scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Multimedia cloud transmission and storage system based on internet of things

01 Sep 2017-Multimedia Tools and Applications (Springer US)-Vol. 76, Iss: 17, pp 17735-17750
TL;DR: This paper introduced the concept of multimedia protection into the method based on role access control, and adopted a scheme based on the combination of multimedia data state and roleAccess control that can be used to resist the known attacks.
Abstract: For the issues of large space and storage security of multimedia files, we analyzed the impact of access control and cloud storage on multimedia file, and proposed a mixed security cloud storage framework based on Internet of Things. This paper introduced the concept of multimedia protection into the method based on role access control. Moreover, we also adopted a scheme based on the combination of multimedia data state and role access control. At the same time, all input and output devices were connected to this system. Internet of Things is used to judge whether circuits are connected and whether the devices are normally operated, so as to improve the access efficiency. On this basis, we also described in detail the complete process of registration, role assignment, multimedia file owner's request for data encryption, and user login and access to multimedia file. According to the result, this scheme can be used to resist the known attacks. It guarantees security of multimedia files.
Citations
More filters
Journal ArticleDOI
TL;DR: The Corvus corone module two-way image transmission is proposed that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.
Abstract: The manufacturing of intelligent and secure visual data transmission over the wireless sensor network is key requirement nowadays to many applications. The two-way transmission of image under a wireless channel needed image must compatible along channel characteristics such as band width, energy-efficient, time consumption and security because the image adopts big space under the device of storage and need a long time that easily undergoes cipher attacks. Moreover, Quizzical the problem for the additional time under compression results that, the secondary process of the compression followed through the acquisition consumes more time.,Hence, for resolving these issues, compressive sensing (CS) has emerged, which compressed the image at the time of sensing emerges as a speedy manner that reduces the time consumption and saves bandwidth utilization but fails under secured transmission. Several kinds of research paved path to resolve the security problems under CS through providing security such as the secondary process.,Thus, concerning the above issues, this paper proposed the Corvus corone module two-way image transmission that provides energy efficiency along CS model, secured transmission through a matrix of security under CS such as inbuilt method, which was named as compressed secured matrix and faultless reconstruction along that of eminent random matrix counting under CS.,Experimental outputs shows intelligent module gives energy efficient, secured transmission along lower computational timing also decreased bit error rate.

252 citations

Journal ArticleDOI
TL;DR: A new Q-learning-based transmission scheduling mechanism using deep learning for the CIoT is proposed to solve the problem of how to achieve the appropriate strategy to transmit packets of different buffers through multiple channels to maximize the system throughput.
Abstract: Cognitive networks (CNs) are one of the key enablers for the Internet of Things (IoT), where CNs will play an important role in the future Internet in several application scenarios, such as healthcare, agriculture, environment monitoring, and smart metering. However, the current low packet transmission efficiency of IoT faces a problem of the crowded spectrum for the rapidly increasing popularities of various wireless applications. Hence, the IoT that uses the advantages of cognitive technology, namely the cognitive radio-based IoT (CIoT), is a promising solution for IoT applications. A major challenge in CIoT is the packet transmission efficiency using CNs. Therefore, a new Q-learning-based transmission scheduling mechanism using deep learning for the CIoT is proposed to solve the problem of how to achieve the appropriate strategy to transmit packets of different buffers through multiple channels to maximize the system throughput. A Markov decision process-based model is formulated to describe the state transformation of the system. A relay is used to transmit packets to the sink for the other nodes. To maximize the system utility in different system states, the reinforcement learning method, i.e., the Q learning algorithm, is introduced to help the relay to find the optimal strategy. In addition, the stacked auto-encoders deep learning model is used to establish the mapping between the state and the action to accelerate the solution of the problem. Finally, the experimental results demonstrate that the new action selection method can converge after a certain number of iterations. Compared with other algorithms, the proposed method can better transmit packets with less power consumption and packet loss.

240 citations

Journal ArticleDOI
TL;DR: This paper proposed two-way image transmission to the Corvus Coron module, which presents an energy-effective with the CS model, as an inbuilt interaction in the CS transmission through the security framework, which results in energy-efficient and conserved transmission in the form of low error rate with low computational time.
Abstract: Two-way image communication in a wireless channel needs to be viable with channel properties such as transfer speed, energy-effective, time usage, and security because image capability consumes a huge space in the gadget and is quite effective. Is required in a manner. The figure goes through attacks. In addition, the quiesical issue for additional time of pressure is that the auxiliary interaction of pressure occurs through the dewar receiving extra time. To address these issues, compressed sensing emerges, which packs the image into hours of sensing, is generated in an expedient manner that reduces time usage and saves the use of data transfer capability, however Bomb in transmission. A variety of examinations cleared a way for dealing with security issues in compressive sensing (CS) through giving security as an alternative negotiation. In addition, univariate factors opted for CS as the issue of rearranging image quality is because of the aggregation of clutter. Along these lines related to the above issues, this paper proposed two-way image transmission to the Corvus Coron module, which presents an energy-effective with the CS model, as an inbuilt interaction in the CS transmission through the security framework. Receives what was designated as the pack-protected plot. Impeccable entertainment with the famous arbitrary network conjecture in CS. The result of the test is that the practical module presents energy-efficient and conserved transmission in the form of low error rate with low computational time.

230 citations

Journal ArticleDOI
TL;DR: This research focuses on the smart employment of internet of Multimedia sensors in smart farming to optimize the irrigation process and showed that the use of deep learning proves to be superior in the Internet ofmultimedia Things environment.
Abstract: Efficiently managing the irrigation process has become necessary to utilize water stocks due to the lack of water resources worldwide. Parched plant leads into hard breathing process, which would result in yellowing leaves and sprinkles in the soil. In this work, yellowing leaves and sprinkles in the soil have been observed using multimedia sensors to detect the level of plant thirstiness in smart farming. We modified the IoT concepts to draw an inspiration towards the perspective vision of ’Internet of Multimedia Things’ (IoMT). This research focuses on the smart employment of internet of Multimedia sensors in smart farming to optimize the irrigation process. The concepts of image processing work with IOT sensors and machine learning methods to make the irrigation decision. sensors reading have been used as training data set indicating the thirstiness of the plants, and machine learning techniques including the state-of-the-art deep learning were used in the next phase to find the optimal decision. The conducted experiments in this research are promising and could be considered in any smart irrigation system. The experimental results showed that the use of deep learning proves to be superior in the Internet of Multimedia Things environment.

95 citations

Journal ArticleDOI
24 Mar 2016
TL;DR: A network virtual reality (VR) engine for interactive analysis and smart city immersive visualization which integrates several latest information technologies, i.e., Web virtual reality, Internet of Things, and 3-D geographical information system with peer-to-peer (P2P) network, has been proposed in this study.
Abstract: A network virtual reality (VR) engine for interactive analysis and smart city immersive visualization which integrates several latest information technologies, i.e., Web virtual reality (WebVR), Internet of Things (IoT), and three-dimensional (3-D) geographical information system (3-DGIS) with peer-to-peer (P2P) network, has been proposed in this study. It can be used in big spatial data (e.g., remote sensing data) organization and presentation while achieving the online sharing by hash-based P2P networks. In the P2P network, a map, which contains the real geographic space users and the virtual scene user avatar with prep the virtual network nodes, has been made. Moreover, it can also support the following integrated functions of VRGIS: 3-D spatial analysis function, 3-D visualization for spatial information process, and Web engine for 3-D globe and smart big city. To evaluate WebVRGIS system, a user study had been conducted by comparing it with virtual community system. The performance evaluation results had confirmed the higher usability and user satisfaction of the proposed WebVRGIS system.

88 citations


Cites methods from "Multimedia cloud transmission and s..."

  • ...D virtual scene, including: point measurement, line measurement, face measurement, volume measurement, contour analysis, flooding analysis, muter-invisibility analysis, shadow analysis, path analysis, etc....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: A survey of cloud computing is presented, highlighting its key concepts, architectural principles, state-of-the-art implementation as well as research challenges to provide a better understanding of the design challenges of cloud Computing and identify important research directions in this increasingly important area.
Abstract: Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for provisioning, and allows enterprises to start from the small and increase resources only when there is a rise in service demand. However, despite the fact that cloud computing offers huge opportunities to the IT industry, the development of cloud computing technology is currently at its infancy, with many issues still to be addressed. In this paper, we present a survey of cloud computing, highlighting its key concepts, architectural principles, state-of-the-art implementation as well as research challenges. The aim of this paper is to provide a better understanding of the design challenges of cloud computing and identify important research directions in this increasingly important area.

3,465 citations

Journal ArticleDOI
TL;DR: A multimedia-aware cloud is presented, which addresses how a cloud can perform distributed multimedia processing and storage and provide quality of service (QoS) provisioning for multimedia services, and a media-edge cloud (MEC) architecture is proposed, in which storage, central processing unit (CPU), and graphics processing units (GPU) clusters are presented at the edge.
Abstract: This article introduces the principal concepts of multimedia cloud computing and presents a novel framework. We address multimedia cloud computing from multimedia-aware cloud (media cloud) and cloud-aware multimedia (cloud media) perspectives. First, we present a multimedia-aware cloud, which addresses how a cloud can perform distributed multimedia processing and storage and provide quality of service (QoS) provisioning for multimedia services. To achieve a high QoS for multimedia services, we propose a media-edge cloud (MEC) architecture, in which storage, central processing unit (CPU), and graphics processing unit (GPU) clusters are presented at the edge to provide distributed parallel processing and QoS adaptation for various types of devices.

439 citations

Journal ArticleDOI
TL;DR: This paper proposes a role-based encryption (RBE) scheme that integrates the cryptographic techniques with RBAC, and presents a secure RBE-based hybrid cloud storage architecture that allows an organization to store data securely in a public cloud, while maintaining the sensitive information related to the organization's structure in a private cloud.
Abstract: With the rapid developments occurring in cloud computing and services, there has been a growing trend to use the cloud for large-scale data storage. This has raised the important security issue of how to control and prevent unauthorized access to data stored in the cloud. One well known access control model is the role-based access control (RBAC), which provides flexible controls and management by having two mappings, users to roles and roles to privileges on data objects. In this paper, we propose a role-based encryption (RBE) scheme that integrates the cryptographic techniques with RBAC. Our RBE scheme allows RBAC policies to be enforced for the encrypted data stored in public clouds. Based on the proposed scheme, we present a secure RBE-based hybrid cloud storage architecture that allows an organization to store data securely in a public cloud, while maintaining the sensitive information related to the organization's structure in a private cloud. We describe a practical implementation of the proposed RBE-based architecture and discuss the performance results. We demonstrate that users only need to keep a single key for decryption, and system operations are efficient regardless of the complexity of the role hierarchy and user membership in the system.

353 citations

Journal ArticleDOI
TL;DR: This study is the first to provide general media-aware security architecture by jointly considering the characteristics of multimedia traffic, security service, and the Internet of Things.
Abstract: An important challenge for supporting multimedia applications in the Internet of Things is the security heterogeneity of wired and wireless sensor and actuator networks. In this work, we design a new and efficient media-aware security framework for facilitating various multimedia applications in the Internet of Things. First, we present a novel multimedia traffic classification and analysis method for handling the heterogeneity of diverse applications. Then a media-aware traffic security architecture is proposed based on the given traffic classification to enable various multimedia services being available anywhere and anytime. Furthermore, we provide a design rule and strategy to achieve a good trade-off between a system?s flexibility and efficiency. To the best of our knowledge, this study is the first to provide general media-aware security architecture by jointly considering the characteristics of multimedia traffic, security service, and the Internet of Things.

286 citations

Journal ArticleDOI
06 Mar 2013-PLOS ONE
TL;DR: This work uses the Unity3D game engine to develop and prototype a biological network and molecular visualization application for subsequent use in research or education and considers this work as a proof of principle demonstrating that the functionalities of classical viewers and more advanced novel features could be implemented in substantially less time and with less development effort.
Abstract: The video games industry develops ever more advanced technologies to improve rendering, image quality, ergonomics and user experience of their creations providing very simple to use tools to design new games. In the molecular sciences, only a small number of experts with specialized know-how are able to design interactive visualization applications, typically static computer programs that cannot easily be modified. Are there lessons to be learned from video games? Could their technology help us explore new molecular graphics ideas and render graphics developments accessible to non-specialists? This approach points to an extension of open computer programs, not only providing access to the source code, but also delivering an easily modifiable and extensible scientific research tool. In this work, we will explore these questions using the Unity3D game engine to develop and prototype a biological network and molecular visualization application for subsequent use in research or education. We have compared several routines to represent spheres and links between them, using either built-in Unity3D features or our own implementation. These developments resulted in a stand-alone viewer capable of displaying molecular structures, surfaces, animated electrostatic field lines and biological networks with powerful, artistic and illustrative rendering methods. We consider this work as a proof of principle demonstrating that the functionalities of classical viewers and more advanced novel features could be implemented in substantially less time and with less development effort. Our prototype is easily modifiable and extensible and may serve others as starting point and platform for their developments. A webserver example, standalone versions for MacOS X, Linux and Windows, source code, screen shots, videos and documentation are available at the address: http://unitymol.sourceforge.net/.

274 citations