SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
ยฉ 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1878
TRANSMISSION CLUSTERING METHOD FOR WIRELESS SENSOR USING
COMPRESSIVE SENSING OF CLOUD COMPUTING SECURITY
1S.NAGASUNDARAM, 2 Dr.S.K.SRIVATSA
1Assistant Professor/MCA, Sakthi Mariamman Engineering College, Thandalam, Chennai โ€“ 602 105.
Research Scholar, SCSVMV University, Kanchipuram โ€“ 631 561
2Professor (Retd.), Anna University, MIT Campus, Chennai-600 044.
Research Guide, SCSVMV University, Kanchipuram โ€“ 631 561
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: Cloud computing is the use of computing
resources (hardware and software) that are delivered as a
service over a network (typically the Internet). The Cloud
Security Alliance is "โ€ฆ a non-profit organization formed to
promote the use of best practices for providing security
assurance within Cloud Computing, and provide education
on the uses of Cloud Computing to help secure all other
forms of computing."
Keywords: Cloud Security, IaaS, PaaS, VoIS, QoS, PAIs-
Pre-arrival instructions(transmission)system.
1. INTRODUCTION
Nowadays, an increasing number of people use
wireless applications and VoIP (Voice over Internet
Program), in order to make good quality and low cost calls.
Typically, wireless technology (Based on cloud security) is
used only on the network segment that connects the end-
user with the wireless interface, which forwards wireless
packets to a wired backbone. Unfortunately, the
employment of an infrastructure is often not possible in a
distributed scenario, because classical QoS metrics may
cause congestion or service disruption. In this paper an
objective route selection metric based on the E-Model and
cloud security is proposed, together with a suitable
flexibility-based route ordering. The final goal is to
overcome drawbacks typical of traditional approaches in
routing strategies applied to distribute wireless systems,
and to offer good call quality, even in dynamic and
distributed networks. An analysis of currently used VoIP
systems (based on H.323 and SIP architectures) shows
how they are characterized by a set of fixed nodes
(stateless/stateful proxies and registrar servers), which
act as intermediaries between their endpoints or provide
registration and localization of nodes. This kind of
approach has some disadvantages that make it unsuitable
when system dimensions grow: โ€ข low fault-tolerance (if a
proxy is damaged, the whole system will not work).
โ€ข low scalability in the number of supported parallel calls.
The situation degrades when hostile areas (where an
infrastructure cannot be employed) are considered.
โ€ข managing the construction of the lowest-cost path from
source to destination in the best way on the basis of an
objective measure of the QoS of the calls;
โ€ข dynamic codec selection strategy, in order to guarantee
the best quality for new incoming calls, without degrading
system performance;
โ€ข call admission control procedure integrated in the route
selection, to refuse or direct on alternative paths the
additional calls that can degrade the VoIP QoS constraints;
โ€ข route selection based on a suitable flexibility index,
which allows the system to maximize the number of
admissible new calls with the available resources, and
hence to scale with the network size increase.
Numerous security vendors are now leveraging
cloud based models to deliver security solutions. This shift
has occurr for a variety of reasons including greater
economies of scale and streamlined delivery mechanisms.
Regardless of the motivations for offering such services,
consumers are now faced with evaluating security
solutions which do not run on premises. Consumers need
to understand the unique nature of cloud delivered
security offerings so that they are in a position to evaluate
the offerings and to understand if they meet their needs.
2. TRANSMISSION CLUSTER
File transfers are made in clustered channel
methods. There are 16 levels of clustered channels which
are used for transmission of files. If the first cluster is
completed then File transfer automatically moves on to
the next clusters. Each and every cluster channels carries
that files to trace the file history such as type, size,
extension, source to destination etc.,
Fig1.Transmission Efficient Clustering Method for
Wireless Sensor Networking Using Compressive Sensing
by Cloud Computing.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
ยฉ 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1879
Data Transmission is done by two ways: 1.
Existing method and 2. Proposed method (PAIs) of
passing. First it checks the information i.e., content of file
in both method of passing the value. The file type, file size
and the extension of file and the whole history of files are
traced and it will be displayed. While passing the
information among 16 channels, we can select any one of
the channel and pass the information to the destination
address or IP address to be select by the manual mode.
Fig2. Channel diagram and Path
It is possible to select all the 16 channels in passing
the value. While passing the information from the source
to the destination, signals helps to identify the correct path
/ location in a secured method. The signals are sensing
using the wireless transmission with effective clustering
method.
Fig3. Route map from source to destination
Create Command as follows:
create database wireless
use wireless
create table ws_file(session varchar(max),
Filename
Variable declared as follows:
varchar(100), filetext varchar(100), filepath varchar(max),
ch varchar(100), node varchar(100))
Whenever the resources are utilized from cloud
computing, with the help of cloud computing
infrastructure, the transmission is done. In the first
method i.e., existing method passes the file will take a
minimized speed and it will take long time while
comparing the second method which is fast and quick in
sending the files. The time calculation, speed of process
and delivered time will be displayed.
Fig4. Two method of Existing and PAIS methods
File Path and size can be defined as follows:
FileLoad.PostedFile.FileName != "")
{
filename =
Path.GetFileName(FileLoad.PostedFile.FileName);
FileLoad.SaveAs(Server.MapPath("Photo/" +
filename));
filepath = "Photo/" + filename;
fileext = FileLoad.PostedFile.ContentType;
size = FileLoad.PostedFile.ContentLength;
This paper is organized as follows: describes the state
of the art on VoIP traffic management and metrics in
MANET environment; It defines the signaling protocol SIP,
enhanced to fit our purpose in distributed wireless
systems, the novel E-model based metric, and the
optimization problem formulated for the optimal path
selection; focuses on the performance evaluation of the
proposed solution considering two reference scenarios;
finally, concludes the paper by summarizing the
conclusions.
Fig5. File transfer competed diagram
2.1 SECURITY could improve due to centralization of data,
increased security-focused resources, etc., but concerns
can persist about loss of control over certain sensitive
data, and the lack of security for stored kernels. Security is
often as good as or better than other traditional systems,
in part because providers are able to devote resources to
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
ยฉ 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1880
solving security issues that many customers cannot afford.
However, the complexity of security is greatly increased
when data is distributed over a wider area or greater
number of devices and in multi-tenant systems that are
being shared by unrelated users. In addition, user access
to security audit logs may be difficult or impossible.
Private cloud installations are partially motivated by
users' desire to retain control over the infrastructure and
avoid losing control of information security.
2.2. CONCLUSION:-
As cloud computing is achieving increased popularity,
concerns are being voiced about the security issues
introduced through adoption of this new model. The
effectiveness and efficiency of traditional protection
mechanisms are being reconsidered as the characteristics
of this innovative deployment model can differ widely
from those of traditional architectures. An alternative
perspective on the topic of cloud security is that this is but
another, although quite broad, case of "applied security"
and that similar security principles that apply in shared
multi-user mainframe security models apply with cloud
security.
ACKNOWLEDGEMENT
My Sincere Thanks to our Guide Dr.S.K.Srivatsa for the
support to write the research paper. And also thanks to
my Brother Mr.S.Nagarajan, Principal of Sarasawathi
Matriculation School, Villupuram for the encouraging to
completion of research work.
REFERENCES
1) Cloud Computing โ€“ a review from Wikipedia.
2) S.Nagasundaram and S.K.Srivatsa,A Multi- stage
security for cloud computing Journal of Advances
and Natural and applied science, 2 June 2016,
pp123-126.
3) A Hand Book of Cloud computing Secuiry- a
review by Wayne Jansen and Timothy Grace.
4) Abdul R Hummaida et al. โ€œAdaption in cloud
resource configuration: A Surveyโ€ Journal of cloud
computing : Advances, systems and applications,
Vol.5(7),2016.
5) Mohammed Rashid Chowdary et al.
โ€œImplementation and performance analysis of
various VM placement strategies in cloud simโ€,
Journal of cloud computing : Advances, systems
and applications, Vol.4(20),2015.
BIOGRAPHIES
Dr. S.K. SRIVATSA received the
Bachelor of Electronics and
Telecommunication Engineering
degree from Jadavpur University,
Calcutta, India. Masterโ€™s degree in
Electrical Communication
Engineering and Ph.D from the
Indian Institute of Science,
Bangalore, India. He was a Professor
of Electronics Engineering in Anna
University, Chennai, India, and he
has 39.5 years of Post Doctoral
teaching experience. He was a
Research Associate at Indian
Institute of Science. He has taught
twenty eight different courses at
undergraduate and forty two
courses at the post graduate level.
His current research activities
pertain to computer networks,
Design and Analysis of algorithms,
coding Theory and Artificial
Intelligence & Robotics. He has
produced seventy Ph.Dโ€™s and is the
author of over 750 publications.
Mr.S.Nagasundaram, Assistant
Professor/MCA from Sakthi
Mariamman Engineering College
and Research Scholar of Sri
Chandrasekharendra Saraswathi
Viswa Mahavidyalaya University,
Kanchipuram, He has 13 Years
experience in Engineering college,
He has published 3 International
Journal papers.

More Related Content

What's hot

Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Darpan Dekivadiya
ย 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318
Editor IJARCET
ย 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
IJCNCJournal
ย 

What's hot (18)

Congestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback modelCongestion control in packet switched wide area networks using a feedback model
Congestion control in packet switched wide area networks using a feedback model
ย 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
ย 
Performance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetryPerformance evaluation of tcp sack1 in wimax network asymmetry
Performance evaluation of tcp sack1 in wimax network asymmetry
ย 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsn
ย 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent data
ย 
Information Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and ApproachesInformation Extraction from Wireless Sensor Networks: System and Approaches
Information Extraction from Wireless Sensor Networks: System and Approaches
ย 
New Proposed Contention Avoidance Scheme for Distributed Real-Time Systems
New Proposed Contention Avoidance Scheme for Distributed Real-Time SystemsNew Proposed Contention Avoidance Scheme for Distributed Real-Time Systems
New Proposed Contention Avoidance Scheme for Distributed Real-Time Systems
ย 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
ย 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318
ย 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
ย 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ย 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
ย 
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
DESIGNING SECURE CLUSTERING PROTOCOL WITH THE APPROACH OF REDUCING ENERGY CON...
ย 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
ย 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projects
ย 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
ย 
An effective transmit packet coding with trust-based relay nodes in VANETs
An effective transmit packet coding with trust-based relay nodes in VANETsAn effective transmit packet coding with trust-based relay nodes in VANETs
An effective transmit packet coding with trust-based relay nodes in VANETs
ย 
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE BE-BTECH NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
ย 

Similar to Transmission Clustering Method for Wireless Sensor using Compressive Sensing of Cloud Computing Security

Dotnet 2015 2016 ieee project list-(v)_with abstract
Dotnet 2015 2016 ieee project list-(v)_with abstractDotnet 2015 2016 ieee project list-(v)_with abstract
Dotnet 2015 2016 ieee project list-(v)_with abstract
S3 Infotech IEEE Projects
ย 

Similar to Transmission Clustering Method for Wireless Sensor using Compressive Sensing of Cloud Computing Security (20)

ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION
ย 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
ย 
Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
ย 
A Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSNA Review on Traffic Classification Methods in WSN
A Review on Traffic Classification Methods in WSN
ย 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ย 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
ย 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
ย 
Cloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control TechniqueCloud Computing Environment using Secured Access Control Technique
Cloud Computing Environment using Secured Access Control Technique
ย 
Dotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstractDotnet 2015 2016 2017 ieee project list-with abstract
Dotnet 2015 2016 2017 ieee project list-with abstract
ย 
IRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline QueriesIRJET- Secure Data Access on Distributed Database using Skyline Queries
IRJET- Secure Data Access on Distributed Database using Skyline Queries
ย 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
ย 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
ย 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
ย 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing Projects
ย 
M phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projectsM phil-computer-science-secure-computing-projects
M phil-computer-science-secure-computing-projects
ย 
M.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing ProjectsM.E Computer Science Secure Computing Projects
M.E Computer Science Secure Computing Projects
ย 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
ย 
Dotnet 2015 2016 ieee project list-(v)_with abstract
Dotnet 2015 2016 ieee project list-(v)_with abstractDotnet 2015 2016 ieee project list-(v)_with abstract
Dotnet 2015 2016 ieee project list-(v)_with abstract
ย 
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
ย 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
ย 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
ย 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
ย 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
ย 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
ย 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
ย 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
ย 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
ย 
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of โ€œSeismic Response of RC Structures Having Plan and Vertical Irreg...
ย 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
ย 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
ย 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
ย 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
ย 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
ย 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
ย 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
ย 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
ย 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
ย 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
ย 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
ย 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
ย 

Recently uploaded

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
ย 

Recently uploaded (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
ย 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
ย 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
ย 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
ย 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
ย 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ย 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
ย 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
ย 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
ย 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
ย 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
ย 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
ย 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
ย 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
ย 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
ย 

Transmission Clustering Method for Wireless Sensor using Compressive Sensing of Cloud Computing Security

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 ยฉ 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1878 TRANSMISSION CLUSTERING METHOD FOR WIRELESS SENSOR USING COMPRESSIVE SENSING OF CLOUD COMPUTING SECURITY 1S.NAGASUNDARAM, 2 Dr.S.K.SRIVATSA 1Assistant Professor/MCA, Sakthi Mariamman Engineering College, Thandalam, Chennai โ€“ 602 105. Research Scholar, SCSVMV University, Kanchipuram โ€“ 631 561 2Professor (Retd.), Anna University, MIT Campus, Chennai-600 044. Research Guide, SCSVMV University, Kanchipuram โ€“ 631 561 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). The Cloud Security Alliance is "โ€ฆ a non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing." Keywords: Cloud Security, IaaS, PaaS, VoIS, QoS, PAIs- Pre-arrival instructions(transmission)system. 1. INTRODUCTION Nowadays, an increasing number of people use wireless applications and VoIP (Voice over Internet Program), in order to make good quality and low cost calls. Typically, wireless technology (Based on cloud security) is used only on the network segment that connects the end- user with the wireless interface, which forwards wireless packets to a wired backbone. Unfortunately, the employment of an infrastructure is often not possible in a distributed scenario, because classical QoS metrics may cause congestion or service disruption. In this paper an objective route selection metric based on the E-Model and cloud security is proposed, together with a suitable flexibility-based route ordering. The final goal is to overcome drawbacks typical of traditional approaches in routing strategies applied to distribute wireless systems, and to offer good call quality, even in dynamic and distributed networks. An analysis of currently used VoIP systems (based on H.323 and SIP architectures) shows how they are characterized by a set of fixed nodes (stateless/stateful proxies and registrar servers), which act as intermediaries between their endpoints or provide registration and localization of nodes. This kind of approach has some disadvantages that make it unsuitable when system dimensions grow: โ€ข low fault-tolerance (if a proxy is damaged, the whole system will not work). โ€ข low scalability in the number of supported parallel calls. The situation degrades when hostile areas (where an infrastructure cannot be employed) are considered. โ€ข managing the construction of the lowest-cost path from source to destination in the best way on the basis of an objective measure of the QoS of the calls; โ€ข dynamic codec selection strategy, in order to guarantee the best quality for new incoming calls, without degrading system performance; โ€ข call admission control procedure integrated in the route selection, to refuse or direct on alternative paths the additional calls that can degrade the VoIP QoS constraints; โ€ข route selection based on a suitable flexibility index, which allows the system to maximize the number of admissible new calls with the available resources, and hence to scale with the network size increase. Numerous security vendors are now leveraging cloud based models to deliver security solutions. This shift has occurr for a variety of reasons including greater economies of scale and streamlined delivery mechanisms. Regardless of the motivations for offering such services, consumers are now faced with evaluating security solutions which do not run on premises. Consumers need to understand the unique nature of cloud delivered security offerings so that they are in a position to evaluate the offerings and to understand if they meet their needs. 2. TRANSMISSION CLUSTER File transfers are made in clustered channel methods. There are 16 levels of clustered channels which are used for transmission of files. If the first cluster is completed then File transfer automatically moves on to the next clusters. Each and every cluster channels carries that files to trace the file history such as type, size, extension, source to destination etc., Fig1.Transmission Efficient Clustering Method for Wireless Sensor Networking Using Compressive Sensing by Cloud Computing.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 ยฉ 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1879 Data Transmission is done by two ways: 1. Existing method and 2. Proposed method (PAIs) of passing. First it checks the information i.e., content of file in both method of passing the value. The file type, file size and the extension of file and the whole history of files are traced and it will be displayed. While passing the information among 16 channels, we can select any one of the channel and pass the information to the destination address or IP address to be select by the manual mode. Fig2. Channel diagram and Path It is possible to select all the 16 channels in passing the value. While passing the information from the source to the destination, signals helps to identify the correct path / location in a secured method. The signals are sensing using the wireless transmission with effective clustering method. Fig3. Route map from source to destination Create Command as follows: create database wireless use wireless create table ws_file(session varchar(max), Filename Variable declared as follows: varchar(100), filetext varchar(100), filepath varchar(max), ch varchar(100), node varchar(100)) Whenever the resources are utilized from cloud computing, with the help of cloud computing infrastructure, the transmission is done. In the first method i.e., existing method passes the file will take a minimized speed and it will take long time while comparing the second method which is fast and quick in sending the files. The time calculation, speed of process and delivered time will be displayed. Fig4. Two method of Existing and PAIS methods File Path and size can be defined as follows: FileLoad.PostedFile.FileName != "") { filename = Path.GetFileName(FileLoad.PostedFile.FileName); FileLoad.SaveAs(Server.MapPath("Photo/" + filename)); filepath = "Photo/" + filename; fileext = FileLoad.PostedFile.ContentType; size = FileLoad.PostedFile.ContentLength; This paper is organized as follows: describes the state of the art on VoIP traffic management and metrics in MANET environment; It defines the signaling protocol SIP, enhanced to fit our purpose in distributed wireless systems, the novel E-model based metric, and the optimization problem formulated for the optimal path selection; focuses on the performance evaluation of the proposed solution considering two reference scenarios; finally, concludes the paper by summarizing the conclusions. Fig5. File transfer competed diagram 2.1 SECURITY could improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 ยฉ 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1880 solving security issues that many customers cannot afford. However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are partially motivated by users' desire to retain control over the infrastructure and avoid losing control of information security. 2.2. CONCLUSION:- As cloud computing is achieving increased popularity, concerns are being voiced about the security issues introduced through adoption of this new model. The effectiveness and efficiency of traditional protection mechanisms are being reconsidered as the characteristics of this innovative deployment model can differ widely from those of traditional architectures. An alternative perspective on the topic of cloud security is that this is but another, although quite broad, case of "applied security" and that similar security principles that apply in shared multi-user mainframe security models apply with cloud security. ACKNOWLEDGEMENT My Sincere Thanks to our Guide Dr.S.K.Srivatsa for the support to write the research paper. And also thanks to my Brother Mr.S.Nagarajan, Principal of Sarasawathi Matriculation School, Villupuram for the encouraging to completion of research work. REFERENCES 1) Cloud Computing โ€“ a review from Wikipedia. 2) S.Nagasundaram and S.K.Srivatsa,A Multi- stage security for cloud computing Journal of Advances and Natural and applied science, 2 June 2016, pp123-126. 3) A Hand Book of Cloud computing Secuiry- a review by Wayne Jansen and Timothy Grace. 4) Abdul R Hummaida et al. โ€œAdaption in cloud resource configuration: A Surveyโ€ Journal of cloud computing : Advances, systems and applications, Vol.5(7),2016. 5) Mohammed Rashid Chowdary et al. โ€œImplementation and performance analysis of various VM placement strategies in cloud simโ€, Journal of cloud computing : Advances, systems and applications, Vol.4(20),2015. BIOGRAPHIES Dr. S.K. SRIVATSA received the Bachelor of Electronics and Telecommunication Engineering degree from Jadavpur University, Calcutta, India. Masterโ€™s degree in Electrical Communication Engineering and Ph.D from the Indian Institute of Science, Bangalore, India. He was a Professor of Electronics Engineering in Anna University, Chennai, India, and he has 39.5 years of Post Doctoral teaching experience. He was a Research Associate at Indian Institute of Science. He has taught twenty eight different courses at undergraduate and forty two courses at the post graduate level. His current research activities pertain to computer networks, Design and Analysis of algorithms, coding Theory and Artificial Intelligence & Robotics. He has produced seventy Ph.Dโ€™s and is the author of over 750 publications. Mr.S.Nagasundaram, Assistant Professor/MCA from Sakthi Mariamman Engineering College and Research Scholar of Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya University, Kanchipuram, He has 13 Years experience in Engineering college, He has published 3 International Journal papers.