International Journal on Advanced Computer Theory and

advertisement
International Journal on Advanced Computer Theory and Engineering (IJACTE)
________________________________________________________________________
DATA EXTRACTION FROM WIRELESS SENSOR NETWORK
WITH CLOUD COMPUTING
1
Athira.M.S, 2Madhu.N
M.Tech,4th semester, Asst. Professor,
CSE, AIT, Bangalore
Email ID: athiraratheesh2009@gmail.com, Madhu.N@acharya.ac.in
dependent on monitored environment. Based on the
monitored environment, network size in WSN varies.
For monitoring a small area, fewer nodes are required to
form a network whereas the coverage of a very large
area requires a huge number of sensor nodes. For
monitoring large environment, there is limited
communication between nodes due to obstructions into
the environment, which in turn affects the overall
network topology (or connectivity) [1]. All these
limitations on sensor networks would probably impede
the service performance and quality.
Abstract: WSN have several applications in different
domains.wsn enables the information gathering across the
spectrum of endeavour including environmental
monitoring, home automation, tracking, health care,
business etc. But the gathered information is not used
adequately because of the lack of expertise and storage for
further use. to overcome this problem gathered data is
transformed in to a valuable resource like cloud. a new
framework is proposed for WSN integration with Cloud
computing model, existing WSN will be connected to the
proposed framework. This framework enhances the
wireless sensor applications by integrating sensor networks
with the cloud technology. The integration controller unit
of this proposed framework integrates the sensor networks
and cloud computing. The resultant system offers
reliability, availability and extensibility.
II. CLOUD COMPUTING
Cloud Computing is a technology that uses the internet
and central remote servers to maintain data and
applications. It is a type of computing that relies on
sharing computing resources rather than having local
servers or personal devices to handle applications.
I. INTRODUCTION
Wireless sensor network is used in many fields. Sensors
collect a huge amount of data but this data is not used
adequately because of the lack of storage and expertise.
To overcome this problem we integrate the wireless
sensor networks with cloud technology. Cloud
Computing is principally designed and promoted to be
data centre centric and efficient interaction with the
outside world is an area where improved solutions are
being sought. WSN are designed to collect data in the
real world [6]. There is a possible linkage between WSN
and Cloud Computing and the eventual shift of data into
the cloud and over time into the public domain.
WSN architecture could be either centralized or
distributed. In centralized architecture the central node is
the weak point of the network. If it fails, whole network
collapse. However, distributed architecture provides
failure resistant sensor network. Wireless sensor
networks design constraints are application specific and
________________________________________________________________________
ISSN (Print): 2319-2526, Volume -3, Issue -1, 2014
75
International Journal on Advanced Computer Theory and Engineering (IJACTE)
________________________________________________________________________
IBM report stated that "Cloud is a new consumption and
deliver model for many IT-based services, in which the
user sees only the service, and has no need to know
anything about the technology or implementation" [2].
NIST classify the cloud computing as "Cloud computing
is a model for enabling convenient, on demand network
access to shared pool of configurable computing
resources" [3]. The cloud computing have three
architecture layers mainly Software-as-a-Service SaaS),
Platform-asa-Service (PaaS) and Infrastructure-as-aService (IaaS). SaaS provides board market solutions
where the vendor provides access to hardware and
software products through portal interface [4].PaaS
supplies all the resources required to build an
applications and services completely from the internet
without having to download or install the software. Paas
include application design development, testing and
deployment and hosting.
AS. EN implements Kerberos in order to authenticate
the user with AS. ACDU is used to enforce the policy
rules. It consists of RBAC (Role Based Access Control)
processor and policy storage. It communicates with
ACEU through SS[16]. After successful authentication;
user is given the access to the resources as constrained
by the access policies. Now the user can send the data
request. This request is forwarded to the Request Server
(RS). RS will create a subscription on the basis of this
request and forward this subscription to the Pub/Sub
Broker. The pub/sub Broker compares each subscription
with the published data event in the event queue with the
event matcher. If Pub/Sub Broker finds any subscription
match it will start retrieving data from the DPU and
forward the data to the user via the RS and the Cloud
thread.
This research article presents a framework which
integrates cloud computing and WSN. The objective is
to facilitate the shift of data from WSN to cloud
computing storage so that it may be further utilized in
scientific and economic analysis.
IaaS provides consumers with an opportunity to
consume processing, storage, network, and other
fundamental computing resources. Here the consumer is
able to store data, deploy and run arbitrary software such
as operating systems and applications[5]. The consumer
does not need to control and manage the underlying
infrastructure but has control over the operating system,
applications, storage, and network components.
The propose system suggests that sensor nodes and
Integration Controller (lC) can interact through SOA.
Sensor nodes are considered as service providers and
sink nodes are consumers, they receive information
through Ie. The sensor nodes are deployed into the
application server as service description. It has location
information and provides a service end point, a target
namespace and a transport name. These components
exchange messages in xml format.
A Sensor-Cloud collects and processes information from
several sensor networks, enables information sharing on
big scale, and collaborates with the applications on
cloud among users. It integrates several networks with a
number of sensing applications and cloud computing
platform by allowing applications to be crossdisciplinary that may span over multiple organizations.
[15].
A.
Access Control Enforcement Unit
ACEU is used to authenticate the user and it is consists
of EN and three servers i.e. AS, TGS and SS. The
request received by EN is sent to AS. EN implements
Kerberos in order to authenticate the user with AS.
III. PROPOSED FRAME WORK
OVERVIEW
B.
The major components of the framework are Data
Processing Unit (DPU), Publisher/Subscriber Broker,
Request Subscriber, Identity and Access Management
Unit (lAMU)[18] and Data Repository (DR). The data
that collected by the sensors are passed through a
gateway to the DPU. The DPU that converts the data in
to the storage format and store the data in to the data
repository. DPU which will create a published data
event and send the event to an event queue at the
Pub/Sub Broker .Users will connect to the Cloud
through the secured IAMU (Identity and Access
Management Unit). This will provide both
authentication and access control. The IAMU systems
have two major components: Access Control
Enforcement Unit (ACEU); and Access Control
Decision Unit (ACDU). ACEU is used to authenticate
the user and it consists of Edge Node and three servers
i.e. Authentication Server, Ticket Granting Server and
Service Server. The request received by EN is sent to
Access Control Decision Unit
ACDU is used to enforce the policy rules. It consists of
RBAC processor and policy storage. It communicates
with ACEU through SS. After successful authentication;
user is given the access to the resources as constrained
by the access policies.
C.
Communication flow between User and IAMU.
The description of different messages those have been
exchanged among different servers and edge node (EN)
are left out of the scope of this poster due to the space
constraint .
________________________________________________________________________
ISSN (Print): 2319-2526, Volume -3, Issue -1, 2014
76
International Journal on Advanced Computer Theory and Engineering (IJACTE)
________________________________________________________________________
Fig: 2 Sensor-Cloud Integration Framework
IAMU includes Diffie-Hellman, Kerberos, Role Based
Access Control and XML [16]. The main rationale of
this model is first, to provide authentication between
consumer and cloud provider. Second, to provide policy
based access control over the cloud resources.
Consumers
directly
communicate
IAMU
for
authentication and access control. Access Control
Enforcement Unit (ACEU) and Access Control Decision
Unit (ACDU). Edge Node (EN) is used as replacement
of kerberos.

IAMU will authenticate the user and sends ACK if
the authentication is successful.

After successful login the user will send a service
access request.

Cloud will then send the request message to
Request subscriber (RS).

RS will unify the request and create a subscription
on the basis of the request received from Cloud
thread.

Then the RS will send this subscription to the
PUB/SUB Broker.

DPU will continuously send index of the data to
the PUB/SUB broker. This event can happen at any
point.

PUB/SUB broker will store all of the data indexes
in its registry.

Immediately after receiving a subscription request
from RB, Pub/Sub Broker will start EM to find the
matched published data for this particular
subscription.

If Pub/Sub Broker finds any subscription match it
will start retrieving data from the DPU.

Retrieved data will be forwarded to the user via the
RS and the Cloud thread.
Integration of WSN with Cloud Computing will provide
benefits to organisations and the research community.
Organisations will benefit by utilising Cloud storage and
an optimised framework for processing, storage and
retrieval of WSN generation data. The proposed WSN
Cloud Computing framework will provide an optimal
approach to user management, access control, storage
and retrieval of distributed data.
REFERENCES
IV. FLOW OF INTERACTION AMONG
FRAMEWORK COMPONENTS
The user attempts to login by sending login
information.
Cloud thread will identify the service type and
generate a corresponding request message.
V. CONCLUSION
It is actually based on Kerberos with slight
modifications. It also implements Diffie-Hellman public
key [20].


[1]
F. Schepers. (2010) Security in Cloud
Computing, IBM Tivoli Internet Security
Systems.
[Online].
Available:
http://www.cpdpconferences.org/Resources/Sche
pers.pdf. Last accessed: 10/11/2010.
[2]
P. McDaniel, and S. W. Smith, “Outlook: Cloud
Computing with a Chance of Security Challenges
and Improvements,” IEEE Computer and
Reliability Societies 2010, pp. 77-80, Jan. 2010.
[3]
R. Marchany. (2010) VA Tech IT Security Cloud
Computing Security Issues. [Online]. Available:
http://www.security.vt.edu/Downloads/training/C
________________________________________________________________________
ISSN (Print): 2319-2526, Volume -3, Issue -1, 2014
77
International Journal on Advanced Computer Theory and Engineering (IJACTE)
________________________________________________________________________
loud%20Computing%20Security%20Issues.pdf.
Last accessed:2/12/2010.
[4]
[5]
[6]
[7]
P. Mell, and T. Grance. (2009) Effectively and
Securely Using the Cloud Computing Paradigm
(v0.25)
NIST.
[Online].
Available
:http://csrc.nist.gov/groups/SNS/cloud
computing/index.html.
Last
Accessed:
10/11/2010.
P. Barham, B. Dragovic, K. Fraser, S. Hand, T.
Harris, A. Ho, R. Neugebauer, I. Pratt, A.
Warfield, “Xen and the Art of Virtualization,” in
Proc. of 19th ACM symposium on Operating
Systems Principles, Bolton Landing, NY, USA,
October 2003, pp. 164-177.
(2010) Google App Engine. [Online]. Available:
http://code.google.
com/appengine/.
Last
Accessed: 15/07/2011 [7] (2007) Sales Force.
[Online]. Available: http://www.salesforce.com
/platform/. Last Accessed: 10/11/2010
A. Dubey, and D. Wagle. (2007) Delivering
software as a service – The McKinsey Quarterly.
[Online].
Available:
http://www.mckinsey
de/downloads/publikation/mck_on_bt/2007/mobt
_12_Delivering_Software_as_a_Service.pdf Last
Accessed: 15/08/2011
[8]
M. Hassan, B. Song and E. Huh, “A Framework
of Sensor-Cloud Integration Opportunities and
Challenges,” in Proc. of the 3rd International
Conference
on
Ubiquitous
Information
Management and Communication, 2009, pp. 618626.
[9]
K. Lee and D. Hughes, “System architecture
directions for tangible cloud computing,” in Proc.
1st ACIS International Symposium on
Cryptography, and Network Security, Data
Mining and Knowledge Discovery, E-Commerce
and Its Applications, and Embedded Systems,
CDEE 2010, 23 - 24 October, Qinhuangdao,
Hebei, pp. 258-262.
[10]
H. B. Lim, Y.M. Teo, P. Mukherjee, V.T. Lam et
al., “Sensor Grid: Integration of Wireless Sensor
Networks and the Grid,” in Proc. of the30th IEEE
Conf. on Local Computer Networks, IEEE
Computer Society Press, Sydney, Australia,
2005, pp. 91-98
[11]
(2010) CSIRO: Wireless Sensor Network: A
New instrument for Observing Our World.
[Online].
Available:
http://www.csiro.au/science/Sensors-andnetworktechnologies.html.
Last
Access:12/07/2011
[12]
(2010) CSIRO: Smart sensors monitoring water
quality and catchment health. [Online].
Available:
http://www.csiro.au/science/smartsensorsmonitoring- water-quality.html. Last
Access: 12/07/2011
[13]
K. Ahmed, Identity and Access Management in
Cloud Computing, 1st ed., LAP Lambert
Academic Publishing, Germany, April 2011,
ISBN: 978-3-8443-3069-4.
[14]
D. Harkins and D. Carrel. (1998) The Internet
Key Exchange (IKE), RFC 2409, IETF Network
Working
Group.
[Online].
Available:
http://www.ietf.org/rfc/rfc2409.txt. Last Access:
12/01/2011.
[15]
F. Ricciardi, MIT Kerberos Consortium. (2007)
Kerberos Protocol Tutorial. [Online]. Available:
http://www.kerberos.org/software/tutorial.html.
Last Access: 22/12/2010.
[16]
(2001) SANS Institute InfoSec Reading Room. A
Review of the Diffie- Hellman Algorithm and its
Use in Secure Internet Protocols. [Online].
Available:
http://www.sans.org/reading_room/whitepapers/v
pns/revie
w-diffie-hellman-algorithm-secureinternet-protocols_751. Last Access:12/01/2011.
[17]
E. Rescorla. (1999) Diffie-Hellman Key
Agreement Method, RFC 2631, IETF Network
Working
Group.
[Online].
Available:
http://www.ietf.org/rfc/rfc2631.txt.
[18]
(2000) RSA Laboratories, RSA Laboratories’
FAQ About Today’s Cryptography, Version 4.1,
RSA Security Inc., 2000. [Online]. Available:
http://www.rsa.com/rsalabs/faq/index.html. Last
Access: 12/12/2010.
[19]
L. Benjamin. (1997) Diffie-Hellman Method for
Key
Agreement.
[Online].
Available:
http://apocalypse.org/pub/u/seven/diffie.html.
Last Access: 22/12/2010.

________________________________________________________________________
ISSN (Print): 2319-2526, Volume -3, Issue -1, 2014
78
Download