Advertisement

iPACS: a physical access control system as a service and mobile application

  • Euripides G. M. PetrakisEmail author
  • Filippos Antonopoulos
  • Stelios Sotiriadis
  • Nik Bessis
Original Research
  • 7 Downloads

Abstract

We present iPACS, an automated physical access control system as a cloud service for controlling users activity, navigation and access in large residential infrastructures (e.g. apartment buildings, shopping malls). The main idea is to install on buildings, beacon Bluetooth radio transmitters that broadcast their identifier to nearby devices (e.g. users’ mobile phones) and from there, transmit this information safely, together with other application and user data, to a private cloud. The service tracks people, monitors the overall activity in buildings and public venues and offers prompt response in cases of critical events (i.e. overcrowding, health incidents, attacks etc.). iPACS provides also services aiming to inform the infrastructure manager for possible increase of users activity or access requests that require permission based on subscriptions or authorization criteria. These services are deployed over secure private clouds capable of dealing safely with sensitive information while ensuring users privacy. Collectively, anonymous history (log) data are sent to a public cloud for analysis.

Keywords

Cloud computing Fog computing Internet of Things Bluetooth beacon sensors Physical access control system PACS 

Notes

References

  1. Antonopoulos F (2018) Access control system for large residential infrastructures on the cloud. Diploma thesis, School of Electrical and Computer Engineering, Technical University of Crete (TUC). http://www.intelligence.tuc.gr/show_publications.php?arg=PERSON_S&id=1&ptype=8. Accessed 21 Jan 2019
  2. Azmoodeh A, Dehghantanha A, Conti M, Choo K-KR (2018) Detecting crypto-ransomware in IoT networks based on energy consumption footprint. J Ambient Intell Hum Comput 9(4):1141–1152.  https://doi.org/10.1007/s12652-017-0558-5 CrossRefGoogle Scholar
  3. Bassi A, Bauer M, Fiedler M, Kramp T, Kranenburg R, Lange S, Meissner S (2013) Enabling things to talk: designing IoT solutions with the IoT architectural reference model. Springer, Heidelberg. https://www.springer.com/gp/book/9783642404023. Accessed 21 Jan 2019
  4. Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: MCC workshop on mobile cloud computing (MCC’12), Helsinki, Finland, 2012, pp 13–16. https://dl.acm.org/citation.cfm?id=2342513. Accessed 21 Jan 2019
  5. Divya RS, Mathew M (2017) Survey on various door lock access control mechanisms. In: International conference on circuit, power and computing technologies (ICCPCT), Kollam, India, pp 1–4. https://ieeexplore.ieee.org/abstract/document/8074187. Accessed 21 Jan 2019
  6. Douzis K, Sotiriadis S, Petrakis E, Amza C (2018) Modular and generic IoT management on the cloud. Future Gen Comput Syst (FGCS) 78(1):369–378. https://www.sciencedirect.com/journal/future-generation-computer-systems/vol/78/part/P1. Accessed 21 Jan 2019
  7. Erl T (2007) SOA principles of service design. Prentice Hall, Upper Saddle River. https://dl.acm.org/citation.cfm?id=1296147. Accessed 21 Jan 2019
  8. Konstantopoulos P, Petrakis EGM, Sotiriadis S (2018) iNaaS: indoors navigation as a service on the cloud and smartphone application. In: IEEE SARNOFF symposium, New Jersey Institute of Technology Conference Center, Newark, New Jersey, USA. http://www.intelligence.tuc.gr/~petrakis/publications/SARNOFF2018.pdf. Accessed 21 Jan 2019
  9. Petrakis EGM, Sotiriadis S, Soultanopoulos T, Tsiachri Renta P, Buyya R, Bessis N (2018) Internet of things as a service (iTaaS): challenges and solutions for management of sensor data on the cloud and the fog. Internet of Things 3–4:156–174. https://www.sciencedirect.com/science/article/pii/S2542660518300350
  10. Preventis A, Stravoskoufos K, Sotiriadis S, Petrakis EGM (2016) IoT-A and FIWARE: bridging the barriers between the cloud and IoT systems design and Implementation. In: Cloud computing and services science (CLOSER), pp 146–153. https://dl.acm.org/citation.cfm?id=3021834.3021896. Accessed 21 Jan 2019
  11. Schreier S (2011) Modeling restful applications. In: ACM international workshop on RESTful Design (WS-REST’11), Hyderabad, India, pp 15–21. https://dl.acm.org/citation.cfm?id=1967434. Accessed 21 Jan 2019
  12. Sotomayor B, Montero RS, Llorente IM, Foster IT (2009) Virtual infrastructure management in private and hybrid clouds. IEEE Internet Comput 13(5):14–22. https://ieeexplore.ieee.org/document/5233608. Accessed 21 Jan 2019
  13. Srinivas J, Mishra D, Mukhopadhyay S. Kumari S (2018) Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. J Ambient Intell Humaniz Comput, 9(4):875–895.  https://doi.org/10.1007/s12652-017-0474-8 CrossRefGoogle Scholar
  14. Uddin MN, Sharmin S, Ahmed AHS, Hasan E, Hossain S, Muniruzzaman (2011) A survey of biometrics security system. Int J Comput Sci Netw Secur (IJCSNS) 11(10):16–23. http://paper.ijcsns.org/07_book/201110/20111003.pdf. Accessed 21 Jan 2019
  15. Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18.  https://doi.org/10.1007/s13174-010-0007-6 CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2019

Authors and Affiliations

  • Euripides G. M. Petrakis
    • 1
    Email author
  • Filippos Antonopoulos
    • 1
  • Stelios Sotiriadis
    • 2
  • Nik Bessis
    • 3
  1. 1.School of Electrical and Computer EngineeringTechnical University of CreteChaniaGreece
  2. 2.Department of Computer Science and Information SystemsBirkbeck, University of LondonLondonUK
  3. 3.Department of Computer ScienceEdge Hill UniversityOrmskirkUK

Personalised recommendations