Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Das, Niva
- Exploring Web of Things with Embedded Devices
Abstract Views :120 |
PDF Views:0
Authors
Tanmoy Sarkar
1,
Niva Das
2
Affiliations
1 Neudesic India Pvt. Limited, Hyderabad, IN
2 Kellton Tech Solutions Limited, Hyderabad, IN
1 Neudesic India Pvt. Limited, Hyderabad, IN
2 Kellton Tech Solutions Limited, Hyderabad, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 3 (2015), Pagination: 2719-2723Abstract
In recent years IoT (Internet of Things) is gaining interest among researchers and many IoT development platforms, SDK's have been proposed. There are lots of low powered, efficient devices available in market which can be used to create IoT solutions. The main drawbacks of IoT is that every manufacture proposed it owns protocol and provide their own API's to work with it. You need to be an avid programmer to implement, understand, customized and use this API's. Since lots of these libraries are open source not much information can be gathered online. To solve this protocol agnostic problem in IoT many researchers are now focusing on WoT i.e. Web of Things. The main advantage of implementing WoT is that we can use familiar Web protocols to build up our solutions. In this paper we will discuss SOA architecture, proposing a high level WoT network implementation at home-using embedded devices and Web protocols like REST web services and JavaScript to achieve interoperability. We will also discuss security concerns in WoT and best practices to avoid vulnerabilities.Keywords
WoT, Web of Things, IoT, Internet of Things, REST, SOA.- Securing Cloud from Cloud Drain
Abstract Views :112 |
PDF Views:0
Authors
Niva Das
1,
Tanmoy Sarkar
2
Affiliations
1 Department of Information Technology, University of Calcutta, Kolkata, IN
2 Neudesic India Pvt. Limited, Hyderabad, IN
1 Department of Information Technology, University of Calcutta, Kolkata, IN
2 Neudesic India Pvt. Limited, Hyderabad, IN
Source
International Journal of Advanced Networking and Applications, Vol 6, No 2 (2014), Pagination: 2262-2265Abstract
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role. The underlying concept of cloud computing dates back to the '50s but the term entering into widespread usage can be traced to 2006 when Amazon.com announced the Elastic Compute Cloud. In this paper, we will discuss about cloud security approaches. We have used the term "Cloud- Drain" to define data leakage in case of security compromise.Keywords
Security, Cloud Security, Cloud Drain.- Survey on Host and Network Based Intrusion Detection System
Abstract Views :123 |
PDF Views:0
Authors
Niva Das
1,
Tanmoy Sarkar
2
Affiliations
1 Department of Information Technology, University of Calcutta, Kolkata, IN
2 Neudesic India Pvt. Limited, Hyderabad, IN
1 Department of Information Technology, University of Calcutta, Kolkata, IN
2 Neudesic India Pvt. Limited, Hyderabad, IN