REPORT Final
REPORT Final
A PROJECT REPORT
Submitted by
Of
BACHELOR OF ENGINEERING
In
SIGNATURE SIGNATURE
We would like to express our sincere gratitude for the enthusiastic support and
professional suggestions provided by our Principal, Prof. Dr. C. MATHALAI
SUNDARAM, M.E., M.B.A., M.I.S.T.E., Ph.D., to complete our project fruitfully.
Our thanks to our Head of the Department of Computer Science & Engineering,
Mr. C.PRATHAP, M.Tech., [Ph.D]., for his valuable advice regarding our project
and his untiring effort to complete our project effectively.
Gratitude in memory of heart, words cannot adequately express our thanks for our
project coordinator Mrs.T.YOGAMEERA, M.E., [Ph.D]., Assistant Professor, and
all the staff members and also the Lab-Technicians of Computer Science and
Engineering department who all provided us adequate schedule for completing our
project.
We record our deep sense of gratitude and profound thanks to our guide Mr. S. C.
PRABANAND M.Tech., M.I.S.T.E., Assistant Professor, Department of Computer
Science and Engineering, for his valuable guidance, suggestions and affectionate
encouragement to complete the project successfully
Without the blessings of god almighty, nothing is possible, we thank god almighty
for showering his blessings over us to complete this work meticulously .
TABLE OF CONTENTS
ABSTRACT iii
LIST OF ABBREVIATIONS iv
LIST OF FIGURES v
1 INTRODUCTION 1
2 LITERATURE SURVEY 4
3 SYSTEM ANALYSIS 12
3.1.1 DISADVANTAGES 13
3.2.1 ADVANTAGES 14
4 SYSTEM SPECIFICATION 15
4.3.2 J2EE 16
4.3.4 MYSQL 17
4.3.6 JAVA 18
5 SYSTEM DESIGN 20
5.1.2 OBJECTIVES 21
6 SYSTEM IMPLEMENTATION 24
6.2 MODULES 26
7 TESTING 31
8 CONCLUSION 36
10 APPENDIX-II 45
SCREENSHOTS 45
11 APPENDIX-III 58
REFERENCES 58
ABSTRACT
The development of the Internet of Things (IoT) has made extraordinary progress
in recent years in both academic and industrial fields. There are quite a few smart
home systems that have been developed by major companies to achieve home
automation. However, the nature of smart homes inevitably raises security and
preserving communication protocol for the smart home systems. In our proposed
scheme, data transmissions within the smart home system are secured by a
symmetric encryption scheme with secret keys being generated by chaotic systems.
optimization by the use of IPV6 protocol. Our proposed system was capable of
problem along with a reduction in handover latency, end to end delay, and packet
loss.
i
LIST OF ABBREVIATION
ii
LIST OF FIGURES
iii
CHAPTER 1
1 INTRODUCTION
1.1 INTERNET OF THINGS
2
transmission overheads to instantly control the devices. Thus, Route
Optimization (RO) is one of the major challenges for the SH-IoT
networks.
Route Optimization can be handled by the use of IPV6 protocol.
3
CHAPTER 2
2 LITERATURE SURVEY
Disadvantage:
The system is temporal classifier based on a linear-chain conditional random
field (CRF), involving temporally-related features.
5
Title 2: A Reliability-Oriented Transmission Service in Wireless
Sensor Networks.
Author Name: Y. Liu, Y. Zhu, Lionel M. Ni, and G. Xu.
Abstract:
Reliable communications are essential for most applications in wireless sensor
networks (WSNs). In traditional approaches, the per-hop and end-to-end (E2E)
recovery schemes are widely used. These schemes, however, suffer from low E2E
success rate and poor energy efficiency in large-scale real environments. Through
empirical studies, in this paper we identify three major problems that hinder the
efficient and reliable communications. To address these problems, we propose a
novel in-middle recovery scheme and realize it by designing and implementing a
proliferation routing. Proliferation routing integrates three core technologies,
namely, capability-based path finder, a randomized disparity, and reproduction.
Proliferation routing offers great flexibilities for transmissions. It cannot only be
applied with any Medium Access Control (MAC) protocols and routing metrics,
but also obtains a desired service quality (i.e., transmission success rate, energy
cost, etc.) by controlling the system parameters. To demonstrate the effectiveness
of proliferation routing, we thoroughly analyses its performance. We also conduct
performance evaluations through implementation experiments as well as
simulations. In a specific experimental setup, proliferation routing can increase the
E2E transmission success rate up to 80 percent compared with the well-known
hop-based routing and flooding. To address these problems, we propose a novel in-
middle recovery scheme and realize it by designing and implementing a
proliferation routing. Proliferation routing integrates three core technologies,
namely, capability-based path finder, a randomized disparity, and reproduction.
Proliferation routing offers great flexibilities for transmissions. It cannot only be
applied with any Medium Access Control (MAC) protocols and routing metrics,
6
but also obtains a desired service quality (i.e., transmission success rate, energy
cost, etc.) by controlling the system parameters. To demonstrate the effectiveness
of proliferation routing, we thoroughly analyses its performance. Suffer from low
E2E success rate and poor energy efficiency in large-scale real environments.
Through empirical studies, in this paper we identify three major problems that
hinder the efficient and reliable communications.
Advantage:
The distinctive feature of proliferation routing is its great flexibility. Not only
can it be applied with any medium access control (MAC) protocol.
To address these problems, we propose a novel in-middle recovery scheme and
realize it by designing and implementing a proliferation routing.
Disadvantage:
Low E2E success rate and poor energy efficiency in large-scale real
environments.
Using different architectures and communications technologies to develop
7
Title 3: Opportunity-Based Topology Control in Wireless Sensor Networks
Author Name: Y. Liu, Q. Zhang, and Lionel M. Ni.
Abstract:
Topology control is an effective method to improve the energy efficiency of
wireless sensor networks (WSNs). Traditional approaches are based on the
assumption that a pair of nodes is either "connected" or "disconnected". These
approaches are called connectivity-based topology control. In real environments
however, there are many intermittently connected wireless links called loss links.
Taking a succeeded loss link as an advantage, we are able to construct more
energy-efficient topologies. Towards this end, we propose a novel opportunity-
based topology control. We show that opportunity-based topology control is a
problem of NP hard. To address this problem in a practical way, we design a fully
distributed algorithm called CONREAP based on reliability theory. We prove that
CONREAP has a guaranteed performance. The worst running time is O (jeep)
where E is the link set of the original topology, and the space requirement for
individual nodes is O (d) where d is the node degree. To evaluate the performance
of CONREAP, we design and implement a prototype system consisting of 50
BerkeleyMica2 motes. We also conducted comprehensive simulations.
Experimental results show that compared with the connectivity-based topology
control algorithms, CONREAP can improve the energy efficiency of a network up
to 6 times. That pair of node is either "connected” or "disconnected”. These
approaches are called connectivity-based topology control. In real environments,
however, there are many intermittently connected wireless links called loss links.
Taking a succeeded loss link as an advantage, we are able to construct more
energy-efficient topologies. Toward this end, we propose a novel opportunity-
based topology control. We show that opportunity-based topology control is a
problem of NP-hard. To address this problem in a practical way, we design a fully
8
distributed algorithm called CONREAP based on reliability theory. We prove that
CONREAP has a guaranteed performance.
Advantage:
In real environments however, there are many intermittently connected
wireless links called loss links. Taking a succeeded loss link as an advantage,
we are able to construct more energy-efficient topologies.
Show that opportunity-based topology control is a problem of NP hard
Disadvantage:
This paper may developing networking concept but it not suitable for all urban
alert process
Experimental results show that compared with the connectivity-based topology
control algorithms, CONREAP can improve the energy efficiency of a network
up to 6 times.
9
Title 4: Using Stranger as Sensors: Temporal and Geo-sensitive Question
Answering via Social Media
Author Name:Y. Liu, T. Alexandrea, and T. Nakajima.
Abstract:
Mood is a location-based real-time social question answering service deployed
in the field in China. Using Mood, people can ask temporal and geo-sensitive
questions, such as how long is the line at a popular business right now, and then
receive answers that crowd sourced from other users in a timely fashion. To obtain
answers for questions, the system analyses the live stream from public micro
blogging service china Web to identify people who are likely to currently be at the
place that is associated with a question and sends them the unsolicited question
through the micro blogging service from which they were identified. Mood was
deployed in China at the beginning of 2012, until October of the same year, it was
used to ask 15,224 questions by 35,214 registered users, and it gathered 29,491
answers; 74.6% of the questions received at least one answer, 28% received a first
response within 10 minutes, and 51% of the questions got first answer within 20
minutes. In total, 91% of the questions successfully found at least one answer
candidate, and they were sent to 162,954 micro blogging service users. We
analyses the usage patterns and behaviors of the real-world end-users, discuss the
lessons learned, and outline the future directions and possible applications that
could be built on top of Mood through the micro blogging service from which they
were identified. Mood was deployed in China at the beginning of 2012, until
October of the same year, it was used to ask 15,224 questions by 35,214 registered
users, and it gathered 29,491 answers; 74.6% of the questions received at least one
answer, 28% received a first response within 10 minutes, and 51% of the questions
got first answer within 20 minutes. In total, 91% of the questions successfully
found at least one answer candidate.
10
Advantage:
Identify people who are likely to currently be at the place that is associated with a
question and sends them the unsolicited question through the micro blogging service
We analyze the usage patterns and behaviours of the real-world end-users, discuss the
lessons learned, and outline the future directions and possible applications
Disadvantage:
We analyze the usage patterns and behaviours of the real-world end-users, discuss the
lessons learned, and outline
The future directions and possible applications that could be built on top of Mood
through the micro blogging service.
11
CHAPTER 3
3 SYSTEM ANALYSIS
The creative and challenging phase of the system life cycle is system analysis.
The term analysis describes the initial stage of the system. The term design
describes the final system generated and process by which it is developed. It refers
to the technical specification that will be applied in implementing the system. It
also includes the construction of programs and program testing.
System analysis and design is a solution a “how to” approach to the creation of
a new system. This important phase is composed of several steps. It provides the
understanding and procedural details necessary for implementing the system
recommended in the feasibility study.
3.1 EXISTING SYSTEM
12
triangular routing that can be resolved by providing secure RO. In this paper, the
problem of secure RO is considered in a SH-IOT. Most of the existing solutions
have focused on new ideology for optimizing the route and lowering the
handover latency by using PMIPv6 in different network scenarios.
However, despite the advantages of these approaches for RO in PMIPv6, most
of the existing solutions do not consider the security aspect, which makes the
network vulnerable to many attacks allowing intruders to further impact the
performance of the network.
3.1.1 Disadvantages
Existing sensor process mobile node network uses IPV4 address.
The transmission speed was normal and security was low when compared to
IPV6.
IPv4 uses 32-bit address which limits the address space to 4294967296 (232)
addresses.
IPv4 reserves special address blocks for private networks (~18 million
addresses) and multicast addresses (~270 million addresses) IPv4 addresses
may be represented in any notation expressing a 32-bit integer value. They are
most often written in the dot-decimal notation, which consists of four octets of
the address expressed individually in decimal numbers and separated by
periods.
The CIDR notation standard combines the address with its routing prefix in a
compact format.
13
3.2 PROPOSED SYSTEM
3.2.1 Advantages
IPV6 provides more address space which offers more powerful internet.
14
CHAPTER 4
4 SYSTEM SPECIFICATION
4.1 HARDWARE SPECIFICATION
Hardware is a general term for the physical artifacts of a technology. It
may also mean the physical components of a system. These are the devices, which
are made to perform specific functions and can do only that works as instructed.
They can be both electronic devices and mechanical systems.
Mouse : Logitech.
O/S : Windows 7
Language : Java
15
4.3 SOFTWARE DESCRIPTION
4.3.1 Net Beans
Applications can install modules dynamically. Any application can include the
Update Center module to allow users of the application to download digitally-
signed upgrades and new features directly into the running application.
4.3.2 J2EE
4.3.4 MySQL
The MySQL development project has made its source code available under the
terms of the GNU General Public License, as well as under a variety of proprietary
agreements. MySQL was owned and sponsored by a single for-profit firm, the
Swedish company MySQL AB, now owned by Oracle Corporation.
4.3.6 JAVA
Java is a programming language originally developed by James Gosling at Sun
Microsystems (now a subsidiary of Oracle Corporation) and released in 1995 as a
core component of Sun Microsystems' Java platform. The language derives much
of its syntax from C and C++ but has a simpler object model and fewer low-level
facilities. Java applications are typically compiled to byte code (class file) that can
run on any Java Virtual Machine (JVM) regardless of computer architecture. Java
is a general-purpose, concurrent, class-based, object-oriented language that is
specifically designed to have as few implementation dependencies as possible. It is
intended to let application developers "write once, run anywhere." Java is currently
one of the most popular programming languages in use, particularly for client-
server web applications.
19
CHAPTER 5
5 SYSTEM DESIGN
Software design sits at the technical kernel of the software engineering process
and is applied regardless of the software process model that is used. After the
software requirements have been analyzed and specified, software design is the
first of the three technical activities designing, coding and testing that are required
to build and verify the software. Each activity transforms in such a manner that
ultimately results in validated computer software.
The following goals were kept in mind while designing the system: make
system user-friendly. This was necessary so that system could be used efficiently
and system could act as catalyst in achieving objectives. Make system compatible
and it should fit in the total integrated system. Future maintenance and
enhancement must be less. Make the system reliable, understandable and cost-
effective.
20
5.1.1 Input Design
The input design is the link between the information system and the user Input
design is the process of converting user-oriented input into computer-based format.
The goal of designing input data is to make data entry as easy as possible and free
from errors. Errors in the input are handled in the input design. The input data is
the lifeblood of a system and have to be analyzed and designed with utmost case
and consideration. The decisions made during the input design are:
21
5.1.3 Output Design
Output design generally refers to the results and information’s that are
generated by the system for many end-users; output is the main reason for
developing the system and the basis on which they evaluate the usefulness of the
application. The basic requirements of output are that it should be accurate, timely
and appropriate, in terms of content, medium and layout for its intended purpose.
The important task of any system lies in the capability of producing high
quality output and reports. Computer output is the most important and direct source
of information to the user. A good output design contains all required information
and well formatted for the better visualization and avoids the complexity in
displaying the data this system was developed by keeping in mind and proper
output is displayed for the users accurately.
22
5.2 SYSTEM ARCHITECTURE
23
CHAPTER 6
6 SYSTEM IMPLEMENTATION
Implementation of the software refers to the final installation of the package in
its real environment, to the satisfaction of the intended users and the operation of
the system. The people are not sure that the software is meant to make their job
easier. The active user must be aware of the benefits of using the system. Their
confidence in the software built up. Proper guidance is impaired to the user so that
he is comfortable in using the application.
Before going ahead and viewing the system, the user must know that for
viewing the result, the server program should be running in the server. If the server
object is not running on the server, the actual processes will not take place.
To achieve the objectives and benefits expected from the proposed system it is
essential for the people who will be involved to be confident of their role in the
new system. As system becomes more complex, the need for education and
training is more and more important.
After providing the necessary basic training on the computer awareness, the
user will have to be trained on the new application software. This will give the
underlying philosophy of the use of the new system such as the screen flow, screen
design, type of help on the screen, type of error while entering the data, the
corresponding validation check at each entry and the ways to correct the data enter.
24
6.1.2 Operational Documentation
Once the implementation plan is decided, it is essential that the user of the
system is made familiar and comfortable with the environment. A documentation
providing the whole operations of the system is being developed. Useful tips and
guidance is given inside the application itself to the user. The system is developed
user friendly so that the user can work the system from the tips given in the
application itself.
The maintenance phase of the software cycle is the time in which software
performs useful work. After a system is successfully implemented, it should be
maintained in a proper manner. System maintenance is an important aspect in the
software development life cycle. The need for system maintenance is to make
adaptable to the changes in the system environment. There may be social, technical
and other environmental changes, which affects a system which is being
implemented. Software product enhancements may involve providing new
functional capabilities, improving user displays and mode of interaction, upgrading
the performance characteristics of the system.
25
6.1.5 Adaptive Maintenance
6.2 MODULES
IPV6 Initialization
IOT-Server Response
IF
27
Initialize Node
Node Travelling
Node 1 Node 3
Node 2
28
IPV6 Node1
IPV6 Node3
29
Server Request
Server Response
30
CHAPTER 7
7 TESTING
7.1 INTRODUCTION ABOUT TESTING
Testing is the process of evaluating a system or its component(s) with the
intent to find whether it satisfies the specified requirements or not. In simple
words, testing is executing a system in order to identify any gaps, errors or missing
requirements in contrary to the actual requirements.
Testing is a process used to identify the correctness, completeness and quality
of developed computer software. With that in mind, testing can never completely
establish the correctness of computer software.
Testing helps in verifying and validating if the software is working as it is
intended to be working. This involves using static and dynamic methodologies to
test the application.
7.1.1 Testing Objectives
To make sure that the end result meets the business and user requirements.
To ensure that it satisfies the BRS that is Business Requirement Specification
and SRS that is System Requirement Specifications.
To gain the confidence of the customers by providing them a quality product.
7.1.2 Testing Methodologies
Software Testing Methodology is defined as strategies and testing types used to
certify that the Application under Test meets client expectations. Test
Methodologies include functional and non-functional testing to validate the AUT.
31
There are different types of techniques and methodologies involved in testing:
Unit Testing
Integration Testing
System Testing
Black Box Testing
White Box Testing
Performance Testing
Acceptance Testing
32
7.1.2.3 System Testing
System testing tests the system as a whole. Once all the components are
integrates, the application as a whole is tested rigorously to see that it meets the
specified Quality Standards. This type of testing is performed by a specialized
testing team.
System testing is the first step in the Software Development life Cycle, where
the application is tested as a whole. The application is tested thoroughly to verify
that it meets the functional and technical specifications.
33
7.1.2.5 White box Testing
White Box Testing (Also Known As Clear Box Testing, Open Box Testing,
Glass Box Testing, Transparent Box Testing, Code-Based Testing Or Structural
Testing). In a software testing method in which the internal
Structure/Design/Implementation of the item being tested is known to the tester.
The tester chooses inputs to exercise paths through the code and determines the
appropriate outputs. Programming know-how and the implementation knowledge
is essential. White box testing is testing beyond the user interface and into the
Nitty-Gritty of a system.
This Method Is Named So Because The Software Program, In The Eyes Of The
Tester, Is Like A White/Transparent Box; Inside Which One Clearly Sees.
34
7.1.2.6 Acceptance Testing
35
CHAPTER 8
8 CONCLUSION
36
CHAPTER 9
APPENDIX I - SOURCE CODE
9.1 Start-Page:
package Process;
import Process2.BarChart3DDemo3;
import Process2.Barfour;
import Process2.Barthree;
import Process2.Bartwo;
import org.apache.hadoop.conf.Configuration;
import org.apache.hadoop.fs.FileSystem;
import org.apache.commons.io.IOUtils;
import java.io.DataInputStream;
import java.io.IOException;
import java.util.Date;
import java.util.*;
import java.io.BufferedReader;
import Process2.Home_Page;
import Process2.WordCount;
import Process2.Home_Page;
import Process2.Lienfout1;
import Process2.LineChartDemo6;
import Process2.Linefive;
import Process2.Lineseven;
import Process2.Linesix;
import Process2.Linethree;
import static Process2.afconfig.flag;
import static Process2.afconfig.ram;
import static Process2.afconfig.rr;
import Process2.file3;
import java.io.BufferedOutputStream;
import java.io.File;
import java.io.FileDescriptor;
import java.io.FileInputStream;
37
import java.io.FileOutputStream;
import java.io.FileReader;
import java.io.PrintStream;
import java.io.RandomAccessFile;
import java.sql.*;
import org.apache.hadoop.fs.FSDataOutputStream;
import org.apache.hadoop.fs.Path;
public class Start extends Home_Page{
public static Date dd = new Date();
public static String sp[];
public static PrintStream pf;
public static String dataname="";
public static String Standardcount;
public static final String ANSI_BLUE = "\u001B[34m";
public static final String ANSI_BLACK_BACKGROUND = "\
u001B[40m";
public static final String ANSI_GREEN_BACKGROUND = "\
u001B[42m";
public static final String ANSI_PURPLE_BACKGROUND = "\
u001B[45m";
public static final String ANSI_CYAN_BACKGROUND = "\
u001B[46m";
public static final String ANSI_RED = "\u001B[31m";
public static final String ANSI_GREEN = "\u001B[32m";
public static SimpleDateFormat simple = new
SimpleDateFormat("hh:mm:ss");
public static String Time = simple.format(dd);
public static File ff=new File("./Dataset/");
public static File ff1[]=ff.listFiles();
public static long timing=System.currentTimeMillis();
public static DataInputStream din=new DataInputStream(System.in);
public static Connection con=null;
public static Connection con1=null;
public static ResultSet rs;
public static int flag=0;
38
public static Statement stmt=null;
public static Statement stmt1=null;
public static int count;
public static int file_count=0;
public static long total;
// public static DataInputStream din = new
DataInputStream(System.in);
public static long start = System.currentTimeMillis();
public static Random rr = new Random();
public static BufferedReader br;
public static int arr[] = new int[10000];
// public static int flag = 0;
public static String array[] = new String[]{"Extra-High", "Small",
"Small", "High","Medium"};
public static String dbname="optimized_bigdata";
public static String tbname="User_Table";
public static String jobfinding[]=new String[50000];
public static String url1="jdbc:mysql://localhost:3306/";
public static String url2="jdbc:mysql://localhost:3306/"+dbname;
public Start()
{
try {
Class.forName("com.mysql.jdbc.Driver");
con=DriverManager.getConnection(url,"root","");
stmt=con.createStatement();
con=DriverManager.getConnection(url2,"root","");
stmt1=con.createStatement();
int flag1=0;
File ff=new File("C:\\wamp\\bin\\mysql\\mysql5.1.36\\data\\");
File ff1[]=ff.listFiles();
for(int j=0;j<ff1.length;j++)
{
String name=ff1[j].getName();
if(name.equals(dbname))
39
{
flag++;
}
}
System.out.println(flag);
if(flag==0)
{
stmt.executeUpdate("CREATE DATABASE "+dbname);
stmt1.executeUpdate("CREATE TABLE "+tbname+" (name
VARCHAR(200),Gender VARCHAR(200),server
VARCHAR(200),Cloud_Password VARCHAR(200),IDNS
VARCHAR(200),Mail VARCHAR(200),Url
VARCHAR(200),Data_type VARCHAR(200))");
}
else
{
stmt1.executeUpdate("CREATE TABLE "+tbname+" (name
VARCHAR(200),Gender VARCHAR(200),server
VARCHAR(200),Cloud_Password VARCHAR(200),IDNS
VARCHAR(200),Mail VARCHAR(200),Url
VARCHAR(200),Data_type VARCHAR(200))");
}
System.out.println(ANSI_BLUE+"HYBER_CLOUD_DATA
BASE CREATED SUCESSFULLY-->"+timing+"Millisec....");
} catch (Exception e) {
// e.printStackTrace();
System.out.println(ANSI_BLUE+"HYBER_CLOUD_DATA
BASE CREATED SUCESSFULLY-->"+timing+"Millisec....");
}
}
public static void function1() {
System.out.println(ANSI_BLUE +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
40
System.out.println(ANSI_RED+ "\t\t\t\t\t\t Optimized Resource
Allocation On Hybrid Cloud Network For
" + "\n" + "\t\t\t\t\t\t" + "" + ANSI_RED + " Big Data Applications
Using Statistical Analysis
" + "\n");
System.out.println(ANSI_BLUE +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
System.out.println("Process Starting Date:" + dd + "\n");
System.out.println("Process Starting Time:" + Time + "\n");
function2();
//System.out.println(ANSI_BLUE +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
}
public static void function2()
{
try{
}
public static void function4()
{
try{
stmt1.executeUpdate("TRUNCATE "+tbname);
System.out.println(ANSI_BLUE+" Verification Sucess\n\n");
System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
System.out.println(ANSI_BLUE+""+ " Cloud Data Loading
Process.....");
System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
for(int i=0;i<ff1.length;i++)
{
//System.out.println(ff1[i].getName());
}
// System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
System.out.println(ANSI_BLUE+"\t\t\t||----------------Hybrid Cloud
Data---------------------------||");
// System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
------------\n");
//System.out.println(ANSI_BLUE+" Cloud_User_Name "+"\t\t
43
Gender"+"\t\tServer");
for(int i=0;i<ff1.length;i++)
{
String content=ff1[i].getName();
BufferedReader br=new
BufferedReader(newFileReader("./Dataset/test.txt"));
String data;
while((data=br.readLine())!=null)
{
sp=data.split(",");
stmt1.executeUpdate("INSERT INTO "+tbname+"
VALUES('"+sp[0]+"','"+sp[1]+"','"+sp[2]+"','"+sp[3]+"','"+sp[4]+"','"+s
p[5]+"','"+sp[6]+"','"+sp[7]+"') ");
file_count++;
}
}
}
catch(Exception e)
{
dbfunction();
}
}
public static void dbfunction()
{
System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
-----------------------\n");
System.out.println("\t\t\t HYBRID-CLOUD DATA");
System.out.println(ANSI_RED +
"--------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
---------------------------------------------------------------------------------------
44
---------------------------------------------------------------------------------------
-----------------------\n");
System.out.println(" USER "+" \t\t\t\t GENDER "+" \t\t\t\t\
tSERVER "+" \t\t\t\t\tCLOUD_PASSWORD "+" \t\t\t\tIDNS "+" \t\t\t\t\
t\tMAIL "+"\t\t \t\t\t\t\t\tURL "+"\t\t\t\t\t\t\t\tDATA_TYPE");
Bartwo.main(null);
}
}
CHAPTER 10
APPENDIX II
SCREENSHOTS
10.1 HOME PAGE
45
Fig 10.1 Home Page
10.2 IOT-REGISTRATION
46
Fig 10.2 IOT Registration
49
Fig 10.5 IOT-Sensor Allocation
50
Fig 10.6 Node Transmission
51
10.7 CLOUD LOGIN
52
Fig 10.8 Node Priority Classification
54
Fig 10.10(a) IOT Server (view request)
55
Fig 10.10(b) IOT Server (Request Classification)
56
Fig 10.10(c) IOT Server (Request Response)
57
10.11 ALERT INFORMATION
58
APPENDIX 3
REFERENCES
[1] Jose, Arun Cyril, Reza Malekian, and Ning Ye. "Improving Home Automation
Security; Integrating Device Fingerprinting Into Smart Home." IEEE Access 4
(2016): 5776-5787.
[2] Kennedy, Zachery Webster, Ted Boda, Jeffrey Alan Boyd, Jeffery Theodore
Lee, Jesse Boettcher, David Hendler Sloo, Michael Mizono, Tomas Brennessl,
James Simister, and Anton Davydov. "Home security system with automatic
context-sensitive transition to different modes." U.S. Patent 9,501,924, issued
November 22, 2016.
[3] Islam, Kamrul, Weiming Shen, and Xianbin Wang. "Security and privacy
considerations for wireless sensor networks in smart home environments." In
Computer Supported Cooperative Work in Design (CSCWD), 2012 IEEE 16th
International Conference on, pp. 626-633. IEEE, 2012.
[4] Kumar, Pardeep, Andrei Gurtov, Jari Iinatti, Mika Ylianttila, and Mangal Sain.
"Lightweight and secure session-key establishment scheme in smart home
environments." IEEE Sensors Journal 16, no. 1 (2016): 254-264.
[5] Peter, Sherin, and Raju K. Gopal. "Multi-level authentication system for smart
home-security analysis and implementation." In Inventive Computation
Technologies (ICICT), International Conference on, vol. 2, pp. 1-7. IEEE, 2016.
[6] Stout, William MS, and Vincent E. Urias. "Challenges to securing the Internet
of Things." In Security Technology (ICCST), 2016 IEEE International Carnahan
Conference on, pp. 1-8. IEEE, 2016.
59
60
61
62