International Journal of Computer Techniques Volume 12 Issue 3 | A Novel Approach Of SHA-512 Integration with BeDD For Safe And Effective Data Management In Mec

ijct A Novel Approach of SHA-512 Integration with BEDD for MEC

A Novel Approach of SHA-512 Integration with BEDD for Safe and Effective Data Management in MEC

International Journal of Computer Techniques – Volume 12 Issue 3, May – June 2025

Authors

Dr. Rishi Sayal – Guru Nanak Institutions Technical Campus, Hyderabad. ad.rs@gniindia.org

Pooja Kulkarnikulkarni.pooja.26@gmail.com

Harshavardhan Ravillaharshavardhan76740@gmail.com

Disha Jhun Jhun Waladishajhunjhunwala633@gmail.com

Abstract

The exponential growth of mobile-generated data, driven by IoT and real-time applications, puts pressure on Mobile Edge Computing (MEC) resources. This paper proposes a novel integration of the **Balanced Edge Data Deduplication (BEDD)** scheme with the **SHA-512 hashing algorithm** to reduce redundancy and enhance data security. Experimental results on real-world datasets show that this approach significantly lowers storage overhead while maintaining data integrity and resistance to malicious attacks.

Keywords

MEC, Data Deduplication, SHA-512, Edge Compute, Storage Optimization

Conclusion

Combining **SHA-512** with **BEDD** ensures safe, deduplicated, and verifiable data management in edge environments. This strategy addresses storage bottlenecks while maintaining authentication and confidentiality. It demonstrates a promising future for deploying resource-aware, secure MEC infrastructures.

References

  1. Luo, R. et al. (2023). “Enabling Balanced Data Deduplication in Mobile Edge Computing.” IEEE TPDS.
  2. Mao, Y. et al. (2022). “Mobile Edge Computing: Survey and Outlook.” IEEE Network.
  3. Anand, A. & Rani, R. (2022). “Data Deduplication in MEC: A Review.” JAIHC.
  4. Li, Y. & Xu, S. (2023). “Secure Deduplication for MEC.” IEEE TDSC.
  5. Stallings, W. “Cryptography and Network Security,” 7th ed.

Post Comment