 | Views: 313 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science and Information Technology, United States of America, Volume 9 Issue 3, March 2020
Pages: 1177 - 1179IT Infrastructure Business Contingency Plan
Anshuman Awasthi
Downloads: 152 | Views: 340 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Computer Science and Information Technology, China, Volume 9 Issue 3, March 2020
Pages: 519 - 528Sparse Representation of Image with Immune Clone Algorithm based on Harmonic Wavelet Packet Dictionary
WANG Li, WANG Wei, LIU Boni