6 research outputs found

    A Proposed Mechanism for Bluetooth Low Enegry Network by Adjusting Network Parameter

    Get PDF
    Bluetooth Low Energy (BLE) developed from traditional Bluetooth innovations for empowering short-range communication in various systems and services. BLE has many points of interest over traditional Bluetooth advancements, including low power utilization and low cost deployment. As of late, a not very many number of research studies have been directed to enhance device discovery procedure of BLE. However, these reviews have still a few constraints. Earlier reviews have accepted that advertising PDUs are instantly handled the length of they are gotten effectively by a scanner. Essentially, notwithstanding, BLE devices may encounter heaps of impacts because of dispute among neighbors, especially in a swarmed situation. With expanding number of BLE devices, delays of both connection set up and device discovery keep exponential development, which could impact client involvement regarding either time or energy utilization. In this paper, an enhanced mechanism is proposed to empower BLE promoters and scanners to take in the system conflict and change their parameters in like manner, to accomplish fast discovery latency. Through broad simulations, the proposed mechanism has demonstrated its effectiveness to reduce sudden long latency in swarmed BLE systems

    GIVE-AND-TAKE KEY PROCESSING for Cloud- linked IoT

    Get PDF
    Internet of Things (IoT) is estimated there are over a billion internet users and rapidly increasing. But there are more things on the internet than there are people on the internet. This is what it has been generally mean, when it has been say internet of things. There are millions and millions of devices with sensors that are linked up together using networks that generate a sea of data. The problem is all data needs to remain secured, unchanged, and persisted at each stage of an IoT solution. This includes distributed components, communication infrastructure, back-end analytics and database servers, across potentially remote locations and adverse environments. In any case, it is helpless against eavesdropping which represents a risk to privacy and security of the client. The security of data traffic winds up plainly vital since the communications over open network happen frequently. It is along these lines basic that the data traffic over the system is encrypted. To give the QoS, the Cloud- linked IoT security is the essential part of the service providers. This paper is concentrating on issue identifying with the Cloud- linked IoT security in virtual condition. It has been propose a technique GIVE-AND-TAKE KEY PROCESSING for giving data process and security in Cloud- linked IoT using Elliptical Curve Cryptography ECC and Hash Map. Encourage, depicts the security services incorporates generation of key, encryption and decryption in virtual condition

    Securing Patient Data Access using Segmented Key Management Approach

    Get PDF
    Cloud technology can be utilized to empower data sharing capacities, which can profit the client through more noteworthy efficiency and profitability. Nonetheless, the Cloud is defenseless to numerous security vulnerabilities and privacy, which thwarts the advance and wide scale reception of data sharing for the reasons for cooperation. Along these lines, there is a solid interest for data owners to not just guarantee that their information is kept private and secure in the Cloud, however to likewise have a level of control over their own particular data contents once they are imparted to data consumers. In particular, the principle issues for data sharing in the Cloud incorporate security attacks, key management and data owner access control. As far as key management, it is key that data should first be encrypted before storage in the Cloud, to prevent security breaches and privacy. In this paper, a segmented key management is proposed

    Proposed Energy Aware Scheduling Algorithm in Data Center by using Map Reduce

    Get PDF
    The majority of large-scale data intensive applications executed by data centers are based on MapReduce or its open-source implementation, Hadoop. Such applications are executed on large clusters requiring large amounts of energy, making the energy costs a considerable fraction of the data center's overall costs. Therefore minimizing the energy consumption when executing each MapReduce job is a critical concern for data centers. We propose a framework for improving the energy efficiency of MapReduce applications, while satisfying the service level agreement (SLA). We first model the problem of energy-aware scheduling of a single MapReduce job as an Integer Program. We then propose two heuristic algorithms, called Energy-aware MapReduce Scheduling Algorithms (EMRSA-I and EMRSA-II), that find the assignments of map and reduce tasks to the machine slots in order to minimize the energy consumed when executing the application. We perform extensive experiments on a Hadoop cluster to determine the energy consumption and execution time for several workloads from the HiBench benchmark suite including TeraSort, PageRank, and K-means Clustering, and then use this data in an extensive simulation study to analyze the performance of the proposed algorithms. The results show that EMRSA-I and EMRSA-II are able to find near optimal job schedules consuming approximately 40% less energy on average than the schedules obtained by a common practice scheduler that minimizes the makespan

    Proposing Optimus Scheduler Algorithm for Virtual Machine Placement Within a Data Center

    Get PDF
    With the evolution of the Internet, we are witnessing the birth of an increasing number of applications that rely on the network; what was previously executed on the user's computers as stand-alone programs has been redesigned to be executed on servers with permanent connections to the Internet, making the information available from any device that has network access. Instead of buying a copy of a program, users can now pay to obtain access to it through the network, which is one of the models of cloud computing, Software as a Service (SaaS). The continuous growth of Internet bandwidth has also given rise to new multimedia applications, such as social networks and video over the Internet; and to complete this new paradigm, mobile platforms provide the ubiquity of information that allows people to stay connected. Service providers may own servers and data centers or, alternatively, may contract infrastructure providers that use economies of scale to offer access to servers as a service in the cloud computing model, i.e., Infrastructure as a Service (IaaS). As users become more dependent on cloud services and mobile platforms increase the ubiquity of the cloud, the quality of service becomes increasingly important. A fundamental metric that defines the quality of service is the delay of the information as it travels between the user computers and the servers, and between the servers themselves. Along with the quality of service and the costs, the energy consumption and the CO2 emissions are fundamental considerations in regard to planning cloud computing networks. In this research work, an Optimus Scheduler algorithm to be proposed for Add, Remove or Resize an application by using Tabu Search Algorithm

    ENHANCED SECURITY FRAMEWORK FOR CLOUD- LINKED IoT

    No full text
    Internet of Things (IoT) is evaluated there are over a billion web clients and quickly expanding. In any case, there are a larger number of things on the web than there are individuals on the web. This is the thing that it has been for the most part mean, when it has been say internet of things. There are a great many gadgets with sensors that are connected up together utilizing networks that create an ocean of information. The issue is all information needs to remain secured, unaltered, and held on at each phase of an IoT solution. This incorporates database servers, distributed components, back-end analytics and communication infrastructure, crosswise over conceivably adverse environments and remote locations. Regardless, it is defenseless against eavesdropping which speaks to a hazard to protection and security of the customer. The security of information movement winds up evidently imperative since the interchanges over open network happen habitually. It is thusly fundamental that the information movement over the framework is scrambled. To give the QoS, the Cloud-connected IoT security is the basic piece of the specialist organizations. This paper is focusing on issue relating to the Cloud-connected IoT security in virtual condition.. It has been propose a method COOPERATION KEY PROCESSING for giving information process and security in Cloud-connected IoT utilizing Elliptical Curve Cryptography ECC and Hash Map. Support, delineates the security services consolidates era of key, encryption and decryption in virtual condition
    corecore