CFP last date
20 May 2024
Reseach Article

Automated Check-Post on Cloud using BigData Analysis with Web Service Security

by Pankaj Kumar, Punitha F, Premlatha D
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 3
Year of Publication: 2015
Authors: Pankaj Kumar, Punitha F, Premlatha D
10.5120/19810-1603

Pankaj Kumar, Punitha F, Premlatha D . Automated Check-Post on Cloud using BigData Analysis with Web Service Security. International Journal of Computer Applications. 113, 3 ( March 2015), 44-47. DOI=10.5120/19810-1603

@article{ 10.5120/19810-1603,
author = { Pankaj Kumar, Punitha F, Premlatha D },
title = { Automated Check-Post on Cloud using BigData Analysis with Web Service Security },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 3 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 44-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number3/19810-1603/ },
doi = { 10.5120/19810-1603 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:50:03.211924+05:30
%A Pankaj Kumar
%A Punitha F
%A Premlatha D
%T Automated Check-Post on Cloud using BigData Analysis with Web Service Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 3
%P 44-47
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this Real world each and every check post perform the same operation. But the operation must be done manually. This operation includes various parameters. The manual operation of the check post requires the man power in order to perform the operations such as opening the gate, closing the gate, checking the vehicle details. The vehicle details include vehicle registration number, vehicle insurance, and vehicle fitness certification. It is a complex task to check each and every vehicle's details by a common man. Some people will do the task honestly and some may not. To overcome such complexities we can a build a system that performs these tasks on behalf of the man power. This system is known as Automated Check post system. The architecture of the system is service-oriented. This architecture will provide the several benefits in the real world. It is important to study the operations of all the devices that are required to build the system. After analyzing the operations then the next step is to check the performance of the system, taking into account the number of vehicles pass through the check post every day. We take a sample scenario on the automated check post system to check its feasibility solution and its performance. The collection of data will be so large and complex that companies cannot process it all using existing database systems, then BigData will play a key role in RFID's infrastructure for the industries needs for complete data management solutions with high security. The conclusion shows how much useful the system is, when it is implemented in the real word application.

References
  1. G. Ateniese, J. Camenisch, and B. de Medeiros, ntraceable RFID tags via insubvertible encryption, Proc. ACM Conf. on Computer and Communication Security (ACM CCS 2005), ACM Press, 2005, pp. 92–101.
  2. Lejla Batina, Joseph Lano, Nele Mentens, Siddika Berna Ors, Bart Preneel, and Ingrid Verbauwhede, Energy, performance, area versus security tradeoffs for stream ciphers,The State of the Art of Stream Ciphers, Workshop Record, ECRYPT, 2004.
  3. Mihir Bellare, Anand Desai, Eron Jokipii, and Phillip Rogaway, A concrete security treatment of symmetric encryption: Analysis of the DES modes of operation, Proceedings of 38th Annual Symposium on Foundations of Computer Science (FOCS 97), IEEE Press, 1997, pp. pp. 394–403.
  4. M. Burmester, T. van Le, and B. de Medeiros, Provably secure ubiquitous systems: Universally composable RFID authentication protocols, Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks (SECURECOMM 2006), IEEE Press, 2006.
  5. Mike Burmester and Breno de Medeiros: RFID Security: Attacks, Countermeasures and Challenges
  6. Wikipedia –https://en. wikipedia. org/wiki/Big_data
  7. Mr. Pankaj Kumar Developing a Conceptual Relationship between Web Service Supply Chain Entities Using Web Security- International Journal of Computational Engineering Research (IJCER)-May, 2013
  8. Sewon oh, joosang park, yongioon lee, "rfid-based middleware system for automatic identification", IEEE international conference on service operations and logistics, and information, 2005.
  9. Kin seongleong, munlengng, member, IEEE, alfio r. Grasso, peter h. Cole, "synchronization of rfidreadersfor dense rfid reader environments", international symposium on applications and the internet workshop (saintw'06), 2005
  10. Implementation of Embedded System Using RFID and Alcohol Sensor at the Toll Plaza International Journal of Innovative Research in Computer and Communication Engineering-Vol. 2, Issue 4, April 2014
Index Terms

Computer Science
Information Sciences

Keywords

Automated check-post RFID Cloud computing BigData analysis GPS