Digital spectacles use cloud computing and have a small camera that captures 400 facial images per second, sending them to a central database of over 13 million faces. It can compare biometric data from a face to known criminals' data and immediately alert authorities of any matches. The spectacles use Lumus LOE technology, which projects video images into the lenses using total internal reflection so that video appears floating in the field of vision. Security of data in the cloud is important, so technologies like Nessus use strong encryption when transferring data between locations.
Digital Spectacles Using Cloud Computing for Security
1. Digital Spectacles byDigital Spectacles by
usingusing
cloud Computing.cloud Computing.
Third Year Of Computer EngineeringThird Year Of Computer Engineering..
Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.Imperial college of engineering and Research, Wagholi, Nagar Road. ,Pune-421207.
Submitted by...Submitted by...
Mr. Mandar pathrikar.Mr. Mandar pathrikar.
2. Digital spectaclesDigital spectacles
Digital spectacles is the newDigital spectacles is the new
invention in the science ,this isinvention in the science ,this is
beneficial for all cops.beneficial for all cops.
A small camera fitted to theA small camera fitted to the
glasses can capture 400 facialglasses can capture 400 facial
images per second and sendimages per second and send
them to a central computerthem to a central computer
database storing up to 13database storing up to 13
million faces.million faces.
The system can compareThe system can compare
biometric data at 46,000 pointsbiometric data at 46,000 points
on a face and will immediatelyon a face and will immediately
signal any matches to knownsignal any matches to known
criminals or people wanted bycriminals or people wanted by
4. What is Cloud ComputingWhat is Cloud Computing
““Cloud” is a collective term forCloud” is a collective term for
a large number of developmentsa large number of developments
and possibilities. It is not anand possibilities. It is not an
invention, but more of ainvention, but more of a
“practical innovation”.“practical innovation”.
Dynamically scalable sharedDynamically scalable shared
resourcesresources
accessed over a networkaccessed over a network
Only pay for what you useOnly pay for what you use
Shared internally or with otherShared internally or with other
customerscustomers
Resources = Storage,Resources = Storage,
computing, services, etc.computing, services, etc.
Internal network or InternetInternal network or Internet
6. Deployment ModelsDeployment Models
••PublicPublic
Cloud infrastructure isCloud infrastructure is available to the generalavailable to the general
publicpublic, owned by org selling cloud services, owned by org selling cloud services
••PrivatePrivate
Cloud infrastructureCloud infrastructure for single org onlyfor single org only, may be, may be
managed by the org or a 3managed by the org or a 3rdrd
party, on or offparty, on or off
premisepremise
7. How Can I Create personal CloudHow Can I Create personal Cloud
Iomega Personal Cloud is a new technology that createsIomega Personal Cloud is a new technology that creates
your own Internet connected “cloud” network of Storyour own Internet connected “cloud” network of Stor
Center storage devices, personal computers andCenter storage devices, personal computers and
handheld mobile devices, which allows you to connect,handheld mobile devices, which allows you to connect,
share, copy and protect your files within your network.share, copy and protect your files within your network.
Installing this software in our devices and connectingInstalling this software in our devices and connecting
through internet ,we can create our own cloud.through internet ,we can create our own cloud.
10. Lumus LOE technologyLumus LOE technology
Lumus has developed a unique technology it calls Light-Lumus has developed a unique technology it calls Light-
guide Optical Element (LOE). The Lumus video-glassesguide Optical Element (LOE). The Lumus video-glasses
are connected either wired or wirelessly to a mediaare connected either wired or wirelessly to a media
source, such as a cell phone, which transfers the videosource, such as a cell phone, which transfers the video
image into a micro projector embedded in the temple ofimage into a micro projector embedded in the temple of
the eyeglasses.the eyeglasses.
The image travels through the lens by way of TotalThe image travels through the lens by way of Total
Internal Reflection (TIR).Internal Reflection (TIR).
TIR is an optical phenomenon that occurs when lightTIR is an optical phenomenon that occurs when light
strikes a medium boundary at a steep angle. If thestrikes a medium boundary at a steep angle. If the
refractive index is lower on the other side of therefractive index is lower on the other side of the
boundary, no light can pass through, effectively reflectingboundary, no light can pass through, effectively reflecting
all of the light.all of the light.
11. Head-Mounted display-:Head-Mounted display-:
((Sight of death)Sight of death)
This Technology used in the Fighter planes for targetingThis Technology used in the Fighter planes for targeting
their targets.their targets.
The idea of a pilot directing a missile to its target byThe idea of a pilot directing a missile to its target by
simply looking at it .simply looking at it .
You want the image to be large, the device has to beYou want the image to be large, the device has to be
large; if you want the device to be small, the image willlarge; if you want the device to be small, the image will
be small.be small.
13. Security of cloudSecurity of cloud
Security of cloud is the main feature of thisSecurity of cloud is the main feature of this
technology. Data which contain in the cloud istechnology. Data which contain in the cloud is
very precocious that's why we have to use it invery precocious that's why we have to use it in
encryption form.encryption form.
““Nessus vulnerability scannerNessus vulnerability scanner “ it is the“ it is the
technology which is used in the Multi nationaltechnology which is used in the Multi national
companies for sending data from one place tocompanies for sending data from one place to
another .Data is totally in encryption form soanother .Data is totally in encryption form so
that it is most secure in form.that it is most secure in form.
15. Nessus vulnerability scannerNessus vulnerability scanner
This is the most secure technology which isThis is the most secure technology which is
mostly used in the Multinational companies formostly used in the Multinational companies for
sending data from one state to another .sending data from one state to another .
Nessus scanner when send the data it is in theNessus scanner when send the data it is in the
encryption form so that it is difficult to predict ifencryption form so that it is difficult to predict if
any one try to do that then whole algorithmany one try to do that then whole algorithm
change within 5min. And data sending againchange within 5min. And data sending again
started.started.
17. Radar PageRadar Page
The Radar Page was designed and built to caterThe Radar Page was designed and built to cater
for the demands of Government and Militaryfor the demands of Government and Military
networks requiring near real time information onnetworks requiring near real time information on
new and emerging cyber threats.new and emerging cyber threats.
The page auto updates every 20 minutes drawingThe page auto updates every 20 minutes drawing
information from multiple sources.information from multiple sources.
If any threats or illegal access is found than theIf any threats or illegal access is found than the
scanner note down the IP Address and put itscanner note down the IP Address and put it
into list and appropriate action we can easilyinto list and appropriate action we can easily
take.take.
18. ConclusionConclusion
Digital spectacles are the latest technology in case ofDigital spectacles are the latest technology in case of
security purpose. Many social problems we can sort usingsecurity purpose. Many social problems we can sort using
it.it.
Many Disasters we can avoid by using this technology.Many Disasters we can avoid by using this technology.
Cloud security is very up coming future technology.Cloud security is very up coming future technology.
With the help of Cloud Security and digital spectacles weWith the help of Cloud Security and digital spectacles we
can stop Crimes in the society And Find out the Missingcan stop Crimes in the society And Find out the Missing
personal.personal.
Increases business responsiveness.Increases business responsiveness.
Uses IT resources efficiently via sharing and higher systemUses IT resources efficiently via sharing and higher system
utilization Cultivates skills for next generation workforce.utilization Cultivates skills for next generation workforce.