Smart Homes Automation System Using Cloud Computing Based Enhancement Security
Smart Homes Automation System Using Cloud Computing Based Enhancement Security
Abstract— Smart home automation is one of the prominent and security systems for homes; the perpetrators have
topics of the current era, which has attracted the attention of become avoiding homes that contain a security system[8].
researchers for several years due to smart home automation Security systems have become significantly advanced by
contributes to achieving many capabilities, which have had a integrating them with smart home technologies, including
real and vital impact on our daily lives, such as comfort, energy
conservation, environment, and security. Home security is one
real-time sending and receiving data via the Internet [9].
of the most important of these capabilities. Many efforts have It has become necessary to notify about any danger that
been made on research and articles that focus on this area due occurs in a short time, so a system must be established that
to the increased rate of crime and theft. The present paper can inform the owner of any security breach in real-
aims to build a practically implemented smart home that time[10]. The proposed approach focuses on this issue by
enhances home control management and monitors all home using a server close to IoT devices to handle receiving,
entrances that are often vulnerable to intrusion by intruders analyzing, and processing the data as a broker between the
and thieves. The proposed system depends on identifying the embedded devices from the side and the Cloud server on the
person using the face detection and recognition method and other side (fog computing). There are several advantages of
Radio Frequency Identification (RFID) as a mechanism to
enhance the performance of home security systems. The cloud
using Fog computing technology. In addition to reducing
server analyzes the received member identification to retrieve latency, it is possible to encrypt data before sending it to the
the permission to enter the home. The system showed Cloud as a protection system that maintains the security of
effectiveness and speed of response in transmitting live the transmitted data Using the latest data encryption
captures of any illegal intrusive activity at the door or windows methods[11]. Moreover, the idea of face detection and
of the house. With the growth and expansion of the concept of recognition and RFID to open the main door was added as a
smart homes, the amount of information transmitted, force factor for the door opening and closing immediately
information security weakness, and response time upon entering the person. There is a possibility to open the
disturbances, to reduce latency, data storage, and maintain door automatically by the owner after confirming the
information security, by employing Fog computing
architecture in smart homes as a broker between the IoT layer
identity of the person who is not identified by the system by
and the cloud servers and the user layer. talking and watching the person that will be near the door
directly, as well as the use of ultra-sonic and the camera to
Keywords— Home Automation, Security system, Face monitor the window of the house. An integrated security
detection and recognition, Fog Computing, Cloud computing system was built by using many features added to the
I. INTRODUCTION system to guarantee safety and comfort, Making the owner
aware of everything going on in the house early.
Smart home automation includes monitoring and
controlling houses automatically without human intervention II. LITERATURE SURVEY
[1][2][3]. With the advent of the twenty-first century, Many security systems are available in stores, which can
building occupants' desire for a more modern and luxurious be installed easily, but these systems are expensive and do
lifestyle has increased. On the other hand, current not always suit the customer's needs[12]. Moreover, there is
technologies, artificial intelligence, and robotics have much research in this field due to its importance in our
significantly impacted people's need to integrate their use security life. We will review the relevance of these projects
into their living environment[4][5]. One of the most and their services, which may fit part of people's needs. In
important that resonated on the horizon is the home security general, all papers aim to present security systems
system, which has developed rapidly in recent years[6][7]. differently and will be discussed in terms of the system
The mechanism of protecting the houses with lock and key features.
has become a traditional mechanism, and relying on it is The Security system was proposed by Kushank Sehgal
somewhat risky; therefore, it was necessary to secure the and Richa Singh[13]. This paper relied on IoT and cloud
home in more modern ways; although there are no computing services and SMS messages by sending a pre-set
guaranteed ways to prevent burglary, it remains a way to message to neighbors with one click from the user when any
monitor the house using current methods that are quick to danger occurs. The device's and sensors' data will be sent to
respond without human intervention. Based on a previous the Cloud. The cloud processes and evaluates it and then
study, theft and burglary rates have decreased in very large sends it to the owner's smartphone. The system will close all
proportions with the development and increase of preventive doors and windows, and then it will send an alert message to
Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:17:03 UTC from IEEE Xplore. Restrictions apply.
5th International Conference on Engineering Technology and its Applications 2022- (5thIICETA2022)
the owner stating that someone has tried to break the door. SD-RAM of the Raspberry. A photo will be sent via Gmail
Another system used the correct key system; the technique to the owner in real-time, and sent a copy of this image will
works when the wrong key is entered and pushed hard. It be over the Cloud.
sends an alert message to the owner. PIR and All these N.Tkauc et al [20]. The programs used in facial
sensors were connected with Arduino MEGA ADK and recognition are often poorly performing, have low accuracy,
Amazon cloud server. and are prone to errors, so an online platform was adopted
The paper presented by Musaddak M. Abdul Zahra et al. for face detection and recognition. Platforms (AWS) were
[14]. Home security system using a cloud computing used. The mechanism of this project lies in the entry of
system. They improved the previous approach by adding a employees and visitors into a company or factory building
wireless camera of the Zmodo ZP-IBI13-WiF and using by recognizing the Face without the need for keys and cards.
GSM to call a specific number when there is no internet Then a special code is generated for the employee who
connection. ESP8266 Microcontroller as a Wi-Fi device intends to enter the building. The employee must enter the
transfers data from these sensors to the cloud server and the code to open the door. As for the visitors, their speech will
webserver in Apache and MySQL format. The camera is be converted into a text sent to the employee whose name is
directly connected to the web server and can be opened mentioned. The Google platform was used to convert speech
directly through an application on the mobile phone. into text Speech text API. The project was implemented
P.Amith Teja et al. [15]. Use Raspberry Pi, camera, PIR, using a Raspberry Pi, a camera, an LCD screen, a
IR, and Piezo, to detect intruders, temperature, and sounds. microphone, and a speaker. TABLE I present a comparison
The system sends a message to the owner and then takes of home security system in scientific papers:
pictures and records a live video of the place when the event
occurs by using the IoT cloud for GUI TABLE I. A COMPARISON OF HOME SECURITY SYSTEMS IN
SCIENTIFIC PAPERS
While Shraddha Somani et al. [16].introduced the same
concept as the previous one with the addition of SMS via a References Security controller Latency control
phone in the event of an intruder. They used AES to encrypt Type
the data to obtain security over the network. Other sensors Kushank PIR and Arduino LOW Automatic
Sehgal and Wrong Key MEGA Send SMS
had been connected with Raspberry Pi, such as MQ2 and Richa Singh sensor ADK
DHT22, to preserve the environment in the smart home. [14].
M.Medhat et al. [17]. This represents a remarkable Musaddak M. Zmodo ZP- ESP8266 Low Automatic,
Abdul Zahra et IBI13-WiF Send call,
development in the concept of security for buildings and al[15] Camera Pictures
how to secure them. The system was designed with a very
short latency and reduced network congestion compared P.Amith Teja et Camera PI , Raspberry low Automatic,
al. [16] PIR, IR, Pi Send Pictures
with the previous methods (cloud computing). It was based Piezo and record
on the concept of fog computing. The system consists of Video
three-layer, sensors layer (open door, glass break, PIR, Fire,
Shradha Camera PI Raspberry low Automatic,
and Arduino board), fog computing layer (Raspberry Pi and Somani et al. Pi send SMS
Camera Pi), and cloud layer. This system can reduce the [17]
amount of data sent to the Cloud. When this system was M.Medhat et al. door, glass Arduino High Automatic
[17] break, PIR, Uno, capture, video
compared and evaluated with the cloud system using Camera PI Raspberry recording
(iFogsim Toolkit), the results showed the clear progress of Pi
fog computing in terms of implementation time and
response. S. Fattah and face Arduino low Automatic, sent
F. Mahmood recognition, Mega notification
Another form of home security was provided by S. [19] webcam, over the
Fattah and F. Mahmood[18]. The main goal of this system RFID webserver
was to security monitor, automate and control home
appliances according to the powers assigned to each M. Dhobale Camera PI, Raspberry High Automatic.
[19] PIR face Pi Email sent to
member of the home by using Cloud services and biometric recognition Gmail
techniques. Firstly, define the tasks and powers allowed for
each member of the house, Where the system begins to
recognize faces and take a picture of the Face and uses the N.Tkauc et al. camera, a Raspberry high Automatic and
DWT and PCA method to extract image features and [20] password Pi manually open
Mic, the door
reduction an image, and get the matching operation using speaker Send the
Euclidean distance, and with using MATLAB procedure, password to
the user index can be sent to the cloud server, the Cloud will the user
our proposed Webcam, MCU- high Automatic,
analyze the member's identity to retrieve the member's system RFID, Mic, ATmega32 Send pictures,
profile and give them his permissions Speaker, 8P, speech, Email
M. Dhobale [19]. Revealed a fairly simple home security face local on Gmail,
recognition server notification
system based on facial recognition using a Pi camera type, Face++ Manually open
motion sensor, and ultra-sonic and Raspberry Pi as the main API Ultra- the door
controller. The procedure takes a picture of the person near sonic,
Buzzer
the door, and then the LBP program in the Raspberry Pi
compares the image with the images previously stored in the
165
Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:17:03 UTC from IEEE Xplore. Restrictions apply.
5th International Conference on Engineering Technology and its Applications 2022- (5thIICETA2022)
166
Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:17:03 UTC from IEEE Xplore. Restrictions apply.
5th International Conference on Engineering Technology and its Applications 2022- (5thIICETA2022)
B. Main Door Security System capabilities to monitor the house from the indoor camera in
The system built for the door will be capable of detecting the worst case.
authorized persons to enter through the camera first. Then All these cases will be implemented in the shortest time
the RFID, the feature of communicating with strangers or and secure data due to the fog computing solution and cloud
unauthorized using the mic, speaker, and the camera, was computing and RSA encryption to encrypt the data before
added. The hardware devices that have been used in this part sending it to the cloud Fig. 5. Represent the Flowchart for
include MCU-ATmega328P as a Microcontroller, motion Door Security System.
sensor, RFID-RC522, USB-Webcam RAPOO-C200 with
Omni Directional Microphone built-in, Speaker, Tactile
Push-Button switch to begin speaking with the owner in case
of stranger person, Fog computing and WIFI. The software
section includes Face++ API for face recognition, Arduino
IDE, C sharp C#, and API-JSON.
There are three cases when persons enter through the
house's main door. The idea of making the system in three
cases is to make it more flexible and effective in dealing with
all people, whether authorized or not. In each case, a certain
procedure is the following:
1) Case study 1: in case of the person at the door is a
family member whose photos have been previously stored in
both fog computer and Cloud. The system will compare the
person's image with the stored images. In case of the
information matches, it will open the door automatically for
5 Seconds and close again after that to ensure the door will
be closed at all times; there is no need for The RFID to open
the door through it. In other words, the system will depend
on face detection and recognition only in the process of
achieving reliability. Face++ API web service has been
used for face detection and recognition. It can scan uploaded
image files or URLs and use the latest computer vision and Fig. 5. Flowchart Door Security System
data mining technology to provide three basic services
Thus, a comprehensive security system has been built
(detection, recognition, and analysis).Face++ API provides
for all cases that protect family members and preserve the
landmark analysis[23].
house from anyone trying to infiltrate. It also allows the
2) Case study 2: in case the person at the door is a
entry of well-known persons even if the system does not
family member and has data stored previously in both fog recognize them or they do not have an entry card. The
computer and Cloud, in the beginning, the system will check proposed approach is flexible in adding or removing trusted
the picture authentication; if not recognized by the system people to enter through a very simple and easy database
following to some reason. In this case, the system will take found in the Cloud to make the information updateable and
pictures of the person as a stranger person and send them easy to use in any other home. Some people protect their
directly to the admin to verify the identity, and the person homes from bodily threats by installing smart security
can enter the house through RFID Tag; the system will systems but need to secure themselves against cyber threats.
check the Tag ID with the Tag list that found in Cloud if Therefore, the data has been encrypted between fog
there are in the list will open the door for 5 seconds and computing and cloud computing to protect our data from
close again. The admin can identify the person through the cyber-attacks using RSA Algorithm data encryption.
camera inside the house when entering the house. RFID was
added as a second policy to increase the system's security. IV. RESULTS AND DISCUSSION
3) Case study 3: if the person is a family member but The desired goal of this system is to create a smart home
not identified by the system and does not have RFID, the security system that controls and monitors doors and
person may be strange. In other words, if it has no prior data windows via the Internet. Regarding the Window part, In
in the system. The system will directly take a picture of him the presence of Ultra-Sonic at the edge of the window from
and send it over the Internet to the owner to verify his the inside, a Working principle is that the Ultrasonic waves
identity. Suppose the person is identified as a family emitted as soon as a cut occurs in these frequencies will
member. In that case, the door will open with the click of a reflect and return. The sensor will send this event to the
button by the owner after contact with the person by using a Arduino, which will trigger the buzzer as a primitive alarm
Mic and speaker at the door, but If one of the intruders, the and, at the same time, send a signal to the local computer
server (FOG computing). Through a specific program
owner will take the necessary action against them to protect
designed by C sharp (C#) language, the camera will open
the home from intruders. Apart from addressing this
directly towards the window and then take snapshots of the
challenge even when breaking the door lock, there are
window when the ultrasonic signal has been cut. Fig6 Show
the instant image is captured in Fog computing during the
167
Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:17:03 UTC from IEEE Xplore. Restrictions apply.
5th International Conference on Engineering Technology and its Applications 2022- (5thIICETA2022)
Fig. 10. Picture of instantaneous images that are taken from Fog and cloud
computing
Fig. 7. Picture of an instant image in the cloud web page interface during
the intrusion process
An email will be sent to the owner stating that a security
Concerning the Door system, the first condition that breach occurred when the house was hacked without
must be achieved in opening the door is to recognize the permission, as shown in Fig. 11.
Face first; Fig. 8 shows the process of entering the
authorized persons without the need for RFID.
168
Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:17:03 UTC from IEEE Xplore. Restrictions apply.
5th International Conference on Engineering Technology and its Applications 2022- (5thIICETA2022)
computer and then to the Cloud, and the owner can open the Implementation of a Power Consumption Management System for
Smart Home Over Fog- cloud Computing,” 2018 3rd Int. Conf.
door and see all actions via the graphical user interface; the
Intell. Green Build. Smart Grid, pp. 1–5.
MCU-Atmega328P was used to connect the rest of the door [11] A. A. A. Sen and M. Yamin, “Advantages of using fog in IoT
system parts with the fog computer, Arduino UNO to applications,” Int. J. Inf. Technol., vol. 13, no. 3, pp. 829–837, 2021,
combine the characteristics of the window system with the doi: 10.1007/s41870-020-00514-9.
[12] M. Schwartz, Arduino Home Automation Projects. Birmingham B3
fog computer, Notifying the owner of any security breach
2PB, UK.: Packt Publishing, 2014. [Online]. Available:
via an email sent via Gmail. http://books.google.com.br/books?id=fMwRBAAAQBAJ
Many advanced technologies that possibly added to the [13] K. Sehgal, “Iot Based Smart Wireless Home Security Systems,”
system to become more accurate, such as voice recognition, 2019 3rd Int. Conf. Electron. Commun. Aerosp. Technol., pp. 323–
326, 2019.
iris scan, fingerprint, etc.
[14] M. M. A. Zahra, M. J. Mohsin, and L. A. Abdul-Rahaim, “Artificial
intelligent smart home automation with secured camera
REFERENCES management-based GSM, cloud computing and arduino,” Period.
[1] S. Kaur, R. Singh, N. Khairwal, and P. Jain, “Home Automation and Eng. Nat. Sci., vol. 8, no. 4, pp. 2160–2168, 2020, doi:
Security System,” Adv. Comput. Intell. An Int. J., vol. 3, no. 3, pp. 10.21533/PEN.V8I4.1718.G697.
17–23, 2016, doi: 10.5121/acii.2016.3303. [15] V. K. P. A. T. A.Anne Frank Joe, “Home Security System Using
[2] M. Mrinal, L. Priyanka, M. Saniya, K. Poonam, and A. B. Gavali, Raspberry Pi With IOT,” vol. 7, pp. 5–8, 2021.
“Smart home - Automation and security system based on sensing [16] S. S. Chowdhury, S. Sarkar, S. Syamal, S. Sengupta, and P. Nag,
mechanism,” Proc. 2017 2nd IEEE Int. Conf. Electr. Comput. “IoT Based Smart Security and Home Automation System,” 2019
Commun. Technol. ICECCT 2017, pp. 1–3, 2017, doi: IEEE 10th Annu. Ubiquitous Comput. Electron. Mob. Commun.
10.1109/ICECCT.2017.8117986. Conf. UEMCON 2019, pp. 1158–1161, 2019, doi:
[3] P. Shelke, S. Kulkarni, S. Yelpale, O. Pawar, R. Singh, and K. 10.1109/UEMCON47517.2019.8992994.
Deshpande, “A NodeMCU Based Home Automation System,” Int. [17] M. Medhat, K. El-Shafey, and A. Rashed, “IoT-fog based smart-
Res. J. Eng. Technol., vol. 9001, pp. 127–129, 2008, [Online]. building security system design and performance evaluation,” J.
Available: www.irjet.net Comput. Sci., vol. 16, no. 9, pp. 1325–1333, 2020, doi:
[4] R. K. Radha, “Smart home design flexibility as an enabler of 10.3844/jcssp.2020.1325.1333.
sustainability and the reception in Sulaiymaniah, Kurdistan Region- [18] S. F. Kak and F. M. Mustafa, “Smart Home Management System
Iraq,” J. Build. Pathol. Rehabil., vol. 5, no. 1, p. 29, 2020, doi: Based on Face Recognition Index in Real-Time,” 2019 Int. Conf.
10.1007/s41024-020-00094-y. Adv. Sci. Eng. ICOASE 2019, pp. 40–45, 2019, doi:
[5] I. A. M. Al Khafaji and R. Kamaran, “The Influence of Spatial 10.1109/ICOASE.2019.8723673.
Flexibility to improve Sustainability of Interior Design by Using [19] M. R. Dhobale, “Smart Home Security System using Iot , Face
Smart Technology (Case study –Future Smart home in Iraq),” Eur. J. Recognition and Raspberry Pi,” no. April, pp. 44–47, 2020, doi:
Sustain. Dev., vol. 8, no. 4, p. 438, 2019, doi: 10.5120/ijca2020920105.
10.14207/ejsd.2019.v8n4p438. [20] N. Tkauc, T. Tran, K. Hernandez-Diaz, and F. Alonso-Fernandez,
[6] H. M. Marhoon, M. I. Mahdi, E. D. Hussein, and A. R. Ibrahim, “Cloud-Based Face and Speech Recognition for Access Control
“Designing and Implementing Applications of Smart Home Applications,” 2020 IEEE Conf. Commun. Netw. Secur. CNS 2020,
Appliances,” Mod. Appl. Sci., vol. 12, no. 12, p. 8, 2018, doi: pp. 2–9, 2020, doi: 10.1109/CNS48642.2020.9162165.
10.5539/mas.v12n12p8. [21] T. Juhana and V. G. Anggraini, “Design and implementation of
[7] M. A. Abu, S. F. Nordin, M. Z. Suboh, and A. Ramli, “Design and Smart Home Surveillance system,” Proceeding 2016 10th Int. Conf.
Development of Home Security Systems based on Internet of Things Telecommun. Syst. Serv. Appl. TSSA 2016 Spec. Issue Radar
Via Favoriot Platform IoT For Electrical Systems View project Technol., 2017, doi: 10.1109/TSSA.2016.7871101.
Agricultural IoT systems View project,” Artic. Int. J. Appl. Eng. [22] S. Zhang, R. H. Venkatnarayan, and M. Shahzad, “A WiFi-based
Res., vol. 13, no. February, pp. 1253–1260, 2018, [Online]. Home Security System”.
Available: http://www.ripublication.com [23] O. DOSPINESCU and I. POPA, “Face Detection and Face
[8] K. Mehaboob Subhani and D. S. Manoj Kumar, “An investigative Recognition in Android Mobile Applications,” Inform. Econ., vol.
study for smart home security: Issues, challenges and 20, no. 1/2016, pp. 20–28, 2016, doi:
countermeasures,” Int. J. Pharm. Technol., vol. 8, no. 4, pp. 19448– 10.12948/issn14531305/20.1.2016.02.
19459, 2016, doi: 10.4236/wsn.2016.84006.
[9] P. Gupta and J. Chhabra, “IoT based Smart Home design using
power and security management,” 2016 1st Int. Conf. Innov.
Challenges Cyber Secur. ICICCS 2016, no. February 2016, pp. 6–10,
2016, doi: 10.1109/ICICCS.2016.7542317.
[10] Y. Chen, M. Z. Azhari, J. Leu, and S. Member, “Design and
169
Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:17:03 UTC from IEEE Xplore. Restrictions apply.