+234 8146561114 (MTN) or
+2347015391124 (AIRTEL)

CLOUD-BASED ACCESS CONTROL

USER'S INSTRUCTIONS: The project work you are about to view is on "cloud-based access control" Please, sit back and study the below research material carefully. This project topic "cloud-based access control" have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "cloud-based access control" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "cloud-based access control" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.


TITLE PAGE

CLOUD-BASED ACCESS CONTROL

BY

---
EE/H2013/01430
DEPARTMENT OF ---
INSTITUTE OF ---

DECEMBER,2018



APPROVAL PAGE

This is to certify that the research work, "cloud-based access control" by ---, Reg. No. EE/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on Electrical and Electronics Engineering has been approved.

By
Dr. ---                                           Dr. ---
Supervisor                                                  Head of Department.
Signature……………….                           Signature……………….        

……………………………….
Dr. ---
External Invigilator



DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.



ACKNOWLEDGEMENT

The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.


PROJECT DESCRIPTION: This work “cloud-based access control” research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of “cloud-based access control” visible for everyone, then the complete material on “cloud-based access control” is to be ordered for. Happy viewing!!!


ABSTRACT

Access control system is a system that manages access through the authorization or revocation of rights to physical or logical assets within an organization or a practice of restricting entrance to a property, building, or room to authorized persons. Cloud based security services are migrating from dedicated hardware solutions to cloud-based security services using Software as a Service (SAAS) model.Cloud based security door allows you to control your entire device from anywhere, review events, share access or remotely configure security.

TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
CHAPTER ONE
INTRODUCTION
1.1      BACKGROUND OF THE PROJECT

    • PROBLEM STATEMENT
    • AIM / OBJECTIVE OF THE PROJECT
    • SIGNIFICANCE OF THE PROJECT
    • SCOPE OF THE PROJECT
    • LIMITATION OF THE PROJECT
    • RESEARCH QUESTION
    • PROJECT ORGANISATION

CHAPTER TWO
LITERATURE REVIEW

    • REVIEW OF CLOUD SECURITY SYSTEM
    • REVIEW OF DIFFERENT CLOUD SECURITY CONTROLS
    • DIMENSIONS OF CLOUD SECURITY
    • CLOUD SECURITY AND PRIVACY
    • CLOUD VULNERABILITY AND PENETRATION TESTING
    • REVIEW OF RELATED WORK

CHAPTER THREE
3.0      METHODOLOGY

    • BASICS OF THE SYSTEM
    • FEATURES OF CLOUD-BASED ACCESS
    • SYSTEM DESCRIPTION
    • PROPOSED SCHEME
    • BASIC OPERATIONS OF THE PROPOSED MODEL

CHAPTER FOUR

    • RESULT AND DISCUSION
    • CLOUD-BASED VS. TRADITIONAL
    • CLOUD SECURITY PRECAUTIONS
    • ADVANTAGES OF CLOUD BASED ACCESS CONTROL

CHAPTER FIVE

    • CONCLUSION
    • RECOMMENDATION
    • REFERENCES

CHAPTER ONE
1.0                                                        INTRODUCTION
1.1                                           BACKGROUND OF THE STUDY
The increase in virtualized and cloud networks is boosting demand for cloud based security, because data and applications are now more portable and distributed across a wide variety of networks. This means that security applications need to live as software in the cloud, rather than as dedicated hardware appliances protecting specific points of the network [2].
Demand is rising for cloud based, SAAS security solutions and the market is growing rapidly. These services can be provided as single features or as part of a larger, integrated SaaS package. Most current security systems possess outdated technology that relies on human monitoring which opens the opportunity door for more automated versions in the cloud. These security tools are also being integrated with software-defined networking (SDN) SDN to deliver a network that can use real-time analytics and monitoring to protect against emerging threats [2][3].
Cloud computing security or, more simply, cloud-based access control refers to a broad set of policies, technologies, applications, and controls utilized to protect virtualized IP, data, applications, services, and the associated infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security [1].
A cloud-based access control system provides centralized management, visibility and control without the cost and complexity of traditional physical access systems.
Systems like Kisi come equipped with centralized management, real-time updates, cloud wiring, diagnostics and much more. They can be deployed rapidly without training or proprietary command line interfaces, let alone expensive certifications. They also provide integrations with the software your company uses for its operations, visitor management and door scheduling [3][4].
A cloud-service is accessible over the web from anywhere, there is no need to worry about backups or upgrades, and customers receive continuous improvements without having to do anything. In addition, a cloud-based service is much simpler to integrate with other systems than an on-premise solution.
A cloud service with IP-connected hardware also means that the physical location of the doors is irrelevant. With this device it does not matter if you have one building with 100 doors or 10 buildings—anywhere in the world—with 10 doors each [5].

1.2                                                  PROBLEM STATEMENT
There are numerous types of access control systems which were generally belief that they are efficient and effective in terms of security. But later on it was discovered that all have many limitations or disadvantages that hinders some people not to use it, such as, in GSM based access control system depended on GSM network provider to operate which means that whenever there is not network in the area of usage the device will not operate. In order to solve all these problems seen in other access control devices a cloud based access control security system is invented. This device allows one to control his entire device from anywhere. It operates through the cloud.

1.3                                  AIM AND OBJECTIVES OF THE PROJECT
The main aim of this work is to design a security system which is being managed directly from the cloud.  At the end of this work, student will be able to do the following [7]:
• Apply access control techniques to meet confidentiality and integrity goals
• Understand and implement the major terms and concepts related to access control and tie them to system security.


1.4                                         SIGNIFICANCE OF THE PROJECT
The first and most obvious advantage of cloud management is the lack of any geographical limitations [4].
Access control can be shared between locations, cities, countries or even continents, with each access point being managed directly from the cloud [4].
Alerts can instantly travel from one part of the world to the other, regardless of language or time zone [4].
Distance simply becomes irrelevant [4].


1.5                                                 BENEFIT OF THE STUDY

  • Professional Management: Hosted access control eliminates the need for dedicated employees to manage the system, generating additional cost savings. All access information can be stored and managed by highly trained professionals operating from a remote operations center. System functions, including adding, modifying and deleting users, assigning individual access levels, programming scheduled door locking and unlocking and other vital access control actions can be performed remotely by professional monitoring providers on a 24/7 basis [9].
  • Timely Updates: Beyond initial deployment, this model also eliminates many of the ongoing operating expenses associated with access control systems, including the cost of site visits to repair or update system components. For example, software providers regularly release updates that improve the functionality and security of their solutions. Installing these updates manually may require a technician to make a site visit, which can add cost to the system. Alternately, updating software may depend on the end user to complete the process in house. In these situations, updates often go uninstalled, often for long periods of time, leaving users without valuable new functionality and more susceptible to security breaches, etc. Under a hosted access control model, security professionals manage these updates and other system functions remotely, without disrupting the system’s operation. In addition to handling updates, providers can also ensure that systems are regularly backed up remotely to ensure continuity and the availability of critical audit trail information in the event of a network outage or other disruption [9].
  • Proactive Service: Beyond regular system operation, updates and backups, cloud-based access control enables remote system diagnostics allowing dealers and integrators to detect and address potential problems with devices, networks and other system components quickly and often proactively. Many issues, such as rebooting a device, can be addressed from the monitoring center, eliminating costlier site visits and further contributing to savings. This ensures maximum system uptime and reliability, which are extremely important in any security application [9].
  • RMR: An added bonus is the recurring monthly revenue (RMR) security professionals can generate by providing these services on either a standalone basis or as add-ons to traditional maintenance contracts [9].
  • Improved Security: Hosted access control systems are monitored constantly, which reduces the potential for access credentials to be shared and eliminates the ability for missing or stolen cards to be used to gain unauthorized entry to a building or sensitive areas within. Should an employee be locked out of a building during non-business hours, the monitoring center can verify the individual’s identity and remotely lock and unlock doors he or she is authorized to access [9].
  • Reports: Access data is collected and maintained remotely to generate hassle-free reporting of system usage, which is often required for compliance with company, industry or government regulations. These reports can be provided either on a regularly scheduled or on-demand basis [9].
  • Best-In-Breed Selections: Dealers and integrators don’t have to take on all product solutions to offer this option. Rather, they can partner with best-in-class providers who offer the solutions and services that make up a robust, fully-functional system. Open platforms that enable seamless integration between door hardware, access readers, software and other system components allow dealers and integrators to utilize best-in-breed solutions from providers who specialize and excel in their specific areas, and who are able to focus on what they do best rather than trying to provide an end-to-end solution themselves [7].
  • Scalability: Potential applications for hosted access control are seemingly unlimited given the ease with which cloud-based access control systems can scale, making them appropriate for practically any size customer and application. The flexibility and scalability of these systems allow users to specify the level of control they need now and easily add doors later as needed, ensuring that the system can keep pace with an enterprise’s growth as well.
  • TCO/ROI: Taking advantage of the many benefits of the cloud to deliver hosted and managed access control solutions is an innovative way to meet the needs of any end user, particularly those who lack the budget and other resources to host and manage their own localized system. Best of all, by working with trusted partners to deploy, administer and maintain systems, end users are able to devote their time and energy to their core business and operations [9].
  • Peace Of Mind: This cost-effective option also provides customers with the peace of mind that their systems are being monitored and managed around the clock, and ensures maximum uptime and reliability without the costs and other limitations associated with traditional systems [9].

1.6                                           LIMITATION OF THE PROJECT
One of the largest challenges of implementing cloud-based security is the need to maintain consistent control and visibility across the different domains. With many existing networks, there is a combination of public and private (and even hybrid) cloud-based services, which makes the integration of security services and strategy a big task [8].

1.7                                                   RESEARCH QUESTION
What is cloud based security?
How does cloud based security work?
What is the best home security system?

1.8                                                         PROJECT ORGANISATION

The work is organized as follows: chapter one discuses the introductory part of the work,  presents the literature review of the study,  chapter three describes the methods applied, discusses the results of the work, summarizes the research outcomes and the recommendations.

CHAPTER ONE: The complete chapter one of “cloud-based access control” is available. Order full work to download. Chapter one of “cloud-based access control”consists of the literature review. In this chapter all the related work on“cloud-based access control” was reviewed.

CHAPTER TWO: The complete chapter two of “cloud-based access control” is available. Order full work to download. Chapter two of “cloud-based access control” consists of the literature review. In this chapter all the related work on “cloud-based access control” was reviewed.

CHAPTER THREE: The complete chapter three of “cloud-based access control” is available. Order full work to download. Chapter three of “cloud-based access control” consists of the methodology. In this chapter all the method used in carrying out this work was discussed.

CHAPTER FOUR: The complete chapter four of “cloud-based access control” is available. Order full work to download. Chapter four of “cloud-based access control” consists of all the test conducted during the work and the result gotten after the whole work

CHAPTER FIVE: The complete chapter five of “cloud-based access control” is available. Order full work to download. Chapter five of “cloud-based access control” consist of conclusion, recommendation and references.



To "DOWNLOAD" the complete material on this particular topic above click "HERE"

Do you want our Bank Accounts? please click HERE

To view other related topics click HERE

To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE

Do you want us to research your new topic? if yes, click "HERE"

Do you have any question concerning our post/services? click HERE for answers to your questions

You can also visit our facebook Page at fb.me/hyclas to view our related construction (or design) picture.


For more information contact us through Any of the following means:

Mobile No :+2348146561114 or +2347015391124 [Mr. Innocent]

Email address :engr4project@gmail.com

Watsapp No :+2348146561114

To View Our Design Pix: You can also visit our facebook Page at fb.me/hyclas for our design photos/pics.


COUNTRIES THAT FOUND OUR SERVICES USEFUL

Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124
Watsapp No
:+2348146561114

E
mail Address :engr4project@gmail.com


CLICK HERE FOR MORE RELATED TOPICS/MATERIAL

IF YOU ARE SATISFIED WITH OUR SERVICES, PLEASE DO NOT FORGET TO INVITE YOUR FRIENDS AND COURSEMATES TO OUR PAGE.