Вы находитесь на странице: 1из 8

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056

Volume: 05 Issue: 08 | August-2018 www.irjet.net p-ISSN: 23950072

SEAMLESS ACCESS OF SMART HEALTHCARE SERVICES IN VIRTUAL MACHINE RESOURCE


MIGRATION USIN HONEY BEE OPTIMIZATION ALGORITHM (HBO) WITH CLOUDLET
1
Miss.A.Anbu Selvi Remita, 2 Ms.Lavanya. S.,
1M.phil Research Scholar, Department of computer Applications, Auxilium College (Autonomous), Gandhi Nagar,
Vellore-6, Tamil Nadu, India.
2 Assistant Professor, Head of the Department, Department of Computer Applications, Auxilium College
(Autonomous), Gandhi Nagar,Vellore-6.

---------------------------------------------------------------------***---------------------------------------------------------------------
ABSTRACT-

In recent years, the Smart City concept has INTRODUCTION


become popular for its promise to improve the quality of
life of urban citizens .Smart City services typically Due to the rapid growth and innovation in
contain a set of applications with data sharing options. communications as well as computer technologies,
Most of the services in Smart Cities are actually smart cities are the subject of permanent research in
mashups combined data from several sources. This industry and academia. The final goal is to provide
means that access to all available data is vital to the numerous services such as real-time traffic monitoring,
services. Seamless access of Smart healthcare services Network assistance, security, safety. It should be noted
requires resource migration in terms of VM migration that the concept of smart buildings with many Internet
during the offloading process to ensure QoS for the user. enabled devices can be controlled from the remote
Honey Bean Optimization algorithm (HBO) based joint locations and communicate each other, thus becoming
VM migration technique is proposed in which user parts of smart cities. Internet of Things(IoT), as the
mobility is also considered. Propose an Honey Bee collection of smart appliances for data sharing across the
Optimization algorithm (HBO) based joint VM globe, introduces a vision of the future smart cities
migration model for a heterogeneous, MCC based Smart where users, computing systems and everyday objects
Healthcare system in Smart City environment. In this cooperate with economic benefits One of the best
model, the user’s mobility and provisioned VM options for processing a large collection of data from
resources in the cloud address the VM migration different buildings is cloud-computing. The ability to
problem. Use DSMS, CEP, batch-based MapReduce and share resources, services, responsibility and
other processing mode and FPGA, GPU, CPU, ASIC management among cloud providers is the fundamental
technologies differently to processing the data at the assumption from the view point of cloud
terminal of data collection. Here structured the data and interoperability.
then upload to the cloud server and Map Reduce the data
combined with the powerful computing capabilities
cloud architecture. Present a thorough performance
evaluation to investigate the effectiveness of our
proposed model compared with the state-of-the-art
approaches.

Keywords:

Honey Bee Optimization (HBO),Interent of Things


(IOT),Mobile Cloud Computing(MCC).
Data Analysis for Smart Home

© 2018, IRJET.NET- All Rights Reserved Page 1


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 05 Issue: 08 | August-2018 www.irjet.net p-ISSN: 23950072

Related Work: Core modules of the Hadoop ecosystem are Hadoop


Distributed File System (HDFS) and Hadoop
In the previous section, it was discussed that big Mapreduce. The popular modules of the Hadoop
data introduces new security and privacy issues. For the framework are described below
Network care sector these issues are even amplified, due
to fact that Network care data are considered privacy HDFS is the software module that arranges the
sensitive data and traditional security and privacy storage in a Hadoop big data ecosystem. HDFS
methods to protect privacy Network care data seem breaks down data into pieces and distributes these
insufficient or even obsolete. This is a problem for pieces to multiple nodes of physical data storage in a
Security as personal information can unwillingly be system. The main advantages of HDFS are that it is
derived from these Network information systems and designed to be scalable and fault tolerant.
end up in wrong hands. Besides that individuals have Additionally, by dividing data into pieces HDFS
some rights against intrusion of their personal prepares data for parallel processing. Other modules
information, in wrong hands, personal information can in the Hadoop framework are designed to take
potentially harm individuals. advantage of distributed data over

On the other hand, weak security and privacy methods HBase is a software module that runs as non-
can hinder the adoption of big data in the Network care. relational database on top of HDFS. HBase is
There can be public resistance from individuals or NoSQL database that stores data according a key-
government against the use of big data in Network care, value model. As it is a NoSQL type of database it
when there is no trust in the protection of their personal requires low level programming to query. Like other
information. Hindering in the adoption of big data in the software modules of Hadoop, HBase is open-source
Network care could also hinder potential benefits big and is modeled after Google’s Big Table database.
data could bring to the Network care, which are for
example improved quality of Network. Therefore, the Hive is essentially a data warehouse that runs on top
owners of the problem are the hospitals and other of HDFS. Hive structures data into concepts like
organizations in the Network that potentially can benefit tables, columns, rows and partitions, similar to a
from an adoption of big data in Network care. These relational database. Data in a Hive database can be
organizations have to deal with hurdles such as privacy queried using (limited) SQL like language, named
legalization and the public perception of privacy before HiveQL.
they can successfully adopt big data.
Mobile Healthcare
The objective is to select the optimal cloud server for a
mobile VM in addition to minimizing the total number Medical applications in the mobile environment
of VM migrations, reducing task-execution time. Honey called as mobile healthcare applications and used for
Bean Optimization algorithm (HBO) to identify the medical treatment, patient tracking, etc. The purpose of
optimal target cloudlet. applying MCC in medical applications is to decrease
disadvantages of traditional medical applications like
small physical storage, security and privacy, and medical
Hadoop Framework errors.

Unlike RDBMS and NoSQL, Hadoop is not


referring to a type of database, but rather a software
platform that allows for massively parallel computing.
Hadoop is an open source software framework, which
consists of several software modules that are targeted to
process big data, large volume and high variety of data.

© 2018, IRJET.NET- All Rights Reserved Page 2


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 05 Issue: 08 | August-2018 www.irjet.net p-ISSN: 23950072

Facilities of Mobile Healthcare and gives a response to the user’s local client. That is,
the application continuously uploads some data and the
Health monitoring services for patients to be cloud server processes this data to provide responses
monitored at anytime and anywhere through internet or back to the user.
by network provider. Emergency management system
for emergency vehicles to reach or manage vehicles Honey Bee Optimization Algorithm
effectively and in time, in case of receiving calls from Algorithm Honey bee Based VM Migration, at Cloudlet
incidents and accidents. Healthcare mobile devices for i
detecting pulse-rate, blood pressure, and level of alcohol INPUT: VM set V and accessible cloudlet set Cu for
integrated with a system to alert in case of emergency. each VM u. System Parameters
Store healthcare information of patients to use in
medical experiments or researches. Mobile healthcare OUTPUT: VM-cloudlet pair.
applications provide users easiness and quickness by 1: Initialize system tunning parameter α
accessing resources at any time, from anywhere. By the
help of cloud, mobile healthcare applications offer a 2: Initialize system migration parameters γl , γg
variety of on-demand services on clouds rather than
standalone applications on local computers and servers. 3: Determine Candidate VM set Vs using Algorithm 1
However, there have to be proposed solutions to protect
4: Initialize ants set A
participant’s health information to increase the privacy
of the users, as have to be done in the traditional 5: Generate initial solution using HBO Algorithm 3
applications.
6: Calculate initial pheromone γ0
Virtualization Resource Access
7: Set maximum iteration MAX_IT
Virtualization technology introduces a middle
8: while ( do iteration≤MAX_IT)
layer between the hardware and software layers in a
cloudlet, allowing the hardware resources to be shared 9: for (Ant a∈A) do
by means of VM. Resources (e.g., CPU, memory,
network bandwidth, etc.) in a cloudlet are provisioned to 10: k=0 11: repeat
these VMs. Resource provisioning in cloud computing is
12: Select a VM v in cloudlet j for VM uk ∈ Vs
a well-studied area. However, the mobility in MCC
introduces several challenges to maintain an acceptable 13: k=k+1
Quality of Service(QoS) when provisioning cloud
resources. Mobile users may move from one Access 14: until every VM is provisioned to a cloudlet 15: for
Point (AP) to another, increasing their distances between (VM k∈Vs) do
current locations and the cloudlet, where the tasks are
provisioned. This increases the task-execution time. To 16: Update the local pheromone
address this issue, we propose a VM migration 17: end for 18: end for 19: Update the global pheromone
technique for a heterogeneous MCC system following
the user’s mobility pattern. 20: iteration=iteration+1

That is, when a user moves from one cloudlet to 21: end while
another cloudlet, the resource or VM must be migrated
22: Return VM-cloudlet pairs
to the cloudlet that is nearest to the user. Consider the
following scenario: a blind user is executing an
application that takes an image from his surroundings.
Then, the application processes the image in the cloudlet

© 2018, IRJET.NET- All Rights Reserved Page 3


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 05 Issue: 08 | August-2018 www.irjet.net p-ISSN: 23950072

detected by honeypot is an indicator that a new


http exploit might be in the wild. Normally commercial
servers have to deal with large amounts of traffic and it fake vulnerabilities. They deceive any attacker to think
is not always possible for intrusion detection systems to they are accessing one particular system or service. A
detect all suspicious activity. Honeypots can function as properly designed tool can be helpful in gathering more
early warning systems and provide hints and directions information about a variety of servers and systems. Such
to security administrators on what to lookout for. systems are easier to deploy and can be used as alerting
systems and are less likely to be used for further illegal
activities.

Honeypots that are real systems: This is a viewpoint


that states that honeypots should not be anything
different from actual systems since the main idea is to
secure the systems that are in use. These honeypots
don’t fake or simulate anything and are implemented
using actual systems and servers that are in use in the
real world. Such honeypots reduce the chances of the
hacker knowing that he is on a honeypot. These
Fig. 4.5 Process of finding the Minimum Distance honeypots have a high risk factor and cannot be
deployed everywhere. They need a controlled
The real value of a honeypot lies in it being environment and administrative expertise. A
probed, scanned and even compromised, so it should be compromised honeypot is a potential risk to other
made accessible to computers on the Internet or at least computers on the network or for that matter the Internet.
as accessible as other computers on the network. As far
as possible the system should behave as a normal system Role of Honeypots in Network Security
on the Internet and should not show any signs of it being
monitored or of it being a honeypot. Even though we Honeypots and related technologies have
want the honeypot to be compromised it shouldn’t pose generated great deal of interest in the past two years.
a threat to other systems on the Internet. To achieve this, Honeypots can be considered to be one of the latest
network traffic leaving the honeypot should be regulated technologies in network security today. Project Honey
and monitored. net is actively involved with deployment and study of
honeypots. Honeypots are used extensively in research
Security Issues and it’s a matter of time that they will be used in
production environments as well.
Honeypots don’t provide security (they are not a
securing tool) for an organization but if implemented
and used correctly they enhance existing security
policies and techniques. Honeypots can be said to
generate a certain degree of security risk and it is the
administrator’s responsibility to deal with it. The level
of security risk depends on their implementation and
deployment. There are two views of how honeypot
systems should handle its security risks.

Honeypots that is fake or simulate: There are


honeypot tools that simulate or fake services or even

© 2018, IRJET.NET- All Rights Reserved Page 4


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 05 Issue: 08 | August-2018 www.irjet.net p-ISSN: 23950072

Detection

Detecting intrusions in networks is similar to the


function of an alarm system for protecting facilities.
Someone breaks into a house and an alarm goes off. In
the realm of computers this is accomplished by Intrusion
Detection Systems.

Fig. 4.6 Security Honeypot

Security Categories

To assess the value of Honeypots we will break


down security into three categories as defined by Bruce
in Secrets and Lies. breaks security into prevention,
detection and response.

Prevention
Fig. 4.7 Intrusion Detection based on Web server
Prevention means keeping the bad guys out.
Normally this is accomplished by firewalls and well The problems with these systems are false
patched systems. The value Honeypots can add to this alarms and non-detected alarms. A system might alert on
category is small. If a random attack is performed, suspicious or malicious activity, even if the data was
Honeypots can detect that attack, but not prevent it as valid production traffic. Due to the high network traffic
the targets are not predictable on most networks it is extremely difficult to process
. every data, so the chances for false alarms increase with
the amount of data processed. High traffic also leads to
One case where Honeypots help with prevention non-Detected attacks. When the system is not able to
is when an attacker is directly hacking into a server. In process all data, it has to drop certain packets, which
this case a Honeypot would cause the hacker to waste leaves those un scanned. An attacker could benefit of
time on a non-sufficient target and help preventing an such high loads on network traffic.
attack on a production system. But this means that the
attacker has attacked the Honeypot before attacking a
real server and not otherwise.

Response

© 2018, IRJET.NET- All Rights Reserved Page 5


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 05 Issue: 08 | August-2018 www.irjet.net p-ISSN: 23950072

After successfully detecting an attack EXPERIMENTAL RESULTS


information is needed to prevent further threats of the Hadoop Server
same type. Or in case an institution has established a
security policy and one of the employees violated Hadoop is an open source distributed processing
against them, the administration needs proper evidence. framework that manages data processing and storage for
Honeypots provide exact evidence of malicious big data applications running in clustered systems. It is
activities. As they are not part of production systems any at the center of a growing ecosystem of big data
packet sent to them is suspicious and recorded for technologies that are primarily used to support advanced
analysis. The difference to a production server is that analytics initiatives, including predictive analytics, data
there is no traffic with regular data such as traffic to and mining and machine learning applications. Hadoop can
from a web server. This reduces the amount of data handle various forms of structured and unstructured
recorded dramatically and makes evaluation much data, giving users more flexibility for collecting,
easier. With that specific information it is fairly easy to processing and analyzing data than relational databases
start effective countermeasures. and data warehouses provide.

Fig. 5.1 Hadoop Login

CONCLUSION

The proposed Honey Bee Optimization cryptosystem is


to overcome the decryption failures of the original
Honey bee Optimization and then presents a secure and
verifiable access control scheme based on the improved
Honey bee Optimization to protect the outsourced big
Fig: Network data source ecosystem. data stored in a cloud. The proposed scheme allows the
data owner to dynamically update the data access policy
investigating depression and suicide rates using real- and the cloud server to successfully update the
time emotional state analysis from Twitter. Because of corresponding outsourced ciphertext to enable efficient
the heterogeneous nature of social Network media data, access control over the big data in the cloud.
it is difficult to conduct data analysis and provide
meaning ful data to Network big data stakeholders.
Thus, this data needs to be appropriately mined,
analyzed and processed to improve the quality the It considers the user mobility without looking at cloudlet
Network services in Network providers. resources. Meanwhile, the task-centric VM migration
method takes a single VM migration approach, which

© 2018, IRJET.NET- All Rights Reserved Page 6


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 05 Issue: 08 | August-2018 www.irjet.net p-ISSN: 23950072

fails to effectively utilize cloudlet resources. Finally, [7] R. Cimler, J. Matyska, and V. Sobeslav, ‘‘Cloud
there is no VM migration approach, even though it does based solution for mobile healthcare application,’’ in
not increase the over-provisioned resources, but it Proc. 18th Int. Database Eng. Appl. Symp., 2014, pp.
negatively impacts on other aspects. 298–301.
[8] E. Cuervo et al., ‘‘Maui: Making smartphones last
FUTURE WORK: longer with code offload,’’ in Proc. 8th Int. Conf. Mobile
Syst., Appl., Services, 2010, pp. 49–62.
The considered rates of resource over- [9] A. V. Dastjerdi and R. Buyya, ‘‘Fog computing:
provisioning are during VM migration, allowing the Helping the Internet of Things realize its potential,’’
overall system to utilize computing resources optimally. Computer, vol. 49, no. 8, pp. 112–116, Aug. 2016.
The future work concentrates on how to further optimize [10] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, ‘‘A
the task-computation time and data-access latency survey of mobile cloud computing: Architecture,
through considering the presence of fog clouds and applications, and approaches,’’ Wireless Commun.
crowd sourcing. In this aspect, exploring edge Mobile Comput., vol. 13, no. 18, pp. 1587–1611, Dec.
computing technology to further optimize the task 2013.
execution time while considering mobility and context- [11] C. Doukas, T. Pliakas, and I. Maglogiannis,
awareness. ‘‘Mobile healthcare information management utilizing
cloud computing and Android OS,’’ in Proc. Annu. Int.
Conf. IEEE Eng. Med. Biol., Aug. 2010, pp. 1037–1040.
REFERENCES: [12] E.-M. Fong and W.-Y. Chung, ‘‘Mobile cloud-
computing-based healthcare service by noncontact ecg
[1] J.H.Abawajyand M.M.Hassan,‘‘Federated Internet of monitoring,’’ Sensors, vol. 13, no. 12, pp. 16451–16473,
Things and cloud computing pervasive patient health 2013.
monitoring system,’’ IEEE Commun. Mag., vol. 55, no. [13] L. Gkatzikis and I. Koutsopoulos, ‘‘Migrate or not?
1, pp. 48–53, Jan. 2017. Exploiting dynamic task migration in mobile cloud
[2] E. Ahmed et al., ‘‘Enabling mobile and wireless computing systems,’’ IEEE Wireless Commun., vol. 20,
technologies for smart cities,’’ IEEE Commun. Mag., no. 3, pp. 24–32, Jun. 2013.
vol. 55, no. 1, pp. 74–75, May 2017. [14] L. Gkatzikis and I. Koutsopoulos, ‘‘Mobiles on
[3] M. Basiri, A. Z. Azim, and M. Farrokhi, ‘‘Smart city cloud nine: Efficient task migration policies for cloud
solution for computing systems,’’ in Proc. IEEE 3rd Int. Conf. Cloud
sustainableurbandevelopment,’’Eur.J.Sustain.Develop.,v Netw. (CloudNet), Oct. 2014, pp. 204–210.
ol.6,no.1,pp.71–84, 2017. [15] M. Guntsch, M. Middendorf, and H. Schmeck, ‘‘An
[4] N. Bobroff, A. Kochut, and K. Beaty, ‘‘Dynamic ant colony optimization approach to dynamic TSP,’’ in
placement of virtual machines for managing SLA Proc. 3rd Annu. Conf. Genetic Evol. Comput., 2001, pp.
violations,’’ in Proc. 10th IFIP/IEEE Int. Symp. Integr. 860–867.
Netw. Manage. (IM), May 2007, pp. 119–128.
[5] R. Buyya, C. S. Yeo, and S. Venugopal, ‘‘Market-
oriented cloud computing: Vision, hype, and reality for
delivering it services as computing utilities,’’ in Proc.
10th IEEE Int. Conf. High Perform. Comput. Commun.
(HPCC), Sep. 2008, pp. 5–13.
[6] B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A.
Patti, ‘‘Clonecloud: Elastic execution between mobile
device and cloud,’’ in Proc. 6th Conf. Comput. Syst.,
2011, pp. 301–314.

© 2018, IRJET.NET- All Rights Reserved Page 7


International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 05 Issue: 08 | August-2018 www.irjet.net p-ISSN: 23950072

© 2018, IRJET.NET- All Rights Reserved Page 8

Вам также может понравиться