WSN have several applications in different
domains.wsn enables the information gathering across the
spectrum of endeavor including environmental monitoring,
home automation, tracking, health care, business etc. But the
gathered information is not used adequately because of the
lack of expertise and storage for further use. to overcome this
problem gathered data is transformed in to a valuable resource
like cloud. a new framework is proposed for WSN integration
with Cloud computing model, existing WSN will be connected
to the proposed framework. This framework enhances the
wireless sensor applications by integrating sensor networks
with the cloud technology. The integration controller unit of
this proposed framework integrates the sensor networks and
cloud computing. The resultant system offers reliability,
availability and extensibility.
Published In : IJCAT Journal Volume 2, Issue 2
Date of Publication : March 2015
Pages : 62 - 65
Figures :02
Tables : --
Publication Link :Wireless Sensor Network in Data Extraction
Using Cloud Computing
Ujjwala Mandekar : M. Tech Scholar
1 RTMNU Nagpur, 2RTMNU Nagpur, 3 RGPV Bhopal, 4 JNTU Hydrabad, 5 RGPV Bhopal
Pooja Aher : M. Tech Scholar
1 RTMNU Nagpur, 2RTMNU Nagpur, 3 RGPV Bhopal, 4 JNTU Hydrabad, 5 RGPV Bhopal
Bharat Dhak : M. Tech Scholar
1 RTMNU Nagpur, 2RTMNU Nagpur, 3 RGPV Bhopal, 4 JNTU Hydrabad, 5 RGPV Bhopal
Mausami Sawarkar : M. Tech Scholar
1 RTMNU Nagpur, 2RTMNU Nagpur, 3 RGPV Bhopal, 4 JNTU Hydrabad, 5 RGPV Bhopal
Najim Sheikh : M. Tech Scholar
1 RTMNU Nagpur, 2RTMNU Nagpur, 3 RGPV Bhopal, 4 JNTU Hydrabad, 5 RGPV Bhopal
Wireless Sensor Network
Cloud Computing
Integration of WSN with Cloud Computing will provide
benefits to organizations and the research community.
Organizations will benefit by utilizing Cloud storage and
an optimized framework for processing, storage and
retrieval of WSN generation data. The proposed WSN
Cloud Computing framework will provide an optimal
approach to user management, access control, storage
and retrieval of distributed data.
[1] F. Schepers. (2010) Security in Cloud Computing,
IBM Tivoli Internet Security Systems. [Online].
Available:http://www.cpdpconferences.org/Resource
s/Sche pers.pdf. Last accessed: 10/11/2010.
[2] P. McDaniel, and S. W. Smith, “Outlook: Cloud
Computing with a Chance of Security Challenges
and Improvements,” IEEE Computer and Reliability
Societies 2010, pp. 77-80, Jan. 2010.
[3] R. Marchany. (2010) VA Tech IT Security Cloud
Computing Security Issues. [Online]. Available:
http://www.security.vt.edu/Downloads/training/C loud%20Computing%20Security%20Issues.pdf. Last
accessed:2/12/2010.
[4] P. Mell, and T. Grance. (2009) Effectively and
Securely Using the Cloud Computing Paradigm
(v0.25) NIST. [Online]. Available :
http://csrc.nist.gov/groups/SNS/cloud
computing/index.html. Last Accessed: 10/11/2010.
[5] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris,
A. Ho, R. Neugebauer, I. Pratt, A.
Warfield, “Xen and the Art of Virtualization,” in Proc.
of 19th ACM symposium on Operating Systems
Principles, Bolton Landing, NY, USA, October 2003,
pp. 164-177.
[6] (2010) Google App Engine. [Online]. Available:
http://code.google. com/appengine/. Last Accessed:
15/07/2011 [7] (2007) Sales Force. [Online].
Available: http://www.salesforce.com /platform/. Last
Accessed: 10/11/2010
[7] A. Dubey, and D. Wagle. (2007) Delivering software
as a service – The McKinsey Quarterly. [Online].
Available: http://www.mckinsey
de/downloads/publikation/mck_on_bt/2007/mobt
_12_Delivering_Software_as_a_Service.pdf Last
Accessed: 15/08/2011
[8] M. Hassan, B. Song and E. Huh, “A Framework
of Sensor-Cloud Integration Opportunities and
Challenges,” in Proc. of the 3rd International
Conference on Ubiquitous Information Management
and Communication, 2009, pp. 618-626
[11] (2010) CSIRO: Wireless Sensor Network: A New
instrument for Observing Our World. [Online].
Available: http://www.csiro.au/science/Sensors-andnetwork-
technologies.html. Last Access:12/07/2011
[12] (2010) CSIRO: Smart sensors monitoring water quality
and catchment health. [Online]. Available:
http://www.csiro.au/science/smart-sensorsmonitoringwater-
quality.html. Last Access: 12/07/2011
[13] K. Ahmed, Identity and Access Management in Cloud
Computing, 1st ed., LAP Lambert Academic
Publishing, Germany, April 2011, ISBN: 978-3-8443-
3069-4.
[14] D. Harkins and D. Carrel. (1998) The Internet
Key Exchange (IKE), RFC 2409, IETF Network
Working Group. [Online]. Available:
http://www.ietf.org/rfc/rfc2409.txt. Last Access:
12/01/2011.
[15] F. Ricciardi, MIT Kerberos Consortium. (2007)
Kerberos Protocol Tutorial. [Online]. Available:
http://www.kerberos.org/software/tutorial.html.
Last Access: 22/12/2010.
[16] (2001) SANS Institute InfoSec Reading Room. A
Review of the Diffie- Hellman Algorithm and its Use
in Secure Internet Protocols. [Online].
Available:http://www.sans.org/reading_room/whitepap
ers/v pns/revie w-diffie-hellman-algorithm-secureinternet-
protocols_751. Last Access:12/01/2011.
[9] K. Lee and D. Hughes, “System architecture
[17] E. Rescorla. (1999) Diffie-Hellman Key
directions for tangible cloud computing,” in Proc. 1st
ACIS International Symposium on Cryptography, and
Network Security, Data Mining and Knowledge
Discovery, E-Commerce and Its Applications, and
Embedded Systems, CDEE 2010, 23 - 24 October,
Qinhuangdao, Hebei, pp. 258-262.
[10] H. B. Lim, Y.M. Teo, P. Mukherjee, V.T. Lam et al.,
“Sensor Grid: Integration of Wireless Sensor
Networks and the Grid,” in Proc. of the30th IEEE
Conf. on Local Computer Networks, IEEE Computer
Society Press, Sydney, Australia, 2005, pp. 91-98
Agreement Method, RFC 2631, IETF Network
Working Group. [Online]. Available:
http://www.ietf.org/rfc/rfc2631.txt.
[18] (2000) RSA Laboratories, RSA Laboratories’ FAQ
About Today’s Cryptography, Version 4.1, RSA
Security Inc., 2000. [Online]. Available:
http://www.rsa.com/rsalabs/faq/index.html. Last
Access: 12/12/2010.
[19] L. Benjamin. (1997) Diffie-Hellman Method for
Key Agreement. [Online]. Available:
http://apocalypse.org/pub/u/seven/diffie.html. Last
Access: 22/12/2010