SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 175
ELOQUENT SALVATION AND PRODUCTIVE OUTSOURCING OF BIG DATA
Abdul kalam Asath K1, Balaji S2, Balamurali P3, Kalaiarasi P4
1, 2, 3Department of Computer Science and Engineering, Agni College of Technology
4Assistant professor, Computer Science and Engineering Department, Agni College of technology
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Big data is anticipated to deliver a significant
impact in the coming years. We’ll be looking at some of the
ways that businesses are using data to supercharge their
operations. Towards this goal, a critical underlying task is to
solve a series of large-scale fundamental problems. The end
goal is to help businesses make better, more informed
decisions, allowing them to tap into a range of advantages.
The applications and practices which makesenseanduseofall
the information, creating a new era of smart farming for the
world to behold. Conducting such large-scale dataanalytics in
a timely manner requires a large number of computing
resources, which may not be available for individuals and
small companies in practice. By outsourcing their
computations, we can solve such problems in a cost-effective
way. For the first time in the literature, we presentanefficient,
secure outsourcingschemeforconvexseparableprogramming
problems (CSPs). In particular, wefirstdevelopefficientmatrix
and vector transformation schemes only based on arithmetic
operations that are computationally indistinguishableboth in
value and in the structure under a chosen-plaintext attack
(CPA). Then, we design a secure outsourcing scheme in which
the client and the database collaboratively solve the
transformed problems. The client can efficiently verify the
correctness of returned results to prevent any malicious
behavior of the database. This algorithm will not allow the
unauthorized user to modify the database and it provides
better security.
Key Words: Convex separable programming, Data
security, Privacy, Big data, Data integrity.
1. Introduction:
Any business possesses and generatesa databaseof
information ontransactions, communications,infrastructure
or processes. It’s arguably the most valuable asset for any
organization. So it is in a business’ best interests to make
sure the safety of this information. When we take proper
measures to secure our data, it is kept out ofthehandsofour
competitors. The data integrity is retained, and it enables
easy access wherever and whenever it’s required for
business operations. Failing to do so, increases the chances
of vital information falling into the wrong hands or be
rendered useless. The goal of database security is to prevent
unauthorized or accidental access to data. Because the
database environment has become more complex and more
decentralized,management ofdata securityandintegrity has
become a more complex and time consuming job for
database administrators. The National Security Agency
(NSA) says that every year 300 million hacking attempts are
registered. So we are going to implementnewconceptwhich
helps to maintain data integrityinanefficientmanner. When
the database is accessed by some unauthorized user, then
this concept will not allow the unauthorized user to update
or modify the database.
2. Scope of the Project:
Researchers have estimated that by 2050, the
world’s population will reach 10 billion. This clearly means
that food consumption will be double to fulfill the need for
such a significant number of populations. Almost 40% ofthe
earth’s surface is already in use for agriculture, and
surprisingly a tremendous amount of production goesinthe
waste throughout the process. Big Data provides a helping
hand for every problem and complexities in agriculture. Big
data provides farmers granular data on rainfall patterns,
water cycles, fertilizer requirements,and more.This enables
them to make smart decisions, such as what crops to plant
for better profitability and when to harvest.
It plays a crucial role in establishing an advanced and smart
agricultural system. Farmersaroundtheworldmayoften get
confused in decision making regarding the type of cropto be
harvested. With the help of Big Data analytics, predictions
are drawn from the previous year’s climatic conditions, the
nutrients of the soil, rainfall, etc. These wise decisions with
Big Data help to yield maximumproductionandhelptogrow
the economic sector for the production of food. So the
concept of Convex Separable Programming will be
implemented in the field of agriculture.
3. Chosen-plaintext attack:
Chosen plaintext attack is defined as when the
unauthorized user who access the database withoutkeyand
modifies the particular text data in the database. Inprevious
works, the overcome the above problem cryptographic
techniques like homomorphic encryption is used. But the
techniques are significantly increase the computational
complexity of solving a large-scale problem and is
impractical for large data applications. For the first time in
the literature, we present an efficient, secure outsourcing
scheme for convex separable programming problems
4. Convex Separable Programming:
Convex Separable programming is an algorithm that
allows a convex nonlinear program to beapproximatedwith
arbitrary accuracy with a linear programming model. The
idea is to replace each nonlinear function with a piecewise
linear approximation. A nonlinear programming problem in
which the objective function and constraints can be
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 176
expressed as a linear combination of several different one-
variable functions, of which some or all are nonlinear, is
called a separable programming problem. When objective
function and constraints are separable in a Non-Linear
Programming Problem, such a problem is known as
separable programming.Separableprogramming,whichhas
the problem of minimizing a Convex objective function in a
convex set of points, is called separable convex
programming. Non linear data is a data thatareaccessedand
modified by an unauthorized user. Linear data is an original
information which were in the pattern that is before
accessed by an unauthorized user. Global solutions can then
be obtained with any number of efficient linear
programming codes. The Convex Separable Programming
works when unauthorized user access the database. The
alert message is generated when an intruder enters the
database. Then the algorithm will disable all the modules
and the intruder will not be able to access those modules.
This algorithm will initiate its process when the key is miss
match. By this the integrity of the data is maintained and the
security of the database is improved.
5. Experiment Setup:
The Momentum around data-driven farming is
gathering thanks to the use of technology like soil moisture
and temperature sensors, drones, livestock monitoring
gadgets and crop management devices to produce reams of
priceless information. The end goal is to
help agricultural businesses make better, more informed
decisions, allowing them to tap into a range of advantages.
To evaluate our proposed algorithm in a practical scenario,
we implement in the concept of agriculture. There are three
logins (i.e.) user login, admin login,organizationlogin.Inthis
concept the user is denoted as landlord who is interested in
doing forming. The user need to give the details of the land
the location and size of the land. These information will be
stored in admins database. Based on the location of the land
the suitable type of farming will be suggested. The
organization will rent the all the product related to forming
including machinery, tools for cultivation, chemical and
organic products for fertilizer. If landlord wants anyofthese
products then they can buy it for rent by giving necessary
information andalsothepaymentrelatedinformation.Based
on the size of the land the number of farmers required will
be shown in a graphical representation. If the user have any
queries regarding farming then they can send those queries
to the organization. The organization members will analyse
the queries and will give proper suggestion to the user. The
certificate will be generated by the organization for the land
if the user request for certificates.
Fig 1: Experiment Setup
6. Data Retrieve and Analysis:
The operations on the data retrieving are
performed only by the basis of key, this is delegated to loyal
authority. The purpose of Data Analysis is to extract useful
information from data and taking the decision based upon
the data analysis. A key is only accessible by an
administrator for the authorized users. The key generation
to access the data by an entity within an organizationisto be
maintained by the administrator level. The admin view the
user uploads and analyze about the land resourceslikesand,
water resources and also analyze which is best to make the
harvest of farms by the given land. After that admin will
provide all resources to farmer for develop farming. Based
on the location given by the user the suitable farming will be
suggested by analysing the given information.
Fig 2: System Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 177
7. Securing the Information:
Informationsecurity threats comein manydifferent
forms. Some of the most common threats today aresoftware
attacks, theft of intellectual property, identity theft, theft of
information and information extortion. The theft of
intellectual property has also been an extensive issue for
many businesses in the information technology
field. Identity theft is the attempt to act as someone else
usually to obtain that someone’s personal information or to
take advantage of their access to vital information through
social engineering. Theft of information is becoming more
prevalent today due to the fact that most devices today are
mobile that are prone to theftandhavealsobecomefarmore
desirable as the amount of data capacity increases.
The various type of farming information which will be
provided based on the geographical location of the land will
be secured by the proposed algorithm. If this information is
not secured then it will cause an serious impact to the
business of both the landlords and the farmers. Security is
the set of control-based technologies and policies designed
to adhere to regulatory compliance rules and protect the
information, data replications and infrastructure associated
with the database. Hence by providing the security for these
information, the integrity will be maintained and various
issues caused by an unauthorized user will be avoided and
this processes will also likely to give assurance for the
business continuity of the organization.
8. Result:
In this paper, the data integrity and security will be
maintained. It is the maintenance and assurance of the
accuracy and consistency of data over its entire life cycle.
The manual work of the database administrator will be
eliminated by using convex separable programming
algorithm. By using this algorithm the original data will be
secured and the intruder will not be allowed to access or
modify the database. This concept is implemented in the
field of agriculture to improve the integrity of the data
related to the user, farming and transaction details.
9. Conclusion and Future Enhancements:
The promise of Big Data in future is alluring, butthe
challenges above have to be addressed for increased uptake
of Big Data applications. Although there areindeedtechnical
issues to be resolved, we recommend focusing first on the
governance issues that were identified and design suitable
business models because these are currently the most
inhibiting factors. Big Data is changing the scope and
organization of farming through a pull-push mechanism.
Global issues such as food security and safety, sustainability,
and, as a result, efficiency improvement is tried to be
addressed by Big Data applications. These issues make that
the scope of Big Data applications extends far beyond
farming alone, but covers the entire supply chain. In future
enhancements, the outsourcing of CSPs can also be done
without the client's involvement in the process, making it
more convenient for them to handle.Itcanalsobedeveloped
more secure than before by implementing complex
encryption algorithms in the system. Implementing a
sophisticated encryption algorithm improves thesecurityof
the system and protects the vast amount of sensitive data
from unauthorized access.
REFERENCES:
[1] W. Liao, W. Du, S. Salinas, and P. Li, “Efficient privacy-
preserving outsourcing of large-scale convex separable
programming for smart cities,” in IEEE 14th International
Conference. IEEE, Dec. 2016.
[2] C. Wang, K. Ren, J. Wang, and K. M. R. Urs, “Harnessing
the cloud for securely solving large-scale systems of linear
equations,” in 31st International Conference on Distributed
Computing Systems (ICDCS). IEEE, Jun. 2011.
[3] S. Salinas, C. Luo, X. Chen, W. Liao, and P. Li, “Efficient
secure outsourcing of large-scale sparse linear systems of
equations,” IEEE Trans. on Big Data, vol. 1, no. 1, pp. 78–87,
2013.
[4] N. Zhang and W. Zhao, “Privacy-preserving data mining
systems,” Computer, vol. 40, no. 4, 2007.
[5] L. Liu, M. Esmalifalak, Q. Ding, V. Emesih, and Z. Han,
“Detecting false data injection attacks on power grid by
sparse optimization,” IEEE Trans. on Smart Grid,vol.5,no.2,
pp. 612–621, Mar. 2014.
[6] S. Salinas, C. Luo, X. Chen, and P. Li, “Efficient secure
outsourcing of large-scale linear systems of equations,” in
2015 IEEE Conference on Computer Communications
(INFOCOM). IEEE, Apr. 2015.
[7] S. Salinas, C. Luo, W. Liao, and P. Li, “Efficient secure
outsourcing of large-scale quadratic programs,” in
Proceedings of the 11th ACM on Asia Conference on
Computer and Communications Security, May 2016.
[8] X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New algorithms
for secure outsourcing of modular exponentiations,” IEEE
Trans. on Parallel and Distributed Systems, vol. 25, no. 9, pp.
2386–2396, Sep. 2014.
[9] M. S. Bazaraa, H. D. Sherali, and C. M. Shetty, Nonlinear
programming: theory and algorithms. John Wiley & Sons,
jun. 2013.
[10] M. Kojima, S. Mizuno, and A. Yoshise, “A primal-dual
interior point algorithm for linear programming,” in
Progress in mathematical programming. Springer, 1989,pp.
29–47.
[11] C. Wang, K. Ren, and J. Wang, “Secure and practical
outsourcing of linear programming in cloud computing,” in
Proceeding of the IEEE International Conference on
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 178
Computer Communications (INFOCOM’10), San Diego,
California, USA, Apr. 2010.
[12] X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New
algorithms for secure outsourcing of modular
exponentiations,” IEEE Trans. on Parallel and Distributed
Systems, vol. 25, no. 9, pp. 2386–2396, Sep. 2014.
[13] Z. Qin, J. Yan, K. Ren, C. W. Chen, and C. Wang,
“Towards efficient privacy-preserving image feature
extraction in cloud computing,” in Proceedings of the 22nd
ACM international conference on Multimedia. ACM, Nov.
2014.
[14] W. Liao, M. Li, S. Salinas, P. Li, and M. Pan, “Energy-
source aware cost optimization for green cellular networks
with strong stability,” IEEE Trans. on Emerging Topics in
Computing, vol. 4, no. 4, pp. 541–555, 2016.
[15] C. Hu, A. Alhothaily, A. Alrawais, X. Cheng, C. Sturtivant,
and H. Liu, “A secure and verifiable outsourcing scheme for
matrix inverse computation,” in INFOCOM 2017-IEEE
Conference on ComputerCommunications,IEEE.IEEE,2017,
pp. 1–9.
[16] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A.
Ghalsasi, “Cloud computing– the business perspective,”
Decision support systems, vol. 51, no. 1, pp. 176–189, Apr.
2011.
[17] M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. E.
Spafford, “Secure outsourcing of scientific computations,”
Advances in Computers, vol. 54, pp. 215–272, Dec. 2002.
[18] A. Dasgupta, N. Zhang, G. Das, and S. Chaudhuri,
“Privacy preservation of aggregates in hidden databases:
Why and how?” in Proceedings of the 2009 ACM SIGMOD
International Conference on Management of data. ACM,
2009, pp. 153–164.

More Related Content

What's hot

IRJET- Vendor Management System using Machine Learning
IRJET-  	  Vendor Management System using Machine LearningIRJET-  	  Vendor Management System using Machine Learning
IRJET- Vendor Management System using Machine LearningIRJET Journal
 
IRJET- Patient Health Monitoring using IoT with Machine Learning
IRJET- Patient Health Monitoring using IoT with Machine LearningIRJET- Patient Health Monitoring using IoT with Machine Learning
IRJET- Patient Health Monitoring using IoT with Machine LearningIRJET Journal
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...IRJET Journal
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsIRJET Journal
 
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET Journal
 
IRJET- SMART KRISHI- A Proposed System for Farmers
IRJET-  	  SMART KRISHI- A Proposed System for FarmersIRJET-  	  SMART KRISHI- A Proposed System for Farmers
IRJET- SMART KRISHI- A Proposed System for FarmersIRJET Journal
 
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET Journal
 
Depiction of Body area network in Cloud Environment
Depiction of Body area network in Cloud EnvironmentDepiction of Body area network in Cloud Environment
Depiction of Body area network in Cloud EnvironmentIdris Ahmed
 
Cotton Mitra – An Agricultural Advisory System for Cotton Crop
Cotton Mitra – An Agricultural Advisory System for Cotton CropCotton Mitra – An Agricultural Advisory System for Cotton Crop
Cotton Mitra – An Agricultural Advisory System for Cotton CropIRJET Journal
 
IOT in Agriculture slide.pptx
IOT in Agriculture slide.pptxIOT in Agriculture slide.pptx
IOT in Agriculture slide.pptxDHANPDGHALE
 
IRJET- A Review on E- Health Agricultural Monitoring System through WSN
IRJET- A Review on E- Health Agricultural Monitoring System through WSNIRJET- A Review on E- Health Agricultural Monitoring System through WSN
IRJET- A Review on E- Health Agricultural Monitoring System through WSNIRJET Journal
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET Journal
 
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...Hamidreza Bolhasani
 
Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013Andy Bochman
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkRezgar Mohammad
 
IRJET- Smart Sensory Furniture
IRJET-  	  Smart Sensory FurnitureIRJET-  	  Smart Sensory Furniture
IRJET- Smart Sensory FurnitureIRJET Journal
 
IoTCrawler - Security, privacy and trust
IoTCrawler - Security, privacy and trustIoTCrawler - Security, privacy and trust
IoTCrawler - Security, privacy and trustIoTCrawler
 

What's hot (20)

IRJET- Vendor Management System using Machine Learning
IRJET-  	  Vendor Management System using Machine LearningIRJET-  	  Vendor Management System using Machine Learning
IRJET- Vendor Management System using Machine Learning
 
IRJET- Patient Health Monitoring using IoT with Machine Learning
IRJET- Patient Health Monitoring using IoT with Machine LearningIRJET- Patient Health Monitoring using IoT with Machine Learning
IRJET- Patient Health Monitoring using IoT with Machine Learning
 
IOT wearable device case study
IOT wearable device case studyIOT wearable device case study
IOT wearable device case study
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
 
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
 
IRJET- SMART KRISHI- A Proposed System for Farmers
IRJET-  	  SMART KRISHI- A Proposed System for FarmersIRJET-  	  SMART KRISHI- A Proposed System for Farmers
IRJET- SMART KRISHI- A Proposed System for Farmers
 
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...IRJET-  	  Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
 
Depiction of Body area network in Cloud Environment
Depiction of Body area network in Cloud EnvironmentDepiction of Body area network in Cloud Environment
Depiction of Body area network in Cloud Environment
 
Cotton Mitra – An Agricultural Advisory System for Cotton Crop
Cotton Mitra – An Agricultural Advisory System for Cotton CropCotton Mitra – An Agricultural Advisory System for Cotton Crop
Cotton Mitra – An Agricultural Advisory System for Cotton Crop
 
IOT in Agriculture slide.pptx
IOT in Agriculture slide.pptxIOT in Agriculture slide.pptx
IOT in Agriculture slide.pptx
 
IRJET- A Review on E- Health Agricultural Monitoring System through WSN
IRJET- A Review on E- Health Agricultural Monitoring System through WSNIRJET- A Review on E- Health Agricultural Monitoring System through WSN
IRJET- A Review on E- Health Agricultural Monitoring System through WSN
 
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTINGA DISTRIBUTED MACHINE LEARNING BASED IDS FOR  CLOUD COMPUTING
A DISTRIBUTED MACHINE LEARNING BASED IDS FOR CLOUD COMPUTING
 
IRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVMIRJET- A Inference Model for Environment Detection using IoT and SVM
IRJET- A Inference Model for Environment Detection using IoT and SVM
 
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...
Internet of Things (IoT) and Artificial Intelligence (AI) role in Medical and...
 
Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013Energy Sector Security Metrics - June 2013
Energy Sector Security Metrics - June 2013
 
Internet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a frameworkInternet of things io t and its impact on supply chain a framework
Internet of things io t and its impact on supply chain a framework
 
IRJET- Smart Sensory Furniture
IRJET-  	  Smart Sensory FurnitureIRJET-  	  Smart Sensory Furniture
IRJET- Smart Sensory Furniture
 
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
ENVISIONING AND IMPLEMENTING PROJECT IN REAL TIME (AN ALGORITHMIC APPROACH)
 
IoTCrawler - Security, privacy and trust
IoTCrawler - Security, privacy and trustIoTCrawler - Security, privacy and trust
IoTCrawler - Security, privacy and trust
 

Similar to IRJET - Eloquent Salvation and Productive Outsourcing of Big Data

IRJET- End to End Analysis of Agronomy using IoT and Bigdata
IRJET-  	  End to End Analysis of Agronomy using IoT and BigdataIRJET-  	  End to End Analysis of Agronomy using IoT and Bigdata
IRJET- End to End Analysis of Agronomy using IoT and BigdataIRJET Journal
 
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...IRJET Journal
 
IRJET - Farm Field Monitoring Using IoT-A Survey Paper
IRJET - Farm Field Monitoring Using IoT-A Survey PaperIRJET - Farm Field Monitoring Using IoT-A Survey Paper
IRJET - Farm Field Monitoring Using IoT-A Survey PaperIRJET Journal
 
IRJET - Prototype Android based Real Time Crop Information Collection System
 IRJET - Prototype Android based Real Time Crop Information Collection System IRJET - Prototype Android based Real Time Crop Information Collection System
IRJET - Prototype Android based Real Time Crop Information Collection SystemIRJET Journal
 
IRJET - Smart Agriculture with IoT and Cloud Computing
IRJET - Smart Agriculture with IoT and Cloud ComputingIRJET - Smart Agriculture with IoT and Cloud Computing
IRJET - Smart Agriculture with IoT and Cloud ComputingIRJET Journal
 
Smart Health Guide App
Smart Health Guide AppSmart Health Guide App
Smart Health Guide AppIRJET Journal
 
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportSmart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportALi Baker
 
IRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning AlgorithmIRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning AlgorithmIRJET Journal
 
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...IRJET Journal
 
IRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its ChallengesIRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its ChallengesIRJET Journal
 
IRJET- Smart Agriculture using Clustering and IOT
IRJET-  	  Smart Agriculture using Clustering and IOTIRJET-  	  Smart Agriculture using Clustering and IOT
IRJET- Smart Agriculture using Clustering and IOTIRJET Journal
 
Stubble Aggregation : An E-Commerce Website
Stubble Aggregation : An E-Commerce WebsiteStubble Aggregation : An E-Commerce Website
Stubble Aggregation : An E-Commerce WebsiteIRJET Journal
 
How Manufacturers Can Unlock Business Value via IoT Analytics
How Manufacturers Can Unlock Business Value via IoT AnalyticsHow Manufacturers Can Unlock Business Value via IoT Analytics
How Manufacturers Can Unlock Business Value via IoT AnalyticsCognizant
 
IRJET- Smart Green House using IOT and Cloud Computing
IRJET- Smart Green House using IOT and Cloud ComputingIRJET- Smart Green House using IOT and Cloud Computing
IRJET- Smart Green House using IOT and Cloud ComputingIRJET Journal
 
IRJET- IoT based Smart Irrigation System for Precision Agriculture
IRJET- IoT based Smart Irrigation System for Precision AgricultureIRJET- IoT based Smart Irrigation System for Precision Agriculture
IRJET- IoT based Smart Irrigation System for Precision AgricultureIRJET Journal
 
UPHAR (Universal Patient Hospital and Administration Registry)
UPHAR (Universal Patient Hospital and Administration Registry)UPHAR (Universal Patient Hospital and Administration Registry)
UPHAR (Universal Patient Hospital and Administration Registry)IRJET Journal
 
IRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water ConservationIRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water ConservationIRJET Journal
 
A Review Paper on Emerging Areas and Applications of IoT
A Review Paper on Emerging Areas and Applications of IoTA Review Paper on Emerging Areas and Applications of IoT
A Review Paper on Emerging Areas and Applications of IoTIRJET Journal
 
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISIRJET Journal
 
Agricultural Product Price and Crop Cultivation Prediction based on Data Scie...
Agricultural Product Price and Crop Cultivation Prediction based on Data Scie...Agricultural Product Price and Crop Cultivation Prediction based on Data Scie...
Agricultural Product Price and Crop Cultivation Prediction based on Data Scie...IRJET Journal
 

Similar to IRJET - Eloquent Salvation and Productive Outsourcing of Big Data (20)

IRJET- End to End Analysis of Agronomy using IoT and Bigdata
IRJET-  	  End to End Analysis of Agronomy using IoT and BigdataIRJET-  	  End to End Analysis of Agronomy using IoT and Bigdata
IRJET- End to End Analysis of Agronomy using IoT and Bigdata
 
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...
IRJET - A Research on Eloquent Salvation and Productive Outsourcing of Massiv...
 
IRJET - Farm Field Monitoring Using IoT-A Survey Paper
IRJET - Farm Field Monitoring Using IoT-A Survey PaperIRJET - Farm Field Monitoring Using IoT-A Survey Paper
IRJET - Farm Field Monitoring Using IoT-A Survey Paper
 
IRJET - Prototype Android based Real Time Crop Information Collection System
 IRJET - Prototype Android based Real Time Crop Information Collection System IRJET - Prototype Android based Real Time Crop Information Collection System
IRJET - Prototype Android based Real Time Crop Information Collection System
 
IRJET - Smart Agriculture with IoT and Cloud Computing
IRJET - Smart Agriculture with IoT and Cloud ComputingIRJET - Smart Agriculture with IoT and Cloud Computing
IRJET - Smart Agriculture with IoT and Cloud Computing
 
Smart Health Guide App
Smart Health Guide AppSmart Health Guide App
Smart Health Guide App
 
Smart Traffic Monitoring System Report
Smart Traffic Monitoring System ReportSmart Traffic Monitoring System Report
Smart Traffic Monitoring System Report
 
IRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning AlgorithmIRJET- Road Accident Prediction using Machine Learning Algorithm
IRJET- Road Accident Prediction using Machine Learning Algorithm
 
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...
A Review on Internet of Things (IoT) in Agriculture: Benefits, Challenges and...
 
IRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its ChallengesIRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its Challenges
 
IRJET- Smart Agriculture using Clustering and IOT
IRJET-  	  Smart Agriculture using Clustering and IOTIRJET-  	  Smart Agriculture using Clustering and IOT
IRJET- Smart Agriculture using Clustering and IOT
 
Stubble Aggregation : An E-Commerce Website
Stubble Aggregation : An E-Commerce WebsiteStubble Aggregation : An E-Commerce Website
Stubble Aggregation : An E-Commerce Website
 
How Manufacturers Can Unlock Business Value via IoT Analytics
How Manufacturers Can Unlock Business Value via IoT AnalyticsHow Manufacturers Can Unlock Business Value via IoT Analytics
How Manufacturers Can Unlock Business Value via IoT Analytics
 
IRJET- Smart Green House using IOT and Cloud Computing
IRJET- Smart Green House using IOT and Cloud ComputingIRJET- Smart Green House using IOT and Cloud Computing
IRJET- Smart Green House using IOT and Cloud Computing
 
IRJET- IoT based Smart Irrigation System for Precision Agriculture
IRJET- IoT based Smart Irrigation System for Precision AgricultureIRJET- IoT based Smart Irrigation System for Precision Agriculture
IRJET- IoT based Smart Irrigation System for Precision Agriculture
 
UPHAR (Universal Patient Hospital and Administration Registry)
UPHAR (Universal Patient Hospital and Administration Registry)UPHAR (Universal Patient Hospital and Administration Registry)
UPHAR (Universal Patient Hospital and Administration Registry)
 
IRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water ConservationIRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water Conservation
 
A Review Paper on Emerging Areas and Applications of IoT
A Review Paper on Emerging Areas and Applications of IoTA Review Paper on Emerging Areas and Applications of IoT
A Review Paper on Emerging Areas and Applications of IoT
 
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSISCASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
CASE STUDY ON METHODS AND TOOLS FOR THE BIG DATA ANALYSIS
 
Agricultural Product Price and Crop Cultivation Prediction based on Data Scie...
Agricultural Product Price and Crop Cultivation Prediction based on Data Scie...Agricultural Product Price and Crop Cultivation Prediction based on Data Scie...
Agricultural Product Price and Crop Cultivation Prediction based on Data Scie...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

IRJET - Eloquent Salvation and Productive Outsourcing of Big Data

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 175 ELOQUENT SALVATION AND PRODUCTIVE OUTSOURCING OF BIG DATA Abdul kalam Asath K1, Balaji S2, Balamurali P3, Kalaiarasi P4 1, 2, 3Department of Computer Science and Engineering, Agni College of Technology 4Assistant professor, Computer Science and Engineering Department, Agni College of technology ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Big data is anticipated to deliver a significant impact in the coming years. We’ll be looking at some of the ways that businesses are using data to supercharge their operations. Towards this goal, a critical underlying task is to solve a series of large-scale fundamental problems. The end goal is to help businesses make better, more informed decisions, allowing them to tap into a range of advantages. The applications and practices which makesenseanduseofall the information, creating a new era of smart farming for the world to behold. Conducting such large-scale dataanalytics in a timely manner requires a large number of computing resources, which may not be available for individuals and small companies in practice. By outsourcing their computations, we can solve such problems in a cost-effective way. For the first time in the literature, we presentanefficient, secure outsourcingschemeforconvexseparableprogramming problems (CSPs). In particular, wefirstdevelopefficientmatrix and vector transformation schemes only based on arithmetic operations that are computationally indistinguishableboth in value and in the structure under a chosen-plaintext attack (CPA). Then, we design a secure outsourcing scheme in which the client and the database collaboratively solve the transformed problems. The client can efficiently verify the correctness of returned results to prevent any malicious behavior of the database. This algorithm will not allow the unauthorized user to modify the database and it provides better security. Key Words: Convex separable programming, Data security, Privacy, Big data, Data integrity. 1. Introduction: Any business possesses and generatesa databaseof information ontransactions, communications,infrastructure or processes. It’s arguably the most valuable asset for any organization. So it is in a business’ best interests to make sure the safety of this information. When we take proper measures to secure our data, it is kept out ofthehandsofour competitors. The data integrity is retained, and it enables easy access wherever and whenever it’s required for business operations. Failing to do so, increases the chances of vital information falling into the wrong hands or be rendered useless. The goal of database security is to prevent unauthorized or accidental access to data. Because the database environment has become more complex and more decentralized,management ofdata securityandintegrity has become a more complex and time consuming job for database administrators. The National Security Agency (NSA) says that every year 300 million hacking attempts are registered. So we are going to implementnewconceptwhich helps to maintain data integrityinanefficientmanner. When the database is accessed by some unauthorized user, then this concept will not allow the unauthorized user to update or modify the database. 2. Scope of the Project: Researchers have estimated that by 2050, the world’s population will reach 10 billion. This clearly means that food consumption will be double to fulfill the need for such a significant number of populations. Almost 40% ofthe earth’s surface is already in use for agriculture, and surprisingly a tremendous amount of production goesinthe waste throughout the process. Big Data provides a helping hand for every problem and complexities in agriculture. Big data provides farmers granular data on rainfall patterns, water cycles, fertilizer requirements,and more.This enables them to make smart decisions, such as what crops to plant for better profitability and when to harvest. It plays a crucial role in establishing an advanced and smart agricultural system. Farmersaroundtheworldmayoften get confused in decision making regarding the type of cropto be harvested. With the help of Big Data analytics, predictions are drawn from the previous year’s climatic conditions, the nutrients of the soil, rainfall, etc. These wise decisions with Big Data help to yield maximumproductionandhelptogrow the economic sector for the production of food. So the concept of Convex Separable Programming will be implemented in the field of agriculture. 3. Chosen-plaintext attack: Chosen plaintext attack is defined as when the unauthorized user who access the database withoutkeyand modifies the particular text data in the database. Inprevious works, the overcome the above problem cryptographic techniques like homomorphic encryption is used. But the techniques are significantly increase the computational complexity of solving a large-scale problem and is impractical for large data applications. For the first time in the literature, we present an efficient, secure outsourcing scheme for convex separable programming problems 4. Convex Separable Programming: Convex Separable programming is an algorithm that allows a convex nonlinear program to beapproximatedwith arbitrary accuracy with a linear programming model. The idea is to replace each nonlinear function with a piecewise linear approximation. A nonlinear programming problem in which the objective function and constraints can be
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 176 expressed as a linear combination of several different one- variable functions, of which some or all are nonlinear, is called a separable programming problem. When objective function and constraints are separable in a Non-Linear Programming Problem, such a problem is known as separable programming.Separableprogramming,whichhas the problem of minimizing a Convex objective function in a convex set of points, is called separable convex programming. Non linear data is a data thatareaccessedand modified by an unauthorized user. Linear data is an original information which were in the pattern that is before accessed by an unauthorized user. Global solutions can then be obtained with any number of efficient linear programming codes. The Convex Separable Programming works when unauthorized user access the database. The alert message is generated when an intruder enters the database. Then the algorithm will disable all the modules and the intruder will not be able to access those modules. This algorithm will initiate its process when the key is miss match. By this the integrity of the data is maintained and the security of the database is improved. 5. Experiment Setup: The Momentum around data-driven farming is gathering thanks to the use of technology like soil moisture and temperature sensors, drones, livestock monitoring gadgets and crop management devices to produce reams of priceless information. The end goal is to help agricultural businesses make better, more informed decisions, allowing them to tap into a range of advantages. To evaluate our proposed algorithm in a practical scenario, we implement in the concept of agriculture. There are three logins (i.e.) user login, admin login,organizationlogin.Inthis concept the user is denoted as landlord who is interested in doing forming. The user need to give the details of the land the location and size of the land. These information will be stored in admins database. Based on the location of the land the suitable type of farming will be suggested. The organization will rent the all the product related to forming including machinery, tools for cultivation, chemical and organic products for fertilizer. If landlord wants anyofthese products then they can buy it for rent by giving necessary information andalsothepaymentrelatedinformation.Based on the size of the land the number of farmers required will be shown in a graphical representation. If the user have any queries regarding farming then they can send those queries to the organization. The organization members will analyse the queries and will give proper suggestion to the user. The certificate will be generated by the organization for the land if the user request for certificates. Fig 1: Experiment Setup 6. Data Retrieve and Analysis: The operations on the data retrieving are performed only by the basis of key, this is delegated to loyal authority. The purpose of Data Analysis is to extract useful information from data and taking the decision based upon the data analysis. A key is only accessible by an administrator for the authorized users. The key generation to access the data by an entity within an organizationisto be maintained by the administrator level. The admin view the user uploads and analyze about the land resourceslikesand, water resources and also analyze which is best to make the harvest of farms by the given land. After that admin will provide all resources to farmer for develop farming. Based on the location given by the user the suitable farming will be suggested by analysing the given information. Fig 2: System Architecture
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 177 7. Securing the Information: Informationsecurity threats comein manydifferent forms. Some of the most common threats today aresoftware attacks, theft of intellectual property, identity theft, theft of information and information extortion. The theft of intellectual property has also been an extensive issue for many businesses in the information technology field. Identity theft is the attempt to act as someone else usually to obtain that someone’s personal information or to take advantage of their access to vital information through social engineering. Theft of information is becoming more prevalent today due to the fact that most devices today are mobile that are prone to theftandhavealsobecomefarmore desirable as the amount of data capacity increases. The various type of farming information which will be provided based on the geographical location of the land will be secured by the proposed algorithm. If this information is not secured then it will cause an serious impact to the business of both the landlords and the farmers. Security is the set of control-based technologies and policies designed to adhere to regulatory compliance rules and protect the information, data replications and infrastructure associated with the database. Hence by providing the security for these information, the integrity will be maintained and various issues caused by an unauthorized user will be avoided and this processes will also likely to give assurance for the business continuity of the organization. 8. Result: In this paper, the data integrity and security will be maintained. It is the maintenance and assurance of the accuracy and consistency of data over its entire life cycle. The manual work of the database administrator will be eliminated by using convex separable programming algorithm. By using this algorithm the original data will be secured and the intruder will not be allowed to access or modify the database. This concept is implemented in the field of agriculture to improve the integrity of the data related to the user, farming and transaction details. 9. Conclusion and Future Enhancements: The promise of Big Data in future is alluring, butthe challenges above have to be addressed for increased uptake of Big Data applications. Although there areindeedtechnical issues to be resolved, we recommend focusing first on the governance issues that were identified and design suitable business models because these are currently the most inhibiting factors. Big Data is changing the scope and organization of farming through a pull-push mechanism. Global issues such as food security and safety, sustainability, and, as a result, efficiency improvement is tried to be addressed by Big Data applications. These issues make that the scope of Big Data applications extends far beyond farming alone, but covers the entire supply chain. In future enhancements, the outsourcing of CSPs can also be done without the client's involvement in the process, making it more convenient for them to handle.Itcanalsobedeveloped more secure than before by implementing complex encryption algorithms in the system. Implementing a sophisticated encryption algorithm improves thesecurityof the system and protects the vast amount of sensitive data from unauthorized access. REFERENCES: [1] W. Liao, W. Du, S. Salinas, and P. Li, “Efficient privacy- preserving outsourcing of large-scale convex separable programming for smart cities,” in IEEE 14th International Conference. IEEE, Dec. 2016. [2] C. Wang, K. Ren, J. Wang, and K. M. R. Urs, “Harnessing the cloud for securely solving large-scale systems of linear equations,” in 31st International Conference on Distributed Computing Systems (ICDCS). IEEE, Jun. 2011. [3] S. Salinas, C. Luo, X. Chen, W. Liao, and P. Li, “Efficient secure outsourcing of large-scale sparse linear systems of equations,” IEEE Trans. on Big Data, vol. 1, no. 1, pp. 78–87, 2013. [4] N. Zhang and W. Zhao, “Privacy-preserving data mining systems,” Computer, vol. 40, no. 4, 2007. [5] L. Liu, M. Esmalifalak, Q. Ding, V. Emesih, and Z. Han, “Detecting false data injection attacks on power grid by sparse optimization,” IEEE Trans. on Smart Grid,vol.5,no.2, pp. 612–621, Mar. 2014. [6] S. Salinas, C. Luo, X. Chen, and P. Li, “Efficient secure outsourcing of large-scale linear systems of equations,” in 2015 IEEE Conference on Computer Communications (INFOCOM). IEEE, Apr. 2015. [7] S. Salinas, C. Luo, W. Liao, and P. Li, “Efficient secure outsourcing of large-scale quadratic programs,” in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, May 2016. [8] X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New algorithms for secure outsourcing of modular exponentiations,” IEEE Trans. on Parallel and Distributed Systems, vol. 25, no. 9, pp. 2386–2396, Sep. 2014. [9] M. S. Bazaraa, H. D. Sherali, and C. M. Shetty, Nonlinear programming: theory and algorithms. John Wiley & Sons, jun. 2013. [10] M. Kojima, S. Mizuno, and A. Yoshise, “A primal-dual interior point algorithm for linear programming,” in Progress in mathematical programming. Springer, 1989,pp. 29–47. [11] C. Wang, K. Ren, and J. Wang, “Secure and practical outsourcing of linear programming in cloud computing,” in Proceeding of the IEEE International Conference on
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 178 Computer Communications (INFOCOM’10), San Diego, California, USA, Apr. 2010. [12] X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New algorithms for secure outsourcing of modular exponentiations,” IEEE Trans. on Parallel and Distributed Systems, vol. 25, no. 9, pp. 2386–2396, Sep. 2014. [13] Z. Qin, J. Yan, K. Ren, C. W. Chen, and C. Wang, “Towards efficient privacy-preserving image feature extraction in cloud computing,” in Proceedings of the 22nd ACM international conference on Multimedia. ACM, Nov. 2014. [14] W. Liao, M. Li, S. Salinas, P. Li, and M. Pan, “Energy- source aware cost optimization for green cellular networks with strong stability,” IEEE Trans. on Emerging Topics in Computing, vol. 4, no. 4, pp. 541–555, 2016. [15] C. Hu, A. Alhothaily, A. Alrawais, X. Cheng, C. Sturtivant, and H. Liu, “A secure and verifiable outsourcing scheme for matrix inverse computation,” in INFOCOM 2017-IEEE Conference on ComputerCommunications,IEEE.IEEE,2017, pp. 1–9. [16] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, “Cloud computing– the business perspective,” Decision support systems, vol. 51, no. 1, pp. 176–189, Apr. 2011. [17] M. J. Atallah, K. N. Pantazopoulos, J. R. Rice, and E. E. Spafford, “Secure outsourcing of scientific computations,” Advances in Computers, vol. 54, pp. 215–272, Dec. 2002. [18] A. Dasgupta, N. Zhang, G. Das, and S. Chaudhuri, “Privacy preservation of aggregates in hidden databases: Why and how?” in Proceedings of the 2009 ACM SIGMOD International Conference on Management of data. ACM, 2009, pp. 153–164.