scholarly journals Implementation of Mobile-Cloudlet-Cloud Architecture for Face Recognition in Cloud Computing using Android Mobile

Author(s):  
Priya Bhatnagar
2019 ◽  
Vol 2019 (2) ◽  
pp. 80-90 ◽  
Author(s):  
Mugunthan S. R.

The fundamental advantage of the cloud environment is its instant scalability in rendering the service according to the various demands. The recent technological growth in the cloud computing makes it accessible to people from everywhere at any time. Multitudes of user utilizes the cloud platform for their various needs and store their complete details that are personnel as well as confidential in the cloud architecture. The storage of the confidential information makes the cloud architecture attractive to its hackers, who aim in misusing the confidential/secret information’s. The misuse of the services and the resources of the cloud architecture has become a common issue in the day to day usage due to the DDOS (distributed denial of service) attacks. The DDOS attacks are highly mature and continue to grow at a high speed making the detecting and the counter measures a challenging task. So the paper uses the soft computing based autonomous detection for the Low rate-DDOS attacks in the cloud architecture. The proposed method utilizes the hidden Markov Model for observing the flow in the network and the Random forest in classifying the detected attacks from the normal flow. The proffered method is evaluated to measure the performance improvement attained in terms of the Recall, Precision, specificity, accuracy and F-measure.


2019 ◽  
pp. 54-83
Author(s):  
Chiba Zouhair ◽  
Noreddine Abghour ◽  
Khalid Moussaid ◽  
Amina El Omri ◽  
Mohamed Rida

Security is a major challenge faced by cloud computing (CC) due to its open and distributed architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality, availability, and integrity of cloud resources and offered services. Intrusion detection system (IDS) has become the most commonly used component of computer system security and compliance practices that defends cloud environment from various kinds of threats and attacks. This chapter presents the cloud architecture, an overview of different intrusions in the cloud, the challenges and essential characteristics of cloud-based IDS (CIDS), and detection techniques used by CIDS and their types. Then, the authors analyze 24 pertinent CIDS with respect to their various types, positioning, detection time, and data source. The analysis also gives the strength of each system and limitations in order to evaluate whether they carry out the security requirements of CC environment or not.


The present data time targets digitizing data and executing effective, instinctive and easy to understand frameworks to unravel human life. Making a canny truck that deals with quick charging is a jump towards an advanced and totally computerized shopping knowledge. Buying thing in enormous supermarkets with a gigantic assortment of things is time taking procedure. It can be optimized through motorizing the charging framework. A shopping truck contains a versatile computational gadget (like raspberry pi) and a customized thing recognizable proof innovation (like the radio recurrence distinguishing proof innovation). Minute charging without long lines at counters and monitoring consumption constant are the two goals of this canny truck. This paper depends on building up a venture through the intend to lessen point in time used up on shopping of regular things and make the procedure less repetitive. Besides, it empowers the customers to use their point in time on other gainful and increasingly huge exercises.


Author(s):  
Bhawna Suri ◽  
Pijush Kanti Dutta Pramanik ◽  
Shweta Taneja

Background: The abundant use of personal vehicles has raised the challenge of parking the vehicle in a crowded place such as shopping malls. To help the driver with efficient and trouble-free parking, a smart and innovative parking assistance system is required. In addition to discussing the basics of smart parking, Internet of Things (IoT), Cloud computing, and Fog computing, this chapter proposes an IoT-based smart parking system for shopping malls. Methods: To process the IoT data, a hybrid Fog architecture is adopted, to reduce the latency, where the Fog nodes are connected across the hierarchy. The advantages of this auxiliary connection are discussed critically by comparing with other Fog architectures (hierarchical and P2P). An algorithm is defined to support the proposed architecture and is implemented on two real-world use-cases having requirements of identifying the nearest free car parking slot. The implementation is simulated for a single mall scenario as well as for a campus with multiple malls with parking areas spread across them. Results: The simulation results have proved that our proposed architecture shows lower latency as compared to the traditional smart parking systems that use Cloud architecture. Conclusion: The hybrid Fog architecture minimizes communication latency significantly. Hence, the proposed architecture can be suitably applied for other IoT-based real-time applications.


Author(s):  
Martin Henze ◽  
René Hummen ◽  
Roman Matzutt ◽  
Daniel Catrein ◽  
Klaus Wehrle

Clouds provide a platform for efficiently and flexibly aggregating, storing, and processing large amounts of data. Eventually, sensor networks will automatically collect such data. A particular challenge regarding sensor data in Clouds is the inherent sensitive nature of sensed information. For current Cloud platforms, the data owner loses control over her sensor data once it enters the Cloud. This imposes a major adoption barrier for bridging Cloud computing and sensor networks, which we address henceforth. After analyzing threats to sensor data in Clouds, the authors propose a Cloud architecture that enables end-to-end control over sensitive sensor data by the data owner. The authors introduce a well-defined entry point from the sensor network into the Cloud, which enforces end-to-end data protection, applies encryption and integrity protection, and grants data access. Additionally, the authors enforce strict isolation of services. The authors show the feasibility and scalability of their Cloud architecture using a prototype and measurements.


2018 ◽  
pp. 910-925
Author(s):  
Kashif Munir ◽  
Sellapan Palaniappan

Cloud computing is set of resources and services offered through the internet. Cloud services are delivered from data centers located throughout the world. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. In this chapter we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud environment. This chapter also discusses secure cloud architecture for organizations to strengthen the security.


Web Services ◽  
2019 ◽  
pp. 2115-2137
Author(s):  
Santosh Kumar ◽  
Debanjan Sadhya ◽  
Durgesh Singh ◽  
S. K. Singh

Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.


Sign in / Sign up

Export Citation Format

Share Document