An Infrastructure for Wireless Sensor-Cloud Architecture via Virtualization

Author(s):  
S. P. Anandaraj ◽  
S. Poornima

A typical WSN contains spatially distributed sensors that can cooperatively monitor the environment conditions, like second, temperature, pressure, motion, vibration, pollution and so forth. WSN applications have been used in several important areas, such as health care, military, critical infrastructure monitoring, environment monitoring, and manufacturing. At the same time. WSN Have some issues like memory, energy, computation, communication, and scalability, efficient management. So, there is a need for a powerful and scalable high-performance computing and massive storage infrastructure for real-time processing and storing the WSN data as well as analysis (online and offline) of the processed information to extract events of interest. In this scenario, cloud computing is becoming a promising technology to provide a flexible stack of massive computing, storage, and software services in ascalable and virtualized manner at low cost. Therefore, sensor-cloud (i.e. an integrated version of WSN & cloud computing) infrastructure is becoming popular nowadays that can provide an open flexible, and reconfigurable platform for several monitoring and controlling applications.

Web Services ◽  
2019 ◽  
pp. 1393-1410
Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A. Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


2011 ◽  
Vol 128-129 ◽  
pp. 1480-1483
Author(s):  
Kai Song ◽  
Zhe Wang ◽  
Feng Ju Shen

The crop leaf disease spots image recognition technology has a great significance in identifying diseases and in effective spraying of pesticides to liminate diseases. We researched and designed the portable leaf disease spots image acquisition system since current PC-based processing system is high cost and lack of flexibility and real-timing, This system uses a high-performance 32-bit DSP chip based DM642 as its main processor, and also uses ultra-low power consumption and ultra-small size video decoder chips, large-capacity memories and high-performance communicator interfaces. As a result of the reasonable design of hardware architecture, this system realized leaf disease spots image features collecting and processing ,video transmitting, and achieved strong real-time processing capability, easy operation, low cost, anti-interference ability and other characteristics. The system prototype works well, and meets the design requirements.


2011 ◽  
Vol 121-126 ◽  
pp. 4023-4027 ◽  
Author(s):  
Guang Ming Li ◽  
Wen Hua Zeng ◽  
Jian Feng Zhao ◽  
Min Liu

The implementation platforms of parallel genetic algorithms (PGAs) include high performance computer, cluster and Grid. Contrast with the traditional platform, a Master-slave PGA based on MapReduce (MMRPGA) of cloud computing platform was proposed. Cloud computing is a new computer platform, suites for larger-scale computing and is low cost. At first, describes the design of MMRPGA, in which the whole evolution is controlled by Master and the fitness computing is assigned to Slaves; then deduces the theoretical speed-up of MMRPGA; at last, implements MMRPGA on Hadoop and compares the speed-up with traditional genetic algorithm, the experiment result shows MMRPGA can achieve slightly lower linear speed-up with Mapper’s number.


2014 ◽  
pp. 23-29
Author(s):  
Fatma H. Elfouly ◽  
Mohamed I. Mahmoud ◽  
Moawad I. M. Dessouky ◽  
Salah Deyab

Recently, the Field Programmable Gate Array (FPGA) technology offers the potential of designing high performance systems at low cost. The discrete wavelet transform has gained the reputation of being a very effective signal analysis tool for many practical applications. However, due to its computation-intensive nature, current implementation of the transform falls short of meeting real-time processing requirements of most application. The objectives of this paper are implement the Haar and Daubechies wavelets using FPGA technology. In addition, the comparison between the Haar and Daubechies wavelets is investigated. The Bit Error Rat (BER) between the input audio signal and the reconstructed output signal for each wavelet is calculated. It is seen that the BER using Daubechies wavelet techniques is less than Haar wavelet. The design procedure has been explained and designed using the stat-of-art Electronic Design Automation (EDA) tools for system design on FPGA. Simulation, synthesis and implementation on the FPGA target technology has been carried out.


2016 ◽  
pp. 2402-2418
Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


2012 ◽  
Vol 8 (4) ◽  
pp. 504946 ◽  
Author(s):  
Niamat Ullah ◽  
M. Sanaullah Chowdhury ◽  
Mosaddique Al Ameen ◽  
Kyung Sup Kwak

Critical infrastructure monitoring applications are rapidly increasing. Application requirements include reliable data transfer, energy efficiency, and long deployment lifetime. These applications must also be able to operate in an extremely low-cost communication environment in order to be attractive to potential users. A low rate wireless personal area network can help control and manage the operations of such applications. In this paper, we present a medium access control (MAC) protocol for low-energy critical infrastructure monitoring (LECIM) applications. The proposed MAC protocol is based on a framed slotted aloha multiple access schemes. For downlink communication, we use a wakeup radio approach to avoid complex bookkeeping associated with the traditional MAC protocols. Analytical expressions for power consumption and delay are derived to analyze and compare the performance of our proposed protocol with the existing well-known T-MAC, B-MAC, X-MAC, ZigBee, and WiseMAC protocols. It is shown that our proposed protocol outperforms all the other protocols in terms of power consumption and delay.


Author(s):  
Abirami. S ◽  
Shanmuga Priya. P

Cloud computing associate the computing and storage resources controlled by different operating systems to make available services such as large-scaled data storage and high performance computing to users. The benefits of low-cost, negligible management (from a user's perspective), and greater flexibility come with increased security concerns is one of the most crucial aspects among those prohibiting the wide-spread adoption of cloud computing. The data outsourced to a public cloud must need to be secured. This work gives Division and Replication of Data (DROPs) inside the Cloud for Optimal Performance and Security that judicially fragments user files into portions and replicates them at strategic places in the cloud. The division of a files into fragments is achieved based on a given consumer standards such that the individual fragments do not comprise any meaningful facts. The node separation is ensured by the means of the Grid Topology algorithm. To further improve the retrieval time, replicate fragments over the nodes that generate the highest read/write requests. The data encrypted using AES encryption algorithm. Duplication checking is implementing to provide efficient storage and time based access control for secure file access system.


2019 ◽  
Vol 17 (2) ◽  
pp. 225-232 ◽  
Author(s):  
Anju Shukla ◽  
Shishir Kumar ◽  
Harikesh Singh

Cloud computing consists group of heterogeneous resources scattered around the world connected through the network. Since high performance computing is strongly interlinked with geographically distributed service to interact with each other in wide area network, Cloud computing makes the architecture consistent, low-cost, and well-suited with concurrent services. This paper presents a fault tolerance load balancing technique based on resource load and fault index value. The proposed technique works in two phases: resource selection and task execution. The resource selection phase selects the suitable resource for task execution. A resource with least resource load and fault index value is selected for task execution. Further task execution phase sets checkpoints at various intervals for saving the task state periodically. The checkpoints are set at various intervals based on resource fault index. When a task is executed on a resource, fault index value of selected resource is updated accordingly. This reduces the checkpoint overhead by avoiding unnecessary placements of checkpoints. The proposed model is validated on CloudSim and provides improved performance in terms of response time, makespan, throughput and checkpoint overhead in comparison to other state-of-the-art methods.


2017 ◽  
Vol 5 (4RACSIT) ◽  
pp. 76-80
Author(s):  
Madhumala R B ◽  
Harshavardhan Tiwari

The new developments in the field of information technology offered the people enjoyment, comforts and convenience. Cloud computing is one of the latest developments in the IT industry also known as on-demand computing. It provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructures. It is the application provided in the form of service over the internet and system hardware in the data centers that gives these services. This technology has the capacity to admittance a common collection of resources on request. It is proving extremely striking to cash-strapped IT departments that are wanted to deliver better services under pressure. When this cloud is made available for the general customer on pay per use basis, then it is called public cloud. When customer develops their own applications and run their own internal infrastructure then is called private cloud. Integration and consolidation of public and private cloud is called hybrid cloud.


2020 ◽  
Author(s):  
Ihsan Ali

<div>In recent years, Wireless Sensor Networks (WSNs) technologies are used in many important</div><div>areas, including weather forecasting, security, environmental monitoring, health care, and industry.</div><div>Nonetheless, due to the constraints of WSNs in terms of energy, processing, connectivity, computation and</div><div>data integrity. An important issue in this research field is the efficient management of the large number</div><div>of WSN’s data. Therefore, there is a need for strong and scalable high-performance computing and large</div><div>storage infrastructure for real-time processing and storage of WSN’s data. This article attempts to discuss</div><div>data collection methods in WSNs, sensor cloud, and IoT. Also, in this context, a general overview of</div><div>WSNs and sensor cloud platforms, including their definitions, architectures, and applications are given.</div><div>We investigate, highlight and report recent advances in data collection technology by categorizing and</div><div>classifying data collection methods in WSNs, sensor cloud, IoT and developing a taxonomy based on</div><div>these classifications. Furthermore, the analysis and synthesis of existing works in this research domain</div><div>is highlighted. The identification of key research challenges for future work and use case in this research</div><div>domain were also highlighted and discussed.</div>


Sign in / Sign up

Export Citation Format

Share Document