International Journal of Computer Techniques Volume 12 Issue 3 | A Novel Approach Of SHA-512 Integration with BeDD For Safe And Effective Data Management In Mec
A Novel Approach of SHA-512 Integration with BEDD for Safe and Effective Data Management in MEC
International Journal of Computer Techniques – Volume 12 Issue 3, May – June 2025
Abstract
The exponential growth of mobile-generated data, driven by IoT and real-time applications, puts pressure on Mobile Edge Computing (MEC) resources. This paper proposes a novel integration of the **Balanced Edge Data Deduplication (BEDD)** scheme with the **SHA-512 hashing algorithm** to reduce redundancy and enhance data security. Experimental results on real-world datasets show that this approach significantly lowers storage overhead while maintaining data integrity and resistance to malicious attacks.
Keywords
MEC, Data Deduplication, SHA-512, Edge Compute, Storage Optimization
Conclusion
Combining **SHA-512** with **BEDD** ensures safe, deduplicated, and verifiable data management in edge environments. This strategy addresses storage bottlenecks while maintaining authentication and confidentiality. It demonstrates a promising future for deploying resource-aware, secure MEC infrastructures.
References
- Luo, R. et al. (2023). “Enabling Balanced Data Deduplication in Mobile Edge Computing.” IEEE TPDS.
- Mao, Y. et al. (2022). “Mobile Edge Computing: Survey and Outlook.” IEEE Network.
- Anand, A. & Rani, R. (2022). “Data Deduplication in MEC: A Review.” JAIHC.
- Li, Y. & Xu, S. (2023). “Secure Deduplication for MEC.” IEEE TDSC.
- Stallings, W. “Cryptography and Network Security,” 7th ed.
Post Comment