Smart Cities: A Survey on Data Management, Security, and Enabling Technologies

Ammar Gharaibeh, Mohammad A. Salahuddin, Sayed Jahed Hussini, Abdallah Khreishah, Issa Khalil, Mohsen Guizani, Ala Al-Fuqaha

Research output: Contribution to journalReview articlepeer-review

492 Scopus citations

Abstract

Integrating the various embedded devices and systems in our environment enables an Internet of Things (IoT) for a smart city. The IoT will generate tremendous amount of data that can be leveraged for safety, efficiency, and infotainment applications and services for city residents. The management of this voluminous data through its lifecycle is fundamental to the realization of smart cities. Therefore, in contrast to existing surveys on smart cities we provide a data-centric perspective, describing the fundamental data management techniques employed to ensure consistency, interoperability, granularity, and reusability of the data generated by the underlying IoT for smart cities. Essentially, the data lifecycle in a smart city is dependent on tightly coupled data management with cross-cutting layers of data security and privacy, and supporting infrastructure. Therefore, we further identify techniques employed for data security and privacy, and discuss the networking and computing technologies that enable smart cities. We highlight the achievements in realizing various aspects of smart cities, present the lessons learned, and identify limitations and research challenges.

Original languageEnglish (US)
Article number8003273
Pages (from-to)2456-2501
Number of pages46
JournalIEEE Communications Surveys and Tutorials
Volume19
Issue number4
DOIs
StatePublished - Oct 1 2017

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Keywords

  • Internet of Things (IoT)
  • Smart cities
  • cloud computing
  • data management
  • data security
  • network functions virtualization (NFV)
  • software-defined networking (SDN)

Fingerprint

Dive into the research topics of 'Smart Cities: A Survey on Data Management, Security, and Enabling Technologies'. Together they form a unique fingerprint.

Cite this