This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
CLOUD CONTROLLED SECURITY SURVEILLANCE FOR INTRUSION DETECTION IN I.T. INFRASTRUCTURE
Authors
  U.MUTHUMATHI VATHANA,  K.REVATHY
Abstract
A system delivers comfort, energy efficiency and security, by providing control and monitoring of illumination, heating, ventilation, air conditioning, appliances, security surveillance, multimedia and other systems. Security surveillance systems are an integral part of numerous systems. Own cloud services are used in IT infrastructure around the world to control and monitor cloud connected IT infrastructure remotely.Cloud is based on the standard cloud computing model, in which services available to the general public over the internet as long as they use the web interface. The camera is used to detect motion. In case of an intrusion event the camera will automatically start to record the video and save to the cloud controlled website, another cloud service alerts the user with a SMS conversation. The user can then monitor the intrusion from anywhere, on any Internet enable device by accessing the cloud’s web interface. If the intrusion is genuine, the user is provided with options to stealthily alert neighbours, play alarm sounds or even report to the police. Using these techniques, burglary can be evaded effectively and own cloud services which can be used in IT industry around the world to control and monitor cloud connected automation system remotely.
Keywords- burglary; intrusion detection; motion detection.;alarm;cloud controlled security.
Publication Details
Unique Identification Number - IJEDR1402080Page Number(s) - 1777-1782Pubished in - Volume 2 | Issue 2 | June 2014DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  U.MUTHUMATHI VATHANA,  K.REVATHY,   "CLOUD CONTROLLED SECURITY SURVEILLANCE FOR INTRUSION DETECTION IN I.T. INFRASTRUCTURE", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.2, Issue 2, pp.1777-1782, June 2014, Available at :http://www.ijedr.org/papers/IJEDR1402080.pdf
Article Preview
|
|
||||||
|