Analysis of the IOT Sensors and Networks with Big Data and Sharing the Data through Cloud Platform
Subrata Chowdhury1, Ramya Govindaraj2, Sharma Shumbhu Nath3, Kingsleen Solomon4

1Subrata Chowdhury, Vels Institute of Science, Technology & Advanced Studies, Vels University Pallavaram, Chennai (Tamil Nadu), India.

2Ramya Govindaraj, Assistant Professor, Satellite Instructional Television Experiment, Vellore Institute of Technology University, Vellore (Tamil Nadu), India.

3Sharma Shumbhu Nath, Vels Institute of Science, Technology & Advanced Studies, Vels University, Pallavaram (Tamil Nadu), India.

4Kingsleen Solomon, Vels Institute of Science, Technology & Advanced Studies, Vels University, Pallavaram, Chennai (Tamil Nadu), India.

Manuscript received on 05 March 2019 | Revised Manuscript received on 12 March 2019 | Manuscript Published on 20 March 2019 | PP: 405-408 | Volume-8 Issue- 4S2 March 2019 | Retrieval Number: D1S0088028419/2019©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (

Abstract: Wearable gadgets are at present at the core of pretty much every talk identified with the Internet of Things. The prerequisite for self-wellbeing checking and the preventive prescription is expanding because of the anticipated sensational increment in the number of elderly individuals until 2020. Created advances are really ready to decrease the general expenses for counteractive action and observing. This is conceivable by continually observing wellbeing pointers in different regions, and specifically, wearable gadgets are considered to make this undertaking. These wearable gadgets and versatile applications presently have been coordinated with telemedicine and tele health effectively, to structure the restorative Internet of Things. Zfing hubs. With the end goal to ensure clients’ protection and makers’ IP, and identifying and blocking noxious action, this examination paper proposes security arranged it engineering following the provenance strategy. This guarantees the IoT information might be conveyed to the hubs that buy-in to get the data. Utilizing the provenance the strategy to guarantee high straightforwardness, the work can give follow courses to a computerized review trail. A few experimental assessments are led in a certifiable wearable IoT biological system to demonstrate the predominance of the proposed work.

Keywords: Big Data, Internet of Things (IoT), RFID, Cloud Computing, Machine to Machine, Sensor Networks.
Scope of the Article: Big Data