International Journal on Advanced Computer Theory and Engineering (IJACTE) ________________________________________________________________________ DATA EXTRACTION FROM WIRELESS SENSOR NETWORK WITH CLOUD COMPUTING 1 Athira.M.S, 2Madhu.N M.Tech,4th semester, Asst. Professor, CSE, AIT, Bangalore Email ID: athiraratheesh2009@gmail.com, Madhu.N@acharya.ac.in dependent on monitored environment. Based on the monitored environment, network size in WSN varies. For monitoring a small area, fewer nodes are required to form a network whereas the coverage of a very large area requires a huge number of sensor nodes. For monitoring large environment, there is limited communication between nodes due to obstructions into the environment, which in turn affects the overall network topology (or connectivity) [1]. All these limitations on sensor networks would probably impede the service performance and quality. Abstract: WSN have several applications in different domains.wsn enables the information gathering across the spectrum of endeavour including environmental monitoring, home automation, tracking, health care, business etc. But the gathered information is not used adequately because of the lack of expertise and storage for further use. to overcome this problem gathered data is transformed in to a valuable resource like cloud. a new framework is proposed for WSN integration with Cloud computing model, existing WSN will be connected to the proposed framework. This framework enhances the wireless sensor applications by integrating sensor networks with the cloud technology. The integration controller unit of this proposed framework integrates the sensor networks and cloud computing. The resultant system offers reliability, availability and extensibility. II. CLOUD COMPUTING Cloud Computing is a technology that uses the internet and central remote servers to maintain data and applications. It is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. I. INTRODUCTION Wireless sensor network is used in many fields. Sensors collect a huge amount of data but this data is not used adequately because of the lack of storage and expertise. To overcome this problem we integrate the wireless sensor networks with cloud technology. Cloud Computing is principally designed and promoted to be data centre centric and efficient interaction with the outside world is an area where improved solutions are being sought. WSN are designed to collect data in the real world [6]. There is a possible linkage between WSN and Cloud Computing and the eventual shift of data into the cloud and over time into the public domain. WSN architecture could be either centralized or distributed. In centralized architecture the central node is the weak point of the network. If it fails, whole network collapse. However, distributed architecture provides failure resistant sensor network. Wireless sensor networks design constraints are application specific and ________________________________________________________________________ ISSN (Print): 2319-2526, Volume -3, Issue -1, 2014 75 International Journal on Advanced Computer Theory and Engineering (IJACTE) ________________________________________________________________________ IBM report stated that "Cloud is a new consumption and deliver model for many IT-based services, in which the user sees only the service, and has no need to know anything about the technology or implementation" [2]. NIST classify the cloud computing as "Cloud computing is a model for enabling convenient, on demand network access to shared pool of configurable computing resources" [3]. The cloud computing have three architecture layers mainly Software-as-a-Service SaaS), Platform-asa-Service (PaaS) and Infrastructure-as-aService (IaaS). SaaS provides board market solutions where the vendor provides access to hardware and software products through portal interface [4].PaaS supplies all the resources required to build an applications and services completely from the internet without having to download or install the software. Paas include application design development, testing and deployment and hosting. AS. EN implements Kerberos in order to authenticate the user with AS. ACDU is used to enforce the policy rules. It consists of RBAC (Role Based Access Control) processor and policy storage. It communicates with ACEU through SS[16]. After successful authentication; user is given the access to the resources as constrained by the access policies. Now the user can send the data request. This request is forwarded to the Request Server (RS). RS will create a subscription on the basis of this request and forward this subscription to the Pub/Sub Broker. The pub/sub Broker compares each subscription with the published data event in the event queue with the event matcher. If Pub/Sub Broker finds any subscription match it will start retrieving data from the DPU and forward the data to the user via the RS and the Cloud thread. This research article presents a framework which integrates cloud computing and WSN. The objective is to facilitate the shift of data from WSN to cloud computing storage so that it may be further utilized in scientific and economic analysis. IaaS provides consumers with an opportunity to consume processing, storage, network, and other fundamental computing resources. Here the consumer is able to store data, deploy and run arbitrary software such as operating systems and applications[5]. The consumer does not need to control and manage the underlying infrastructure but has control over the operating system, applications, storage, and network components. The propose system suggests that sensor nodes and Integration Controller (lC) can interact through SOA. Sensor nodes are considered as service providers and sink nodes are consumers, they receive information through Ie. The sensor nodes are deployed into the application server as service description. It has location information and provides a service end point, a target namespace and a transport name. These components exchange messages in xml format. A Sensor-Cloud collects and processes information from several sensor networks, enables information sharing on big scale, and collaborates with the applications on cloud among users. It integrates several networks with a number of sensing applications and cloud computing platform by allowing applications to be crossdisciplinary that may span over multiple organizations. [15]. A. Access Control Enforcement Unit ACEU is used to authenticate the user and it is consists of EN and three servers i.e. AS, TGS and SS. The request received by EN is sent to AS. EN implements Kerberos in order to authenticate the user with AS. III. PROPOSED FRAME WORK OVERVIEW B. The major components of the framework are Data Processing Unit (DPU), Publisher/Subscriber Broker, Request Subscriber, Identity and Access Management Unit (lAMU)[18] and Data Repository (DR). The data that collected by the sensors are passed through a gateway to the DPU. The DPU that converts the data in to the storage format and store the data in to the data repository. DPU which will create a published data event and send the event to an event queue at the Pub/Sub Broker .Users will connect to the Cloud through the secured IAMU (Identity and Access Management Unit). This will provide both authentication and access control. The IAMU systems have two major components: Access Control Enforcement Unit (ACEU); and Access Control Decision Unit (ACDU). ACEU is used to authenticate the user and it consists of Edge Node and three servers i.e. Authentication Server, Ticket Granting Server and Service Server. The request received by EN is sent to Access Control Decision Unit ACDU is used to enforce the policy rules. It consists of RBAC processor and policy storage. It communicates with ACEU through SS. After successful authentication; user is given the access to the resources as constrained by the access policies. C. Communication flow between User and IAMU. The description of different messages those have been exchanged among different servers and edge node (EN) are left out of the scope of this poster due to the space constraint . ________________________________________________________________________ ISSN (Print): 2319-2526, Volume -3, Issue -1, 2014 76 International Journal on Advanced Computer Theory and Engineering (IJACTE) ________________________________________________________________________ Fig: 2 Sensor-Cloud Integration Framework IAMU includes Diffie-Hellman, Kerberos, Role Based Access Control and XML [16]. The main rationale of this model is first, to provide authentication between consumer and cloud provider. Second, to provide policy based access control over the cloud resources. Consumers directly communicate IAMU for authentication and access control. Access Control Enforcement Unit (ACEU) and Access Control Decision Unit (ACDU). Edge Node (EN) is used as replacement of kerberos. IAMU will authenticate the user and sends ACK if the authentication is successful. After successful login the user will send a service access request. Cloud will then send the request message to Request subscriber (RS). RS will unify the request and create a subscription on the basis of the request received from Cloud thread. Then the RS will send this subscription to the PUB/SUB Broker. DPU will continuously send index of the data to the PUB/SUB broker. This event can happen at any point. PUB/SUB broker will store all of the data indexes in its registry. Immediately after receiving a subscription request from RB, Pub/Sub Broker will start EM to find the matched published data for this particular subscription. If Pub/Sub Broker finds any subscription match it will start retrieving data from the DPU. Retrieved data will be forwarded to the user via the RS and the Cloud thread. Integration of WSN with Cloud Computing will provide benefits to organisations and the research community. Organisations will benefit by utilising Cloud storage and an optimised framework for processing, storage and retrieval of WSN generation data. The proposed WSN Cloud Computing framework will provide an optimal approach to user management, access control, storage and retrieval of distributed data. REFERENCES IV. FLOW OF INTERACTION AMONG FRAMEWORK COMPONENTS The user attempts to login by sending login information. Cloud thread will identify the service type and generate a corresponding request message. V. CONCLUSION It is actually based on Kerberos with slight modifications. It also implements Diffie-Hellman public key [20]. [1] F. Schepers. (2010) Security in Cloud Computing, IBM Tivoli Internet Security Systems. [Online]. Available: http://www.cpdpconferences.org/Resources/Sche pers.pdf. Last accessed: 10/11/2010. [2] P. McDaniel, and S. W. Smith, “Outlook: Cloud Computing with a Chance of Security Challenges and Improvements,” IEEE Computer and Reliability Societies 2010, pp. 77-80, Jan. 2010. [3] R. Marchany. (2010) VA Tech IT Security Cloud Computing Security Issues. [Online]. Available: http://www.security.vt.edu/Downloads/training/C ________________________________________________________________________ ISSN (Print): 2319-2526, Volume -3, Issue -1, 2014 77 International Journal on Advanced Computer Theory and Engineering (IJACTE) ________________________________________________________________________ loud%20Computing%20Security%20Issues.pdf. Last accessed:2/12/2010. [4] [5] [6] [7] P. Mell, and T. Grance. (2009) Effectively and Securely Using the Cloud Computing Paradigm (v0.25) NIST. [Online]. Available :http://csrc.nist.gov/groups/SNS/cloud computing/index.html. Last Accessed: 10/11/2010. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, A. Warfield, “Xen and the Art of Virtualization,” in Proc. of 19th ACM symposium on Operating Systems Principles, Bolton Landing, NY, USA, October 2003, pp. 164-177. (2010) Google App Engine. [Online]. Available: http://code.google. com/appengine/. Last Accessed: 15/07/2011 [7] (2007) Sales Force. [Online]. Available: http://www.salesforce.com /platform/. Last Accessed: 10/11/2010 A. Dubey, and D. Wagle. (2007) Delivering software as a service – The McKinsey Quarterly. [Online]. Available: http://www.mckinsey de/downloads/publikation/mck_on_bt/2007/mobt _12_Delivering_Software_as_a_Service.pdf Last Accessed: 15/08/2011 [8] M. Hassan, B. Song and E. Huh, “A Framework of Sensor-Cloud Integration Opportunities and Challenges,” in Proc. of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009, pp. 618626. [9] K. Lee and D. Hughes, “System architecture directions for tangible cloud computing,” in Proc. 1st ACIS International Symposium on Cryptography, and Network Security, Data Mining and Knowledge Discovery, E-Commerce and Its Applications, and Embedded Systems, CDEE 2010, 23 - 24 October, Qinhuangdao, Hebei, pp. 258-262. [10] H. B. Lim, Y.M. Teo, P. Mukherjee, V.T. Lam et al., “Sensor Grid: Integration of Wireless Sensor Networks and the Grid,” in Proc. of the30th IEEE Conf. on Local Computer Networks, IEEE Computer Society Press, Sydney, Australia, 2005, pp. 91-98 [11] (2010) CSIRO: Wireless Sensor Network: A New instrument for Observing Our World. [Online]. Available: http://www.csiro.au/science/Sensors-andnetworktechnologies.html. Last Access:12/07/2011 [12] (2010) CSIRO: Smart sensors monitoring water quality and catchment health. [Online]. Available: http://www.csiro.au/science/smartsensorsmonitoring- water-quality.html. Last Access: 12/07/2011 [13] K. Ahmed, Identity and Access Management in Cloud Computing, 1st ed., LAP Lambert Academic Publishing, Germany, April 2011, ISBN: 978-3-8443-3069-4. [14] D. Harkins and D. Carrel. (1998) The Internet Key Exchange (IKE), RFC 2409, IETF Network Working Group. [Online]. Available: http://www.ietf.org/rfc/rfc2409.txt. Last Access: 12/01/2011. [15] F. Ricciardi, MIT Kerberos Consortium. (2007) Kerberos Protocol Tutorial. [Online]. Available: http://www.kerberos.org/software/tutorial.html. Last Access: 22/12/2010. [16] (2001) SANS Institute InfoSec Reading Room. A Review of the Diffie- Hellman Algorithm and its Use in Secure Internet Protocols. [Online]. Available: http://www.sans.org/reading_room/whitepapers/v pns/revie w-diffie-hellman-algorithm-secureinternet-protocols_751. Last Access:12/01/2011. [17] E. Rescorla. (1999) Diffie-Hellman Key Agreement Method, RFC 2631, IETF Network Working Group. [Online]. Available: http://www.ietf.org/rfc/rfc2631.txt. [18] (2000) RSA Laboratories, RSA Laboratories’ FAQ About Today’s Cryptography, Version 4.1, RSA Security Inc., 2000. [Online]. Available: http://www.rsa.com/rsalabs/faq/index.html. Last Access: 12/12/2010. [19] L. Benjamin. (1997) Diffie-Hellman Method for Key Agreement. [Online]. Available: http://apocalypse.org/pub/u/seven/diffie.html. Last Access: 22/12/2010. ________________________________________________________________________ ISSN (Print): 2319-2526, Volume -3, Issue -1, 2014 78