Journal of Computing::Automatic Management of ...

18 downloads 54306 Views 436KB Size Report
build situation-aware applications and make accessible ... A device that can apply and execute ... consumers of SaaS applications as the entire network is.
Vol. 5, No. 2 February 2014

ISSN 2079-8407

Journal of Emerging Trends in Computing and Information Sciences ©2009-2014 CIS Journal. All rights reserved. http://www.cisjournal.org

Automatic Management of Wireless Sensor Networksthrough Cloud Computing 1

OmidBushehrian,2YousefEmami,3Reza Javidan

1, 2, 3

Department of Computer Engineering and Information Technology, Shiraz University of Technology, Shiraz, Iran

ABSTRACT With the faster adoption of wireless sensor networks (WSNs),on the one hand sensor-derived data need to be accessed via various Web-based social networks or virtual communities and on the other hand, limited processing ability of WSNs is a hurdle. To address this issue WSNs can be integrated with cloud. Cloud enjoys ample processing ability andis a capable infrastructure to deliver people-centric and context-aware services to users, thus expedites adoption of WSNs.In this paper anovel framework based on policy based network management is proposed to integrate WSNs with cloud, aimstoautomate and simplifies WSN’smanagement tasks. Keywords:Policy-Based Network Management, cloud computing, wireless sensor networks.

1. INTRODUCTION WSNs are widely deployed in diverse arenas the most important ones are Health care, environment, and weather, military, forecasting,Internetof things (IoT), smart homes and offices. Fast adopting of wireless sensor networks, mandate to link sensors with one another to build situation-aware applications and make accessible sensor-derived data via various Web-based social networks or virtual communities [1,6].Further, with the scale of WSN enlarging, the data volume is very huge, data source type is heterogeneous and process ability of WSN platform is very Limited, which are barriers forWSN’s data to be efficiently managed, stored and analyzed [2].Cloud computing make a better use of distributed resources, put them together in order to achieve higher throughput, and be able to tackle large-scale computation problems, further cloud is a capable infrastructure to deliver people-centric and context-aware services to users and[2,3].Maintenance dilemma comes about in WSNs and cloud integration since on the one hand users expects service level agreements to be satisfied and on the other hand service provider has to deal with many issues, storing and processing huge volume of generated data by WSNs with various formats and managing heterogeneous WSNs independently and react to any undesirable change in shortest time directly hence techniques are required to facilities and automate maintenance. Regarding policy-based network management promotes the automation of establishing management-level objectives over a wide range of systems devices, and can adapt rapidly to the changes in management requirements via run-time reconfiguration. In this paper policy based network management is utilized to automate WSNs management. Cloud can be imagined as virtual sink which gathers sensing data from WSNs thus it is good point for utilizing policy-based network management. Further change management has been added to cloud to guarantee standardized procedures are utilized to handle all changes to cloud.

The rest of this paper organized as follows: Section 2 presents literature review .Section 3 gives the fundamental of policy-based management, section 4presents the proposed framework.Finallysection5 concludes the paper.

2. LITERATURE REVEIW Buyya et al. [1] Presents a rather comprehensive framework for processing incoming data from WSNs to cloud and delivering it to appropriate users, the most obvious downside is not covering security aspects. Antonopoulos et al. [2] Comes with aperfect framework for cloud computing without covering WSN, the most

important merit is covering all necessary aspects of cloud computing including security and fault tolerant. The simple and suppressed framework in [6] just utilizestheinformation service layer to process incoming data from sensors and disregard basic tenet of cloud architecture like security. Introduced framework inAhmed et al. [7] suffers from mentioned weaknesses in [6] apart from using access control mechanism, no difference could be found. Rajesh et al.[8] Suggests WSNs to be integrated with cloud through service oriented paradigm in which Integration Controller upload sensed data to cloudand service oriented paradigm facilitates the interaction between sensor nodes and integration controller, the upside is internet controller, it is apotential single point of failure and performance bottleneck. Bao et al.[9] presents a framework supporting massive sensor data management based on Hadoop technology in cloud.Liu et al .[5] Introduces data format, complex event query, network bandwidth, maintenance dilemma and payment for services as big challenges in integrating WSN and cloud.

3. POLICY-BASED MANAGEMENT A policy is formally defined as an aggregation of policy rules. Each policy rule is composed of a set of conditions and acorresponding set of actions. The condition defines when the policy rule is applicable. Once a policy rule is activated, one or more actions contained by

93

Vol. 5, No. 2 February 2014

ISSN 2079-8407

Journal of Emerging Trends in Computing and Information Sciences ©2009-2014 CIS Journal. All rights reserved. http://www.cisjournal.org

that policy rule may be executed. Policy-based systems has been recognized as one of the best solution for implementing adaptive systems that dynamically change their behavior in response to changes in the environment or to changing application requirements. Policy-based management reduces maintenance costs of information and communication systems while improving flexibility and runtime adaptability. Policy-Based Management Architecture adopted in this paper isIETF, depicted in figure1 [4].

Fig 2:Event–condition–action PDP decision -making paradigm[3].

4. THE PROPOSED FRAMEWORK Figure 3 depicts the proposed framework. The cloud is connected with WSNs using 802.22and MPLS. It process, store and disseminate sensor data and utilize policy based network management to automate and simplifies WSN’s management tasks .The ingredients of the proposed framework are as follow:

Fig 1:The IETF Policy-Based Management Architecture [4] It consists of four elements: the policy management tool, the policy repository, the policy decision point, and the policy enforcement .The policy management tool is a user interface that allows administrators and network operators to create and manipulate policies. A device that can apply and execute the different policies is known as the policy enforcement point(PEP).A policy repository is a specific data store that holds policy rules, their conditions and actions, and related policy data. The policy decision point (PDP) is a logical entity that makes policy decisions for it or for other network elements that request such decisionstheutilized protocol for communicating between the PDP and the PEPs is not mandated by the standards and could be COPS, SNMP, or a proprietary command - line interface (CLI). The policy repository could be a network directory server accessed using the LDAP protocol. The utilized policies in this papersareEvent–Condition–Action ones. These policies describe management actions that should be taken in response to network or external events; provided that certain conditions hold further ECA policies use the provisioned policy paradigm depicted in figure 2. The policy decision point has access to a set of policy rules, stored in a policy repository, and provisions network elements or software components (PEPs) with configuration information based on what the rules dictate [3].

Fig 3: Cloud-Sensor Framework 4.1 SAAS This model provides services to clients on demand basis. A single instance of the service runs on the cloud can serve multiple end users. No investment is required on the client side for servers and End users can access the service over the Internet. Service examples

94

Vol. 5, No. 2 February 2014

ISSN 2079-8407

Journal of Emerging Trends in Computing and Information Sciences ©2009-2014 CIS Journal. All rights reserved. http://www.cisjournal.org

include: collaboration, business processes, industry applications, e-Health and CRM/EPR/HR[7,10]. 4.2 Virtualization Management Virtualization Management is the technology that abstracts the coupling between the hardware and operating system. It refers to the abstraction of logical resources away from their underlying physical resources in order to improve agility, flexibility, reduce costs, and thus

enhance business value [3]. 4.3 Publish/Subscribe Broker In this framework, sensor data are coming through gateways to a pub/sub broker. Pub/sub broker is required in the system to deliver information to the consumers of SaaS applications as the entire network is very dynamic. It has five components describes as follows: 4.3.1 Stream monitoring and processing component In some cases, the sensor stream be raw data that must be captured, filtered and analyzed in other cases, it is stored or cached. 4.3.2 Registry For each application, registry component stores user subscriptions of that application and sensor data types the application is interested in. 4.3.3 Application Analyzer When sensor data or events come to the pub-sub broker, analyzer component determines which applications they are belongs to and whether they need periodic or emergency deliver. The events are then passed to the disseminator component to deliver to appropriate users through SasS applications. 4.3.4 Disseminator For each SaaS application, it disseminates sensor data or events to subscribed users using the event matching algorithm. 4.3.5 Registry For each application, registry component stores user subscriptions of that application and sensor data types (temperature, light, pressure etc.) the application is interested in[1]. 4.3.6 Policy Analyzer The brain of the policy system is Policy Decision Point, It is the engine that evaluates policy rules and ensures that the appropriate actions are triggered as needed. Here, PDP analyzes the incoming sensor data to match with the values of all the variables referred to in all the conditions in defined policies. If the sensor data match with a condition the PDP determines what actions need to be taken, based on stored policy rules in policy repository; the target sensors perform the corresponding mandated actions by PDP, sensors deemed as policy enforcement point.

4.4 Management Services The management services compriseSLAs Management, Change Management, Deployment and Configuration, Monitoring and Reporting and Provisioning. 4.4.1 Service-Level Agreements Management A service-level agreement (SLA) is a negotiated agreement between customer and service provider, an SLA specifies the level of availability, serviceability, performance and operation. The ingredients of the SLA management process model are: roles, repositories and processes .The involved rules are service level manager, service level agreement and service level executor. Information and essential data for managing the SLAs are stored in repository. The involved processes are service delivery, service level monitoring and control, SLA agreement and continuous requirement gathering [4]. 4.4.2 Policy Management Policy managementconsists of role and repository.The involved role in policy management is policy manager he or she utilizes policy management software for policy related tasks .Repository is a data store for policy information[3]. 4.4.3 Change Management Change management is responsible for managing changes and the change process .It is an IT management discipline and the mission of change management processis to make sure standardized procedures are utilized to handle all changes to cloud in an efficient and quick way[4]. 4.4.4 Deployment and Configuration Right Scale Cloud Management Platform addresses three stages of the cloud application deployment lifecycle, namely design, manage, and deploy. Automated configuration and maintenance of individual or networked computers, from the policy specification, is very important in the computing arena. 4.4.5 Monitoring and Reporting This component tracks the usage of the primary cloud resource developing and monitors the SLA lifecycle. 4.4.6 Provisioning Provisioning hides the complexity of the enterprise cloud from application developers and empowers them to set up and configure complex application infrastructure with the Click of a button[3]. 4.5 Fault Tolerance In case of failure, there will be a hot backup instance of the application, which is ready to take over without disruption [3].

95

Vol. 5, No. 2 February 2014

ISSN 2079-8407

Journal of Emerging Trends in Computing and Information Sciences ©2009-2014 CIS Journal. All rights reserved. http://www.cisjournal.org

4.6 Security Security is one of the main obstacles for cloud provider. The key challenges of cloud security are performance, risk management. 4.6.1 Encryption/Decryption Customers who worry about the privacy of their information should encrypt their data before moving it to the cloud. 4.6.2 Authorization and Authentication In public clouds, safeguards must be placed on machines to ensure proper authentication and authorization.

[3]

RituChadha, Latha Kant,” Policy-Driven Mobile Ad hoc Network Management”, Wily Publication,2008

[4]

Jianguo Ding,”Advance in Network Management”Auerbach Publications,2010

[5]

RuoshuiLiu,Ian J. Wassell,”Opportunities and Challenges of Wireless Sensor Networks Using Cloud Services”, Proceedings of the workshop on Internet of Things and Service Platforms,2011

[6]

Pengfei You, YuxingPeng, Hang Gao,” Providing Information Services for Wireless Sensor Networks through Cloud Computing”,IEEE Asia-Pacific Services Computing Conference,pp.362-364,2012

[7]

Khandakar Ahmed,Mark Gregory,” Integrating Wireless Sensor Networks with Cloud Computing”Seventh International Conference on Mobile Ad-hoc and Sensor Networks,pp.364366,2011

4.6.3 Privacy

In cloud computing, a data center holds user’s information; this raises concerns regarding user privacy protection, since the users do not “own” their data [3].

5. CONCLUSION Policy-based network management promotes the automation of establishing management-level objectives over a wide range of systems devices, and can adapt rapidly to the changes in management requirements via run-time reconfiguration. In this paper, we proposed anovel framework for integrating WSNs with cloud, so that WSNs’ management, to facilitated and automated .In this regard, policy analyzer added to PUB/SUB Broker to find a policy match andmandates corresponding actions to sensors. Since incoming data have different types ,our next agenda is to propose a framework for consolidating various data types.

REFERENCES [1]RajkumarBuyya,JamesBroberg,AndrzejGoscinski,”CL OUD COMPUTINGPrinciples and Paradigms”,Wily Publication,2011 [2]

[8]Rajesh,J.M.Gnanasekar,.S.Ponmagal,P.Anbalagan,”Int egration of Wireless Sensor Network with Cloud”, International Conference on Recent Trends in Information, Telecommunication and Computing (ITC), pp.321-323,2010 [9]

Yuan Bao, Lei Ren, Lin Zhang, Xuesong Zhang, YongliangLuo,”Massive Sensor Data Management Framework in Cloud Manufacturing Based on Hadoop”, 10th IEEE International Conference on Industrial Informatics (INDIN) ,pp.397-401,2012

[10]

Sanjit Kumar Dash, SubasishMohapatra,Prasant Kumar Pattnaik,” A Survey on Applications of Wireless Sensor Network Using Cloud Computing”,International Journal of Computer Science & Emerging Technologies Vol.1,2010

Nick Antonopoulos LeeGillam,”Cloud Computing Principles, Systems and applications ”,Springer Publication,2010

96