Multi Cloud Access Using RFID
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Cloud is a data center that supplies hosted services to the people and it provides a scalable access to computing resources. At present, Cloud based Large Scale Big Data integration is still in Research Purpose. That too Cross Cloud is the most complex integration. Such analyses are not feasible to solve the problem. In our proposed system, we use Balanced Partition algorithm uses a easy way to classify a given data set through a certain number of clusters. This algorithm is used to prioritize the cloud data center. Cross Cloud is implemented by assigning Tasks to the various Web services. Different Tasks or same can be attained by different Cloud based on its availability. The future is our Implementation. We deploy Two Cloud Servers (Drop Box & Google drive) and one Big Data Database Storage (Mango DB). We Deploy Multi Access Smart Card Application. We Deploy Ration, Passport & Hospital Applications for User Access. User Personal Authentication included User Name, Password, Primary Key & RFID Card are all stored and Verified in Mango DB. Entire Data is splitted and stored in two servers parallely. User request is handled by the first Cloud and balance part is handled by another cloud in all Applications.
Authors and Affiliations
Nikitha V S, Priyadarshini S, Ms. N. Sripriya, V Renukadevi
Performance and Load Analysis of Lithium Ion Battery for Electric Vehicle Using Thermal Modeling in Ansys
The paper here studies about the behavior of Li-Ion Battery cell or battery pack under various fluctuating and combined loads. The thermal model of a unit cell is designed and they are assembled to form a battery pack....
Denoising Of Gaussian Noise Using Shrinkage Method with Daubechies Wavelet Transform
Image Denoising is a vital part in various image processing and computer application. The important role of a good image denoising algorithm is that it should entirely remove noise and preserving the edges. In this pape...
A rule based approach for detecting Phishing attacks
Phishing attacks are one of the emerging serious threats against personal data security. These attacks are often performed by sending out emails that seem to originate from a trusted party. The objective is to deceive t...
slugTriple Security of File System of Cloud Computing
Large scale distributed systems such as cloud computing applications are becoming very common. These applications come with increasing challenges on how to transfer and where to store and compute data. The most prevalen...
Design and Experimentation of Automatic Cloth Dyeing Machine
Dyeing is a method which enhances beauty of the textile by applying various colours and their shades on to a fabric. Colour is applied to fabric by different methods and at different stages of the textile production pro...