Skip to main content

The Big Data-RTAP: Toward a Secured Video Surveillance System in Smart Environment

  • Conference paper
  • First Online:
Cloud Computing and Big Data: Technologies, Applications and Security (CloudTech 2017)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 49))

  • 1083 Accesses

Abstract

Big Data is an emerged architecture and technology paradigm that is used by many organizations to extract valuable information either to take decisions. Big Data is a technique and method used to retrieve, collect, process and analyze a very big volume of unstructured and structured data. The challenge is processing and analyzing the huge volume of data coming in from network sensors. Practically, it’s too late to stop an abnormal comportment, if we collect the incoming streams and wait for many days for processing and analyzing the stored streams. Big Data in video surveillance systems, offer ETL (Extract Transform and Load) challenges related to the Van Newman Bottleneck and Data Locality. In this chapter we propose a conceptual model with architectural elements and proposed tools for monitoring in RTAP (Real Time Analytical Processing) mode smart areas.

Our model is based on lambda architecture, in order to resolve the problem of latency which is imposed in transactional requests (GAB Network). We consider the real example that data comes from different sources (Automatic monitoring Centers, GAB, Facebook, Twitter, Instagram, LinkedIn, Medical Centers, Commercial Centers and any other data collected by satellites.) which is n dimension and we which to reduce with PCA algorithm the number of components to reduce the processing time and increase the speed of execution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Meshram, B.B., Gaikwad, G.P.: Different indexing techniques. Int. J. Eng. Res. Appl. (IJERA) 3(2), 1230–1235 (2013)

    Google Scholar 

  2. Eaton, C., Deroos, D., Deutsch, T., Lapis, G., Zikopoulos, P.C.: Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data. Mc Graw-Hill Companies, New York (2012). ISBN 978-0-07-179053-6

    Google Scholar 

  3. Schneider, R.D.: Hadoop for Dummies, Special edn. Wiley, Hoboken (2012). ISBN 978-1-118-25051-8

    Google Scholar 

  4. Griffin, B.K., Klemann, R.: Unlocking Value in the Fragmented World of Big Data Analytics. Cisco Internet Business Solutions Group, June 2012

    Google Scholar 

  5. Abdullah, T., Anjum, A., Tariq, M.F., Baltaci, Y., Antonopoulos, N.: Traffic monitoring using video analytics in clouds. In: IEEE/ACM International Conference on Utility and Cloud Computing, pp. 39–48 (2014)

    Google Scholar 

  6. Ezzahout, A., Oulad Haj Thami, R.: Conception and Developement of video surveillance system for detecting, tracking and profile analysis of a person. In: ISKO Maghreb 2013 in 3rd International Symposium ISKO Maghreb 2013 on Concepts and Tools for Knowledge Management (KM), 8th–9th November, Marakech, Morocco (2013)

    Google Scholar 

  7. Ezzahout, A., Oulad Haj Thami, R., Hadi, Y.: Tracking people through selected blocs using correlation and optimized similarity measure OSSD. In: The 8-th International Conference on Intelligent Systems: Theories and Applications, SITA, 8–9 May 2013, Rabat Morocco (2013)

    Google Scholar 

  8. Ezzahout, A., Oulad Haj Thami, R., Hadi, Y.: People re-identification based on principal components analysis attributes. In: 5th World Congress on Information and Communication Technologies, 14–16 December 2015, Marakesh, Morocco (2015)

    Google Scholar 

  9. Zhang, C., Chang, E.-C.: Processing of mixed-sensitivity video surveillance streams on hybrid clouds. In: IEEE International Conference on Cloud Computing, pp. 9–16 (2014)

    Google Scholar 

  10. Zaharia, M., Chowdhury, M., Franklin, M.J., Shenker, S., Stoica, I.: Spark: cluster computing with working sets. In: Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, p. 10 (2010)

    Google Scholar 

  11. Scala Programming Language. http://www.scala-lang.org

  12. Layne, R., Hospedales, T.M., Gong, S.: Attributes-based re-identification. In: Gong, C., Yan, L. (eds.) Person Re-identification. Springer, London, December 2013

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abderrahmane Ezzahout .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ezzahout, A., Oubaha, J. (2019). The Big Data-RTAP: Toward a Secured Video Surveillance System in Smart Environment. In: Zbakh, M., Essaaidi, M., Manneback, P., Rong, C. (eds) Cloud Computing and Big Data: Technologies, Applications and Security. CloudTech 2017. Lecture Notes in Networks and Systems, vol 49. Springer, Cham. https://doi.org/10.1007/978-3-319-97719-5_10

Download citation

Publish with us

Policies and ethics