Performance and Accuracy Enhancement of Cloud Environment During Precision Agriculture

Authors

  • Ram Lakhan M. Tech. Scholar, Department of CSE, JCDM College of Engineering, Sirsa, Haryana, India Author
  • Er. Krishan Kumar Assistant Professor, Department of CSE, JCDM College of Engineering, Sirsa, Haryana, India Author

DOI:

https://doi.org/10.32628/CSEIT24104101

Keywords:

Agriculture Precision, Intelligent Solution, Cloud Computing

Abstract

In precision agriculture, the data acquired by sensors are classified into groups according to a variety of parameters, including the existence of animals, the degree to which soil nutrition is present, and the quantity of soil moisture. In the event that any unfavorable conditions take place, a signal of warning will be sent. On the other side, if the conditions are right, the surgical procedure won't be done at all. Several recently concluded research projects related to intelligent solutions for healthcare and agricultural problems have made use of a variety of techniques from the disciplines of cloud computing, IoT, and wearable robots. These methodologies were used in the study. Enhancing the performance and accuracy of cloud environments for use in precision agriculture is the primary emphasis of the research being done at the moment. The problem-solving aspects of the area have often been the focal point of the study that has been carried out in relation to this issue. Despite this, there are still many obstacles to overcome with regard to the implications of cloud computing and agricultural precision. One of these challenges is the necessity of including an accuracy mechanism in order to ensure the integrity of Agriculture precision while it is operating in an environment that includes Cloud Computing. This is a necessity because one of these challenges is the necessity of including an accuracy mechanism. In addition to this, the traditional approaches to research need to be enhanced in order to deliver a greater degree of accuracy.

Downloads

Download data is not yet available.

References

Bushra Zaheer Abbasi, Munam Ali Shah 2022, Fog Computing: Security Issues, Solutions and Robust Practices, Proceedings of 23rd International Conference on Automation and Computing, University of Huddersfield, Hudders field, UK, 7-8September 2022

Nabil Abubaker, Leonard Dervishi and ErmanAyday2022, Privacy-Preserving Fog Computing Paradigm, The 3rd IEEE Workshop on Security and PrivaAcy in Cloud (SPC 2022)

Yunguo Guan, Jun Shao, GuiyiWei, Data Security and Privacy in Fog Computing, 0890-8044/18/$25.00 © 2022 IEEE

Jiyuan Zhou 2021, A Hierarchic Secure Cloud Storage Scheme based on Fog Computing, 2021 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress

Mohamed Firdhous, Osman Ghazali, Suhaidi Hassan 2021, Fog Computing: Will it be Future of Cloud Computing?ISBN: 978-1-941968-00-0 ©2014 SDIWC

M.Georgescu and M.Matei 2022, The value of cloud computing in business environment, The USV Annals of Economics and Public Administration, vol.13, no.1, pp. 222--228, 2022.

S.Malkowski, Y.Kanemasa, H.Chen, M.Yamamoto, Q.Wang, D.Jayasinghe, C.Pu, and M.Kawaba 2012, Challenges and opportunities in consolidation at high resource utilization: Non-monotonic response time variations in n-tier applications, in Fifth IEEE International Conference on Cloud Computing, Honolulu, HI, USA, 2012, pp. 162--169. DOI: https://doi.org/10.1109/CLOUD.2012.99

Zhao, Q., & Liu, X. (2014b, May 1). Cluster Key Management Scheme for Wireless Sensor Networks. Www.atlantis-Press.com; Atlantis Press. https://doi.org/10.2991/ictcs-14.2014.23. DOI: https://doi.org/10.2991/ictcs-14.2014.23

Diop, A., Qi, Y., & Wang, Q. (2014). Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks. International Journal of Computer Network and Information Security, 6(8), 9–18. https://doi.org/10.5815/ijcnis.2014.08.02. DOI: https://doi.org/10.5815/ijcnis.2014.08.02

Bao, X., Liu, J., She, L., & Zhang, S. (2014, June 1). A key management scheme based on grouping within cluster. IEEE Xplore. https://doi.org/10.1109/WCICA.2014.7053290. DOI: https://doi.org/10.1109/WCICA.2014.7053290

Abdallah, W., Boudriga, N., Kim, D., & An, S. (2015, July 1). An efficient and scalable key management mechanism for Wireless Sensor Networks. IEEE Xplore. https://doi.org/10.1109/ICACT.2015.7224913. DOI: https://doi.org/10.1109/ICACT.2015.7224913

Patel, V., & Gheewala, J. (2015, June 1). An Efficient Session Key Management Scheme for Cluster Based Wireless Sensor Networks. IEEE Xplore. https://doi.org/10.1109/IADCC.2015.7154847. DOI: https://doi.org/10.1109/IADCC.2015.7154847

Hemapriya, K., & Gomathy, K. (2007). IJARCCE A Survey Paper of Cluster based Key Management Techniques for Secured Data Transmission in Manet. International Journal of Advanced Research in Computer and Communication Engineering ISO, 3297. https://doi.org/10.17148/IJARCCE.2016.510102.

Raut, R., Varma, H., Mulla, C., & Pawar, V. R. (2017). Soil Monitoring, Fertigation, and Irrigation System Using IoT for Agricultural Application. Intelligent Communication and Computational Technologies, 67–73. https://doi.org/10.1007/978-981-10-5523-2_7. DOI: https://doi.org/10.1007/978-981-10-5523-2_7

Keswani, B., Mohapatra, A. G., Mohanty, A., Khanna, A., Rodrigues, J. J. P. C., Gupta, D., & de Albuquerque, V. H. C. (2018). Adapting weather conditions based IoT enabled smart irrigation technique in precision agriculture mechanisms. Neural Computing and Applications, 31(S1), 277–292. https://doi.org/10.1007/s00521-018-3737-1 DOI: https://doi.org/10.1007/s00521-018-3737-1

Feng, X., Yan, F., & Liu, X. (2019). Study of Wireless Communication Technologies on Internet of Things for Precision Agriculture. Wireless Personal Communications, 108(3), 1785–1802. https://doi.org/10.1007/s11277-019-06496-7. DOI: https://doi.org/10.1007/s11277-019-06496-7

Thakur, D., Kumar, Y., Kumar, A., & Singh, P. K. (2019). Applicability of Wireless Sensor Networks in Precision Agriculture: A Review. Wireless Personal Communications, 107(1), 471–512. https://doi.org/10.1007/s11277-019-06285-2. DOI: https://doi.org/10.1007/s11277-019-06285-2

Lalitha, T., & Umarani, R. (2011b). Energy Efficient Cluster Based Key Management Technique for Wireless Sensor Networks. Oriental Journal of Computer Science and Technology, 4(2), 293–304. http://www.computerscijournal.org/vol4no2/energy-efficient-cluster-based-key-management-technique-for-wireless-sensor-networks/.

Gómez-Chabla, R., Real-Avilés, K., Morán, C., Grijalva, P., & Recalde, T. (2019). IoT Applications in Agriculture: A Systematic Literature Review (R. Valencia-García, G. Alcaraz-Mármol, J. del Cioppo-Morstadt, N. Vera-Lucio, & M. Bucaram-Leverone, Eds.). Springer Link; Springer International Publishing. https://doi.org/10.1007/978-3-030-10728-4_8. DOI: https://doi.org/10.1007/978-3-030-10728-4_8

Mittal, N. (2018). Moth Flame Optimization Based Energy Efficient Stable Clustered Routing Approach for Wireless Sensor Networks. Wireless Personal Communications, 104(2), 677–694. https://doi.org/10.1007/s11277-018-6043-4. DOI: https://doi.org/10.1007/s11277-018-6043-4

Khanna, A., & Kaur, S. (2019). Evolution of Internet of Things (IoT) and its significant impact in the field of Precision Agriculture. Computers and Electronics in Agriculture, 157, 218–231. https://doi.org/10.1016/j.compag.2018.12.039. DOI: https://doi.org/10.1016/j.compag.2018.12.039

Naresh, V. S., Reddi, S., & Murthy, N. V. E. S. (2019). A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks. Human-Centric Computing and Information Sciences, 9(1). https://doi.org/10.1186/s13673-019-0186-5. DOI: https://doi.org/10.1186/s13673-019-0186-5

Dewi, C., & Chen, R.-C. (2019). Decision Making Based on IoT Data Collection for Precision Agriculture. Intelligent Information and Database Systems: Recent Developments, 31–42. https://doi.org/10.1007/978-3-030-14132-5_3. DOI: https://doi.org/10.1007/978-3-030-14132-5_3

Gsangaya, K. R., Hajjaj, S. S. H., Sultan, M. T. H., & Hua, L. S. (2020). Portable, wireless, and effective internet of things-based sensors for precision agriculture. International Journal of Environmental Science and Technology. https://doi.org/10.1007/s13762-020-02737-6. DOI: https://doi.org/10.1007/s13762-020-02737-6

Symeonaki, Arvanitis, & Piromalis. (2020). A Context-Aware Middleware Cloud Approach for Integrating Precision Farming Facilities into the IoT toward Agriculture 4.0. Applied Sciences, 10(3), 813. https://doi.org/10.3390/app10030813. DOI: https://doi.org/10.3390/app10030813

Gautam, A. K., & Kumar, R. (2021). A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks. SN Applied Sciences, 3(1). https://doi.org/10.1007/s42452-020-04089-9. DOI: https://doi.org/10.1007/s42452-020-04089-9

Senthil, G. A., Raaza, A., & Kumar, N. (2021). Internet of Things Energy Efficient Cluster-Based Routing Using Hybrid Particle Swarm Optimization for Wireless Sensor Network. Wireless Personal Communications. https://doi.org/10.1007/s11277-021-09015-9. DOI: https://doi.org/10.1007/s11277-021-09015-9

P, Ajay., Sharma, A., V, D. G., Sharma, A., S, K., & Arun, M. R. (2022, May 1). Priority Queueing Model-Based IoT Middleware for Load Balancing. IEEE Xplore. https://doi.org/10.1109/ICICCS53718.2022.9788218. DOI: https://doi.org/10.1109/ICICCS53718.2022.9788218

Dankan Gowda, V., Sharma, A., Nagabushanam, M., Govardhana Reddy, H. G., & Raghavendra, K. (2022). Vector space modelling-based intelligent binary image encryption for secure communication. Journal of Discrete Mathematical Sciences and Cryptography, 1–15. https://doi.org/10.1080/09720529.2022.2075090. DOI: https://doi.org/10.1080/09720529.2022.2075090

Ara, A., Sharma, A., & Yadav, D. (2022). An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies. Journal of Discrete Mathematical Sciences and Cryptography, 1–19. https://doi.org/10.1080/09720529.2022.2075089. DOI: https://doi.org/10.1080/09720529.2022.2075089

Anand, S., & Sharma, A. (2021, December 1). Hybrid Security Mechanism to Enhance the Security and Performance of IoT System. IEEE Xplore. https://doi.org/10.1109/TRIBES52498.2021.9751455. DOI: https://doi.org/10.1109/TRIBES52498.2021.9751455

Anand, S., & Sharma, A. (2022). An Advanced and Efficient Cluster Key Management Scheme for Agriculture Precision IoT Based Systems. International Journal of Electrical and Electronics Research, 10(2), 264–269. https://doi.org/10.37391/ijeer.100235. DOI: https://doi.org/10.37391/ijeer.100235

Anand, S., & Sharma, A. (2020). Assessment of security threats on IoT based applications. Materials Today: Proceedings. https://doi.org/10.1016/j.matpr.2020.09.350. DOI: https://doi.org/10.1016/j.matpr.2020.09.350

V. Namboodiri, V. Aravinthan, S. Mohapatra, B. Karimi and W. Jewell, "Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids", IEEE Systems Journal, vol. 8, no. 2, pp. 509-520, 2014. DOI: https://doi.org/10.1109/JSYST.2013.2260700

Jurcut, A. D., Ranaweera, P., & Xu, L. (2019). Introduction to IoT Security. Wiley 5G Ref, 1–39. https://doi.org/10.1002/9781119471509.w5gref260. DOI: https://doi.org/10.1002/9781119471509.w5GRef260

Attkan, A., & Ranga, V. (2022). Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security. Complex & Intelligent Systems. https://doi.org/10.1007/s40747-022-00667-z. DOI: https://doi.org/10.1007/s40747-022-00667-z

Ghani, A., Mansoor, K., Mehmood, S., Chaudhry, S. A., Rahman, A. U., & Najmus Saqib, M. (2019). Security and key management in IoT-based wireless sensor networks: An authentication protocol using symmetric key. International Journal of Communication Systems, 32(16), e4139. https://doi.org/10.1002/dac.4139. DOI: https://doi.org/10.1002/dac.4139

Gupta, D. N., & Kumar, R. (2021). Multi-Layer and Clustering-Based Security Implementation for an IoT Environment. International Journal of System Dynamics Applications (IJSDA), 11(2), 1–21. https://doi.org/10.4018/IJSDA.20220701.oa3. DOI: https://doi.org/10.4018/IJSDA.20220701.oa3

Wang, Q., & Li, H. (2022). Application of IoT Authentication Key Management Algorithm to Personnel Information Management. Computational Intelligence and Neuroscience, 2022, e4584072. https://doi.org/10.1155/2022/4584072. DOI: https://doi.org/10.1155/2022/4584072

Khan, A., Ahmad, A., Ahmed, M., Sessa, J., & Anisetti, M. (2022). Authorization schemes for internet of things: requirements, weaknesses, future challenges and trends. Complex & Intelligent Systems. https://doi.org/10.1007/s40747-022-00765-y. DOI: https://doi.org/10.1007/s40747-022-00765-y

Hwang, C.-E., Lee, S.-H., & Jeong, J.-W. (2019). VisKit: Web-Based Interactive IoT Management with Deep Visual Object Detection. Journal of Sensor and Actuator Networks, 8(1), 12. https://doi.org/10.3390/jsan8010012. DOI: https://doi.org/10.3390/jsan8010012

Downloads

Published

03-07-2024

Issue

Section

Research Articles

How to Cite

[1]
Ram Lakhan and Er. Krishan Kumar, “Performance and Accuracy Enhancement of Cloud Environment During Precision Agriculture”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 10, no. 4, pp. 01–08, Jul. 2024, doi: 10.32628/CSEIT24104101.

Similar Articles

1-10 of 150

You may also start an advanced similarity search for this article.