RFID in cloud environment for Attendance monitoring system

A.Parvathy, B. Rajasekhar, C.Nithya, K.Thenmozhi, J.B.B. Rayappan, Pethuru Raj and Rengarajan Amirtharajan School of Electrical & Electronics Engineering, SASTRA University,Tamil Nadu, India – 613401 ## Infrastructure Architect, Global Cloud Center of Excellence, IBM India, Bangalore, 560045 amir@ece.sastra.edu Abstract— Radio Frequency Identification (RFID) initially is of great use in the marketing field render billing easy. It came into effect since world war-II attained its wide spread recognition only when Walmart introduced it as ‘mandate’. An object within the range of 20 feet can be easily tracked with the aid of its unique barcode using RFID chip. It is sophisticated than the primitive barcode techniques as there is no need of positioning of the scanner. Cloud computing is a system which provides access to all soft ware’s without installation, for a desired time period, at a specific cost, only with the help of a single web browser.. Interfacing RFID with cloud computing would be more beneficiary in solving current issues. Technological updates can be done without any technical support. This paper presents the overview of interfacing RFID with cloud computing for updating students’ attendance and updating it into the parents’ corner and faculty mails. By considering the present issue, providing unique RFID code to the students reduce malpractice and human error. Also Human resources can be saved by the application of cloud computing. Time management is the most effective advantage gained from the use of RFID and cloud computing.

[1]  Kevin Curran,et al.  A Watermarking Based Tamper Detection Solution for RFID Tags , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[2]  Zhao Yong,et al.  An new anonymous authentication scheme for cloud computing , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).

[3]  Juhi Sharma,et al.  Cloud Security Challenges , 2012 .

[4]  Carlisle M. Adams,et al.  Improving security and usability of low cost RFID tags , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.

[5]  Abdelmoula Bekkali,et al.  RFID Indoor Tracking based on Inter-tags Distance Measurement , 2007, 2007 Wireless Telecommunications Symposium.

[6]  Abdennaceur Kachouri,et al.  CSMA-based MAC protocol for collision avoidance in a dense RFID network , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).

[7]  S.E. Watkins,et al.  RFID Instrumentation in a Field Application , 2007, 2007 IEEE Region 5 Technical Conference.

[8]  M. Kassim,et al.  Web-based student attendance system using RFID technology , 2012, 2012 IEEE Control and System Graduate Research Colloquium.

[9]  Leon Urbas,et al.  RFID as universal entry point to linked data clouds , 2012, 2012 IEEE International Conference on RFID-Technologies and Applications (RFID-TA).

[10]  Sung-Ho Kim,et al.  IPAP: Improved privacy and authentication protocol for passive RFID tags , 2010, 2010 2nd IEEE InternationalConference on Network Infrastructure and Digital Content.

[11]  Lei Zhang,et al.  Integration of RFID into Wireless Sensor Networks: Architectures, Opportunities and Challenging Problems , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.

[12]  Ying Gao,et al.  A differential evolution algorithm combined with cloud model for RFID reader deployment , 2011, The Fourth International Workshop on Advanced Computational Intelligence.