Wireless Sensor Network in Data Extraction Using Cloud Computing  
  Authors : Ujjwala Mandekar; Pooja Aher; Bharat Dhak; Mausami Sawarkar; Najim Sheikh

 

WSN have several applications in different domains.wsn enables the information gathering across the spectrum of endeavor including environmental monitoring, home automation, tracking, health care, business etc. But the gathered information is not used adequately because of the lack of expertise and storage for further use. to overcome this problem gathered data is transformed in to a valuable resource like cloud. a new framework is proposed for WSN integration with Cloud computing model, existing WSN will be connected to the proposed framework. This framework enhances the wireless sensor applications by integrating sensor networks with the cloud technology. The integration controller unit of this proposed framework integrates the sensor networks and cloud computing. The resultant system offers reliability, availability and extensibility.

 

Published In : IJCAT Journal Volume 2, Issue 2

Date of Publication : March 2015

Pages : 62 - 65

Figures :02

Tables : --

Publication Link :Wireless Sensor Network in Data Extraction Using Cloud Computing

 

 

 

Ujjwala Mandekar : M. Tech Scholar 1 RTMNU Nagpur, 2RTMNU Nagpur, 3 RGPV Bhopal, 4 JNTU Hydrabad, 5 RGPV Bhopal

Pooja Aher : M. Tech Scholar 1 RTMNU Nagpur, 2RTMNU Nagpur, 3 RGPV Bhopal, 4 JNTU Hydrabad, 5 RGPV Bhopal

Bharat Dhak : M. Tech Scholar 1 RTMNU Nagpur, 2RTMNU Nagpur, 3 RGPV Bhopal, 4 JNTU Hydrabad, 5 RGPV Bhopal

Mausami Sawarkar : M. Tech Scholar 1 RTMNU Nagpur, 2RTMNU Nagpur, 3 RGPV Bhopal, 4 JNTU Hydrabad, 5 RGPV Bhopal

Najim Sheikh : M. Tech Scholar 1 RTMNU Nagpur, 2RTMNU Nagpur, 3 RGPV Bhopal, 4 JNTU Hydrabad, 5 RGPV Bhopal

 

 

 

 

 

 

 

Wireless Sensor Network

Cloud Computing

Integration of WSN with Cloud Computing will provide benefits to organizations and the research community. Organizations will benefit by utilizing Cloud storage and an optimized framework for processing, storage and retrieval of WSN generation data. The proposed WSN Cloud Computing framework will provide an optimal approach to user management, access control, storage and retrieval of distributed data.

 

 

 

 

 

 

 

 

 

[1] F. Schepers. (2010) Security in Cloud Computing, IBM Tivoli Internet Security Systems. [Online]. Available:http://www.cpdpconferences.org/Resource s/Sche pers.pdf. Last accessed: 10/11/2010. [2] P. McDaniel, and S. W. Smith, “Outlook: Cloud Computing with a Chance of Security Challenges and Improvements,” IEEE Computer and Reliability Societies 2010, pp. 77-80, Jan. 2010. [3] R. Marchany. (2010) VA Tech IT Security Cloud Computing Security Issues. [Online]. Available: http://www.security.vt.edu/Downloads/training/C loud%20Computing%20Security%20Issues.pdf. Last accessed:2/12/2010. [4] P. Mell, and T. Grance. (2009) Effectively and Securely Using the Cloud Computing Paradigm (v0.25) NIST. [Online]. Available : http://csrc.nist.gov/groups/SNS/cloud computing/index.html. Last Accessed: 10/11/2010. [5] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, A. Warfield, “Xen and the Art of Virtualization,” in Proc. of 19th ACM symposium on Operating Systems Principles, Bolton Landing, NY, USA, October 2003, pp. 164-177. [6] (2010) Google App Engine. [Online]. Available: http://code.google. com/appengine/. Last Accessed: 15/07/2011 [7] (2007) Sales Force. [Online]. Available: http://www.salesforce.com /platform/. Last Accessed: 10/11/2010 [7] A. Dubey, and D. Wagle. (2007) Delivering software as a service – The McKinsey Quarterly. [Online]. Available: http://www.mckinsey de/downloads/publikation/mck_on_bt/2007/mobt _12_Delivering_Software_as_a_Service.pdf Last Accessed: 15/08/2011 [8] M. Hassan, B. Song and E. Huh, “A Framework of Sensor-Cloud Integration Opportunities and Challenges,” in Proc. of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009, pp. 618-626 [11] (2010) CSIRO: Wireless Sensor Network: A New instrument for Observing Our World. [Online]. Available: http://www.csiro.au/science/Sensors-andnetwork- technologies.html. Last Access:12/07/2011 [12] (2010) CSIRO: Smart sensors monitoring water quality and catchment health. [Online]. Available: http://www.csiro.au/science/smart-sensorsmonitoringwater- quality.html. Last Access: 12/07/2011 [13] K. Ahmed, Identity and Access Management in Cloud Computing, 1st ed., LAP Lambert Academic Publishing, Germany, April 2011, ISBN: 978-3-8443- 3069-4. [14] D. Harkins and D. Carrel. (1998) The Internet Key Exchange (IKE), RFC 2409, IETF Network Working Group. [Online]. Available: http://www.ietf.org/rfc/rfc2409.txt. Last Access: 12/01/2011. [15] F. Ricciardi, MIT Kerberos Consortium. (2007) Kerberos Protocol Tutorial. [Online]. Available: http://www.kerberos.org/software/tutorial.html. Last Access: 22/12/2010. [16] (2001) SANS Institute InfoSec Reading Room. A Review of the Diffie- Hellman Algorithm and its Use in Secure Internet Protocols. [Online]. Available:http://www.sans.org/reading_room/whitepap ers/v pns/revie w-diffie-hellman-algorithm-secureinternet- protocols_751. Last Access:12/01/2011. [9] K. Lee and D. Hughes, “System architecture [17] E. Rescorla. (1999) Diffie-Hellman Key directions for tangible cloud computing,” in Proc. 1st ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, CDEE 2010, 23 - 24 October, Qinhuangdao, Hebei, pp. 258-262. [10] H. B. Lim, Y.M. Teo, P. Mukherjee, V.T. Lam et al., “Sensor Grid: Integration of Wireless Sensor Networks and the Grid,” in Proc. of the30th IEEE Conf. on Local Computer Networks, IEEE Computer Society Press, Sydney, Australia, 2005, pp. 91-98 Agreement Method, RFC 2631, IETF Network Working Group. [Online]. Available: http://www.ietf.org/rfc/rfc2631.txt. [18] (2000) RSA Laboratories, RSA Laboratories’ FAQ About Today’s Cryptography, Version 4.1, RSA Security Inc., 2000. [Online]. Available: http://www.rsa.com/rsalabs/faq/index.html. Last Access: 12/12/2010. [19] L. Benjamin. (1997) Diffie-Hellman Method for Key Agreement. [Online]. Available: http://apocalypse.org/pub/u/seven/diffie.html. Last Access: 22/12/2010