International Journal of Emerging Technology & Research Volume 1, Issue 4, May-June, 2014 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 Useful Pervasive Computing Techniques for Human Life Kaviya priya.R1, Venkata Subramanian.D2 1, 2 Department of Information Technology, Saveetha School of Engineering, Saveetha University, Chennai Abstract-There are various computing methods in our modern world out of which Pervasive or Persistent computing enables everyday objects to become smarter and interactive. Pervasive computing will revolutionize the way human network with the world around them. We had included about the challenges faced by ubiquitous computing technique and ways to solve the challenges and abundant computing on basis of cloud computing. We had included about new innovations based on pervasive computing, its interactions in human world and its future.We had also included about Sensor networks which are circulated across locations which would help pervasive computing platform to become way better. We had included a new innovative idea of handling money using electrical digital system which reduces paper usage for printing notes. General Terms:Pervasive Computing, Ubiquitous Computing Keywords:Pervasive Computing, Abundant Computing, Upcoming computing environments, cloud, challenges 1. INTRODUCTION There are various computing techniques in our modern world such as Personnel computing, Autonomic computing, mobile computing, Cloud computing, Green computing, Grid computing, Supercomputing, Parallel computing etc., out of which Pervasive or Abundant computing enables everyday objects to become smarter and interactive such as refrigerators that can create grocery lists, buildings that can adjust temperature and light according to the weather. Pervasive computing Will therefore transform the way human interact with the world around them. Pervasive computing is the integration of the carnal world to the information world. Pervasive Computing describes the ways in which current technological models, based upon three base designs: smart (mobile, wireless, service) devices, smart environments (of embedded system devices) and smart interaction (between devices), relate to and support a © Copyright reserved by IJETR computing vision for a greater range of computer devices, used in a greater range of (human, ICT and physical) environments and activitiesSensors are one of the key things that would help pervasive computing technique to interconnect easily and faster. Sensor networks simplify enterprises to sense and monitor a spectacle remotely via sensor nodes and send data into the physical world. Organizations are increasingly assuming smart environments. These include Smart grids, Smart power systems, Smart housing, Smart transportation systems, Smart retail store etc. Smart environments collect sensor data from the real world, which comes from multiple sensors, which are distributed across positions which would help pervasive computing platform to become way better.Cloud computing will help taking the ubiquitous computing to the next level with its ability to offer computing power anywhere, at any time and on any device. Cloud computing has advantages such as lower costs, faster time to market, high degree of elasticity, unlimited organization growth capability and low incremental cost. Creating a cloud based system for communication of all sensors in home appliances would help to reduce human work; time consumed, electricity intake, and helps to create a smart environment. The first part of our objective is to understand about pervasive computing and to analyse the way it is implemented through cloud network. The core and second objective of our research is to find out the tasks faced by pervasive computing, ways to solve it and creating a smart environment around us that could help people to decrease their work and energy consumed. (Impact Factor: 0.997) 771 International Journal of Emerging Technology & Research Volume 1, Issue 4, May-June, 2014 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 on sharing of resources to achieve coherence and economies of scale. Some of the typical requirements for using cloud computing include applications that require storage and archiving, social community based applications as well as non-business critical applications. Contemplate this scenario- a company is planning to launch a new online product worldwide in 10 days. The company needs to make funds in time; effort and money to facilitate hosting and has to look into performance assurance, hardware, software, round the clock support and much more. Even the people need to go to the centres where the product is being displayed and get the information. Such scenarios are ideal for assuming cloud computing based solutions, which would enable the creativity to pay only for the server resources, applications and bandwidth that they use. Using cloud procedure the company can presentation the product officially on web so that it would be easy for people to get the information about the creation directly from internet. 2. CLOUD BASED PERVASIVE COMPUTING Optimization of cost is pushing organizations to look at different models for acquiring IT related services. There is an ever increasing need for bringing in Innovative solutions with reduced time to market for sending. Enterprises can optimize costs by leveraging and consuming just in time computing and storage via cloud based computing platforms and services. Cloud computing will help take abundant computing to the next level with its ability to offer computing power anywhere, at any time and on any device. Cloud computing provides a immense abstracted IT infrastructure, dynamic allocation, scaling, movement of applications as well as commoditization of organization. Cloud based applications are delivered over the internet and the pricing is based on consumption. 1.1 Challenges And Solutions Cloud computing is computing that involves a large number of computers linked through a communication network such as the Internet. Cloud computing trusts © Copyright reserved by IJETR Most commonly measured threats in cloud computing Focus on security of information while on the cloud. The main concerns in this area include the isolation of information stored on the cloud, the execution of correct code on the cloud, and accessibility of information stored on the cloud. Encryption is one possible solution to this problem, but for cloud applications to apply the data that is stored, they must have an unencrypted type available which is very complicated. Availability of services and data is another problem that can arise from the inaccessibility of the cloud. A common solution Of replication is possible (both by the clients and the clouds), But the result can lead to more problems of data management Data manipulation is another problem that can rise when Transporting data to and from the cloud. Because of all this errors in cloud computing we are going for pervasive computing. Migration to Pervasive Systems During migration of data to pervasive systems, data is (Impact Factor: 0.997) 772 International Journal of Emerging Technology & Research Volume 1, Issue 4, May-June, 2014 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 Vulnerable to attacks such as one might expect when communicating data: Rejection of service of data transmitted over the channel, Data manipulation and eavesdropping. One solution is to use multi-homed devices. It does not prevent an attacker from preventing the user from accessing needed data, but it can greatly increase the cost. The attacker either has to launch the DoS attack closer in the network to the cloud (which likely has greater bandwidth and other resources) or the attacker must launch an attack on the entire communication channel that the pervasive system can use to contact the cloud. 4. SMART ENVIRONMENT – A REAL LIFE OUTLOOK 3. NETWORK BASED PERVASIVE COMPUTING Sensor networks include a network of nodes that can sense and may control the environment therefore allowing interaction between people or computers and the adjacent environment. The building blocks of the things used to communicate nature of objects and things are, adjustable sensor networks comprising of radio tags which are context-aware, can sense, monitor and report events. Sensor networks are wireless, self-powering, walkable as well as self-organizing. Improved decision making through greater information flow from distributed locations using sensor networks, better observing and improved decision making through enhanced information flow from circulated locations using sensor networks are some of the key enterprise challenges and opportunities after leveraging intelligent technologies. a. FLIP SIDES People, in this modern world are more concerned about the technical improvements that would help them to decrease their physical work and increase mental work. Think of a condition when a man is very tired coming from his job or a man had a leg injury and was made to sit on his sofa. If there is any other person in the house, the man wouldn’t have to move for any work. But if no one is there to support and washing machine is on! Car door was not locked! TV remote is far! Also, using separate remotes for different things would take in more E-waste because of using separate batteries for each remotes, separate sensors for each remote etc., are some of the present scenario flip sides. To stunned these situations, we are going to create a smart environment, that would help people in reducing man power, e-waste, money waste and time. © Copyright reserved by IJETR As abundant computing is one person to many computers, the same methodology is used in creating this smart network. The idea of this origination is to reduce the human efforts. This concept implements a remote television that access like a mobile with services of notification like a normal android mobile. The person’s mobile phone is the main computer, which is going to connect with all the sensors inside the house. We have to connect every sensor in the machines and relation them with each other. We are keeping two major source points in this smart network. First is mobile phone and second is television. The person sitting from his or her sofa could see the status of washing machine, television and other things using his mobile phone. Occasionally we would have doubt whether the house door is locked or not. By connecting the house door with a sensor to the mobile phone, it would help to fetch the rank whether the door is locked or not as a notification. (Impact Factor: 0.997) 773 International Journal of Emerging Technology & Research Volume 1, Issue 4, May-June, 2014 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 By this Smart system we could create a attractive atmosphere where in the real world objects can be brought into the scientific world that would help to connect science and humans with common understandings. This method would help disabled persons to know the status of machines running around them through their mobiles. A deaf person could not hear the sound of alarm that rings after washing machine gets over. Thus by keeping in vibration mode, he could get the notification in his mobile. Also when the person is watching television without audio also, he can see the notice in television. The following are some of the key excellence benefits of using smart networks: Decrease human work Reduce time and money ingesting Accurate and protected Reduce e-waste Help restricted 5. FUTURE OF SMART NETWORKS Have you noticed any household empty of a Mobile phone today? Isn’t it an unusual sight? Recent International telecommunications union (ITU) Survey bangs state that there are more than a hundred countries throughout the world where the number of cell phones surpass the countries’ populations. It seems as though we can’t go anywhere without seeing a sea of people using cell phones. We’re worked in at all times. Would it not be a delight if you can carry out a thousand transactions at your relief with a few clicks on your Mobile phone? You don’t have Internet connections or ATM’s or POS possibilities wherever you go. But you do have a mobile connection. The biggest value of mobile finance will be that you will get to exercise more control of your money and it can extremely cut down the effective cost of your transactions in the longer run. Mobile Finance is to be established as an application that will run on various mobile platforms , is capable of being opened with simple text messages and will store the funds of mobile users in their Mobile Finance explanations to be used as and when required by the user by simple transfer of funds to the sellers Mobile Finance account with proper confirmation supported by multiple levels of security like using a password and finger print for verification and using a secured Payment gateway with an SSL connection for security . Mobile connectivity is vast and this should make Mobile finance very successful. The software used will be made with a singular idea which ensures that the money in mobile is safe. The money can be taken by a person only from a unique mobile whose IMEI number will be listed in the database. The money can only be retrieved by the person in his own mobile. Question: What if the individual lost his mobile or the mobile is damaged and he is going to change the mobile? The person will have his IMEI number listed in his name in main office like a bank. He could go there and block his old IMEI number if lost or repeat his IMEI number if a new mobile is bought. Also, the person who steals the mobile cannot easily take the money as there are two security structures with one finger print scanner and other with passcode. Also, the person who is receiving the money should enter the key arrived by the person who is transfer the money. This is like a normal Bluetooth share. NFC is another technological development which is known as near field message, which is known for its high level safety. By using the NFC we can shake two mobiles and hit each other to communicate them to a third party network by which money can be easily transferred. The person using mobile money contract could select the way he wants to transfer money in his settings. One is either by both mobiles incoming the passcode or the other is by using NFC technique. With this, Let us now look at the concept of Mobile Finance. Mobile Finance is a notion that will allow Mobile users to carry out a series of financial dealings through a mobile device such as a Mobile phone or Personal Digital assistant by simple transfer of assets from the buyer’s mobile account to that of the seller not necessarily involving financial organizations. © Copyright reserved by IJETR (Impact Factor: 0.997) 774 International Journal of Emerging Technology & Research Volume 1, Issue 4, May-June, 2014 6. (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 CONCLUSION Pervasive computing will be a dynamic source of interesting research problems in computer systems for many years to come. As conversed, pervasive computing and cloud computing linked together would help human beings to travel up to next level. Cloud computing has rewards such as lower costs, faster time to market, high degree of elasticity and low incremental cost. Internet facilities improve the work of every company. By using smart environment, people could have lots of benefits. It takes simple things to make this arrangement. As normally every creation is made, we are adding a sensor to it. Connecting sensors to mobile and television would help humans to turn out to be fast and efficient. Mobile money transactions in every field around us would help to reduce lots of paper waste. Currencies have lots of chance of getting damaged. By using mobile money transactions, we could increase the amount of trees used and increase a far better green environment. center for The Business of Government e- Government Series, 2009. [5] K. Jeffery, B. Neidecker-Lutz, ―The Future of Cloud Computing. Opportunities for European Cloud Computing Beyond 2010‖, Expert Group Report, European Commission, January 2010. [6] T. Dillon, C. Wu, and E. Chang, ―Cloud Computing: Issues and Challenges‖, in 24th IEEE International Conference on Advanced Information Networking and Applications, page no. 27-33, 2010. [7] “Pervasive Computing: Vision and Challenges” by Prof. M. Satyanarayanan, Carnegie Mellon University, IEEE Personal Communications, 2001[Possible mistakes and omissions are all mine. – LTL] [8] http://www.media.mit.edu/ [9] http://cooltown.hp.com/ [10] http://portolano.cs.washington.edu/ [11] http://computer.org/pervasive [12] http://www.comp.lancs.ac.uk/computing/research/ mpg/most/ [13] www.wikipedia.com [14] Ubiquitous computing “spring 2008” by Ishitha Trivedi [15] A. Anand, A. Gember, A. Akella, and V. Sekar, “Tracking semantic relationships for effective data management in home networks,” in Proceedings of the 2010 ACM SIGCOMM workshop on Home networks [16] Y. Luo, K. T. Lam, and C.-L. Wang, “Path-analytic distributed object prefetching,” Parallel Architectures, Algorithms, and Networks, International Symposium on, vol. 0, pp. 98–103, 2009. [17] N. J. Tuah, M. Kumar, and S. Venkatesh, “Resource-aware speculative prefetching in wireless networks,” Wirel. Netw., vol. 9, pp. 61–72, January 2003. [Online]. Available: http://dx.doi.org/10.1023/A:1020829124143 [18] H. Shen, M. Kumar, S. K. Das, and Z. Wang, REFERENCES [1] San Murugesan, “Harnessing Green IT: Principles and Practices,” IEEE IT Professional, January– February 2008, pp 24-33. [2] D. C. Wyld, Moving to the Cloud: An Introduction to Cloud Computing in Government,‖ IBM center for The Business of Government e- Government Series, 2009. [3] D. Carrera, M. Steinder, I. Whalley, J. Torres and E. Ayguade, Managing SLAs of heterogeneous workloads using dynamic application placement,‖ HPDC '08, Proceedings of the 17th international symposium on High performance distributed computing, New York, USA, 2008. [4] D. C. Wyld, ―Moving to the Cloud: An Introduction to Cloud Computing in Government,‖ IBM © Copyright reserved by IJETR “Energy-efficient data caching and prefetching for mobile devices based on utility,” Mob.Netw. Appl., vol. 10, pp. 475–486, August 2005. [19] Nahrsted, K., Chu, H., Narayan, S.QoS-aware Resource Management for Distributed Multimedia Applications. Journal on High-Speed Networking 7(3/4), 1998. [20] Weiser, M, Brown, J.S. The Coming Age of Calm Technology. In Denning, P.J., Metcalfe, R.M. (editors), Beyond Calculation: The Next Fifty Years of Computing. Copernicus, 1998. (Impact Factor: 0.997) 775