A Survey on Sensor Cloud: Architecture and Applications
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2014, Vol 6, Issue 1
Abstract
Cloud Computing is a part of computer science and it enables providing Internet services to external customers via very scalable computing capacities. It is abstracted, controlled and high-scalable computer infrastructure which hosts applications for clients. Data services are located in shared, dynamic and scalable set of resources based on technologies of virtualization and scalable application environments. Wireless Sensor Networks can be used for collecting these data because they present distributed systems which consists of different sensor nodes. Sensors are spatially distributed and they are used for measuring different values, such as temperature, humidity, sound levels, pressure, environment variables etc.Many researchers have cited different types of technology in this context. But the application scenario are of important consideration while designing a specific protocol for Sensor network with reference to Cloud Computing. In this paper, we surveyed some typical applications of Sensor Network using Cloud computing as backbone. Since Cloud computing provides plenty of application, platforms and infrastructure over the Internet; it may combined with Sensor network in the application areas such as environmental monitoring, weather forecasting, transportation business, healthcare, military application etc. Bringing various WSNs deployed for different applications under one roof and looking it as a single virtual WSN entity through cloud computing infrastructure is novel.
Authors and Affiliations
Mr. K. Sindhanaiselvan , Ms. T. Mekala
Generating Test Cases Through Markov Models for Undertaking Comprehensive Testing of Embedded Systems
Cleanroom Software Engineering (CRSE) methodology has incorporated in it, the Markov models based on which the number of test cases that should be used for testing can be determined. Model based statistics are developed...
Homomorphic Encryption Scheme & Its Application for Mobile Agent Security
Mobile agents (MA) are autonomous software entities that are able to migrate across heterogeneous network execution environments. Protection of Mobile agents is one of the most difficult problems in the area of mobile ag...
Improving Accuracy in Decision Making for Detecting Intruders
Normal host based Intrusion detection system provides us some alerts of data integrity breach on the basis of policy violation and unauthorized access. There are some factors responsible if any employee of the ente...
A MediNet for staying connected in a Mobile Healthcare System
A mobile healthcare system is a network includes a collection of number of components that includes patients and their health-care providers. In this system it is important that the patient to remain connected at a...
Fake Access Point Detection and Prevention Techniques
There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks ar...