Cloud-based network monitoring as a future trend

Source: Internet
Author: User
Keywords Based on cloud algorithm network video surveillance

The biggest technological revolution in the IT field in recent years has been the technology of cloud computing. The architecture and implementation of this new IT service based on cloud computing technology, all IT infrastructures will be virtualized to deliver the required software, data and storage services via the Internet, based on the needs of the user, in the language of cloud computing: SaaS, Software as services, PaaS, platform-Services, IaaS, Architecture is service.

Cloud computing technology will revolutionize network video surveillance applications, that is, video service, VSaaS. This to the user, will greatly reduce the user to learn it technology of great pressure, another back-end storage and other devices for users will no longer be visible, so to avoid the need for special equipment maintenance of the huge investment.

As we all know, real-time video is the main feature of video surveillance, and the cost of satisfying this feature is high demand for network bandwidth and storage. With the network technology such as Epon, Gpon, FTTH, FTTB Fiber to the rapid deployment of network, 3G, 4G LTE, WiFi and other wireless broadband technology applications, as well as coding compression technology optimization, bandwidth problems will no longer be the main problem. And the cloud storage solution will provide a huge amount of storage services to users. Technologies such as virtualization, load balancing, and grid computing are deployed in the back-end to greatly address storage problems.

At present, based on cloud computing Technology Network video surveillance architecture, deployment, product, management, security, operation and so on have matured, especially in Europe and the United States and other countries are 20–30% annual growth rate. With the same side of cloud computing, Huawei, ZTE and other manufacturers have begun to deploy in some regions based on cloud computing Architecture Network video surveillance products. The current network video monitoring cloud computing architecture is mainly in the "private cloud" approach, with the investment of China Telecom, China Mobile and unicom in Ping An city, digital city and Intelligent City, the "public cloud" of video surveillance will gradually go into civil security, such as small and medium-sized enterprises, chain enterprises and individual users.

In addition, although the Intelligent video surveillance is one of the trends, intelligent analysis has been the development of hot spots, but never a good implementation, the reason is the lack of good computing basis, such as network cameras or NVR CPU technology capabilities. Cloud based video analysis will provide the best platform and computing power.

Only through the content analysis of video in the cloud, users can use the huge virtual computing ability to analyze the massive information, such as human face statistics, counting, fast search based on features and other intelligent functions. This application is also known as the architecture, service IaaS (infrastructure as a service), which is the main application of IaaS in the field of network video surveillance. On top of IaaS, network video monitoring based on cloud computing architecture can provide users with a large amount of storage space and unlimited computing power.

Cloud computing provides the technical capability to achieve the user terminal that is, the Network Camera Plug and Play, on demand configuration, that is, VSaaS function. According to the user's own needs to configure the storage space, video planning and mobile applications, really achieve any place according to the need, any time arbitrary access.

Obviously, the convenience of the network will inevitably bring the requirements for the security of the video data. Data security Services (PaaS), the security features on the cloud computing platform will be improved, especially to make up for the current network camera monitoring almost unguarded vulnerabilities. You can use IPSec at the network layer or at the transport layer to secure the transmission of data security encryption, in the application layer using S/MIME mechanism of End-to-end encryption, the transmission process using RSA to encrypt the dialogue, and the transmission of the content can be used DES, 3DES, AES and other algorithms to encrypt.

The data storage can be encrypted by 3DES, AES or SM1 algorithm. For example, the same side launched a series of security camera is further, using the support of 128-bit sm1,sm2,des/3des symmetric encryption algorithm, the transmission process using a 1024-bit RSA algorithm to support the PKCSII standard padding mode. The signature algorithm supports 1024-bit RSA algorithm, hash algorithm supports hash including Sha-1,md5,sch, etc. to ensure data security.

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.