KEMBAR78
Unit 5 Cloud | PDF | Cloud Computing | Internet Of Things
0% found this document useful (0 votes)
13 views20 pages

Unit 5 Cloud

Cloud Computing delivers computing services over the internet, offering advantages like cost reduction, speed, scalability, and enhanced security compared to traditional on-premises data centers. It encompasses various service models including IaaS, PaaS, and SaaS, and can be deployed as public, private, or hybrid clouds. Fog Computing, on the other hand, is a decentralized infrastructure that processes data closer to the source, providing low latency and improved responsiveness for IoT applications.

Uploaded by

saipriya3621
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views20 pages

Unit 5 Cloud

Cloud Computing delivers computing services over the internet, offering advantages like cost reduction, speed, scalability, and enhanced security compared to traditional on-premises data centers. It encompasses various service models including IaaS, PaaS, and SaaS, and can be deployed as public, private, or hybrid clouds. Fog Computing, on the other hand, is a decentralized infrastructure that processes data closer to the source, providing low latency and improved responsiveness for IoT applications.

Uploaded by

saipriya3621
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

Introduction to Cloud Computing

Cloud Computing is the delivery of computing services such as servers, storage, databases,
networking, software, analytics, intelligence, and more, over the Cloud (Internet).

Cloud Computing provides an alternative to the on-premises datacentre. With an on-premises


datacentre, we have to manage everything, such as purchasing and installing hardware,
virtualization, installing the operating system, and any other required applications, setting up
the network, configuring the firewall, and setting up storage for data. After doing all the set-
up, we become responsible for maintaining it through its entire lifecycle.

But if we choose Cloud Computing, a cloud vendor is responsible for the hardware purchase
and maintenance. They also provide a wide variety of software and platform as a service. We
can take any required services on rent. The cloud computing services will be charged based on
usage.

The cloud environment provides an easily accessible online portal that makes handy for the
user to manage the compute, storage, network, and application resources. Some cloud service
providers are in the following figure.
Advantages of cloud computing

o Cost: It reduces the huge capital costs of buying hardware and software.
o Speed: Resources can be accessed in minutes, typically within a few clicks.
o Scalability: We can increase or decrease the requirement of resources according to the
business requirements.
o Productivity: While using cloud computing, we put less operational effort. We do not
need to apply patching, as well as no need to maintain hardware and software. So, in
this way, the IT team can be more productive and focus on achieving business goals.
o Reliability: Backup and recovery of data are less expensive and very fast for business
continuity.
o Security: Many cloud vendors offer a broad set of policies, technologies, and controls
that strengthen our data security.

Types of Cloud Computing


o Public Cloud: The cloud resources that are owned and operated by a third-party cloud
service provider are termed as public clouds. It delivers computing resources such as
servers, software, and storage over the internet
o Private Cloud: The cloud computing resources that are exclusively used inside a single
business or organization are termed as a private cloud. A private cloud may physically
be located on the company’s on-site datacentre or hosted by a third-party service
provider.
o Hybrid Cloud: It is the combination of public and private clouds, which is bounded
together by technology that allows data applications to be shared between them. Hybrid
cloud provides flexibility and more deployment options to the business.

A Types of Cloud Services

1. Infrastructure as a Service (IaaS): In IaaS, we can rent IT infrastructures like servers


and virtual machines (VMs), storage, networks, operating systems from a cloud service
vendor. We can create VM running Windows or Linux and install anything we want on
it. Using IaaS, we don’t need to care about the hardware or virtualization software, but
other than that, we do have to manage everything else. Using IaaS, we get maximum
flexibility, but still, we need to put more effort into maintenance.
2. Platform as a Service (PaaS): This service provides an on-demand environment for
developing, testing, delivering, and managing software applications. The developer is
responsible for the application, and the PaaS vendor provides the ability to deploy and
run it. Using PaaS, the flexibility gets reduce, but the management of the environment
is taken care of by the cloud vendors.
3. Software as a Service (SaaS): It provides a centrally hosted and managed software
services to the end-users. It delivers software over the internet, on-demand, and
typically on a subscription basis. E.g., Microsoft One Drive, Dropbox, WordPress,
Office 365, and Amazon Kindle. SaaS is used to minimize the operational cost to the
maximum extent.

Fog computing vs. Cloud computing


Cloud computing: The delivery of on-demand computing services is known as cloud
computing. We may use applications to store and process power over the Internet. Without
owning any computing infrastructure or data center, anyone can rent access to anything from
applications to storage from a cloud service provider.

It is a pay-as-you-go service.

By using cloud computing services and paying for what we use, we can avoid the complexity
of owning and maintaining infrastructure.

Cloud computing service providers can benefit from significant economies of scale by
providing similar services to customers.

Fog computing is a decentralized computing infrastructure or process in which computing


resources are located between a data source and a cloud or another data center. Fog computing
is a paradigm that provides services to user requests on edge networks.
Devices at the fog layer typically perform networking-related operations such as routers,
gateways, bridges, and hubs. The researchers envision these devices to perform both
computational and networking tasks simultaneously.

Although these tools are resource-constrained compared to cloud servers, the geological spread
and decentralized nature help provide reliable services with coverage over a wide area. Fog is
the physical location of computing devices much closer to users than cloud servers.

Table of differences between cloud computing and fog computing is given below:

Specialty Cloud Computing fog computing

Delay Cloud computing has higher Fog computing has low latency
latency than fog computing

Capacity Cloud computing does not Fog computing reduces the


provide any reduction in data amount of data sent to cloud
while sending or converting computing.
data.

Responsiveness The response time of the The response time of the


system is low. system is high.

Security Cloud computing has less Fog computing has high


Security compared to Fog Security.
Computing

Speed Access speed is high High even more compared to


depending on the VM Cloud Computing.
connectivity.

Data Integration Multiple data sources can be Multiple Data sources and
integrated. devices can be integrated.

Mobility In cloud computing, mobility Mobility is supported in fog


is Limited. computing.

Location Awareness Partially Supported in Cloud Supported in fog computing.


computing.

Number of Server Nodes Cloud computing has Few Fog computing has a Large
numbers server nodes. number of server nodes.
Geographical Distribution It is centralized. It is decentralized and
distributed.

Location of service Services provided within the Services are provided at the
Internet. edge of the local network.

Working environment Specific data center building Outdoor (streets, base stations,
with air conditioning systems etc.) or indoor (houses, cafes,
etc.)

Communication mode IP network Wireless communication:


WLAN, WiFi, 3G, 4G, ZigBee,
etc. or wired communication
(part of the IP networks)

Dependence on the quality Requires strong network core. It can also work in a Weak
of core network network core.

Difference between Fog Computing and Cloud Computing:


Information:
o In fog computing, data is received from IoT devices using any protocol.
o Cloud computing receives and summarizes data from different fog nodes.

Structure:
o Fog has a decentralized architecture where information is located on different nodes at
the source closest to the user.
o There are many centralized data centers in the Cloud, making it difficult for users to
access information on the networking area at their nearest source.

Protection:
o Fog is a more secure system with different protocols and standards, which minimizes
the chances of it collapsing during networking.
o As the Cloud operates on the Internet, it is more likely to collapse in case of unknown
network connections.

Component:
o Fog has some additional features in addition to the features provided by the components
of the Cloud that enhance its storage and performance at the end gateway.
o Cloud has different parts such as frontend platform (e.g., mobile device), backend
platform (storage and servers), cloud delivery, and network (Internet, intranet,
intercloud).

Accountability:

o Here, the system's response time is relatively higher compared to the Cloud as fogging
separates the data and then sends it to the Cloud.
o Cloud service does not provide any isolation in the data while transmitting the data at
the gate, increasing the load and thus making the system less responsive.

Application:
o Edge computing can be used for smart city traffic management, automating smart
buildings, visual Security, self-maintenance trains, wireless sensor networks, etc.
o Cloud computing can be applied to e-commerce software, word processing, online file
storage, web applications, creating image albums, various applications, etc.

Reduces latency:

o Fog computing cascades system failure by reducing latency in operation. It analyzes


the data close to the device and helps in averting any disaster.

Flexibility in Network Bandwidth:

o Large amounts of data are transferred from hundreds or thousands of edge devices to
the Cloud, requiring fog-scale processing and storage.
o For example, commercial jets generate 10 TB for every 30 minutes of flight. Fog
computing sends selected data to the cloud for historical analysis and long-term storage.

Wide geographic reach:

o Fog computing provides better quality of services by processing data from devices that
are also deployed in areas with high network density.
o On the other hand, Cloud servers communicate only with IP and not with the endless
other protocols used by IoT devices.

Real-time analysis:
o Fog computing analyzes the most time-sensitive data and operates on the data in less
than a second, whereas cloud computing does not provide round-the-clock technical
support.

Operating Expenses:

o The license fee and on-premises maintenance for cloud computing are lower than fog
computing. Companies have to buy edge device routers.

Fog Computing vs. Cloud Computing: Key Differences


The concepts of Cloud vs. Fog are very similar to each other. But still, there is a difference
between cloud and fog computing on certain parameters.

Here's a point-by-point comparison of fog computing and cloud computing:

o The fog architecture is distributed and consists of millions of small nodes located as
close as possible to the client device. The cloud architecture is centralized and consists
of large data centers located around the world over a thousand miles away from client
devices.
o Fog acts as an intermediary between data centers and hardware and is closer to the end-
users. If there is no fog layer, the Cloud communicates directly with the equipment,
taking time.
o In cloud computing, data processing takes place in remote data centers. Fog is processed
and stored at the edge of the network closer to the source of information, which is
important for real-time control.
o Cloud is more powerful than Mist concerning computing capabilities and storage
capacity.
o The Cloud consists of some large server nodes. Fog consists of millions of tiny nodes.
o Fog does short-term edge analysis due to the immediate response, while Cloud aims for
a deeper, longer-term analysis due to a slower response.
o Fog provides low latency; Cloud provides high latency.
o Without an internet connection, a cloud system collapses. Fog computing uses different
protocols and standards, so the risk of failure is very low.
o Fog is a more secure system than Cloud due to its distributed architecture.

The table below helps you better understand the difference between Fog and Cloud,
summarizing their most important characteristics.
Benefits of Fog Computing:
o Fog computing is less expensive to work with because the data is hosted and analyzed
on local devices rather than transferred to any cloud device.
o It helps in facilitating and controlling business operations by deploying fog applications
as per the user's requirement.
o Fogging provides users with various options to process their data on any physical
device.

Benefits of Cloud Computing:


o It works on a pay-per-use model, where users have to pay only for the services they are
receiving for a specified period.
o Cloud users can quickly increase their efficiency by accessing data from anywhere, as
long as they have net connectivity.
o It increases cost savings as workloads can be transferred from one Cloud to another
cloud platform.

Fog Computing vs. Cloud Computing for IoT Projects


According to Statista, by 2020, there will be 30 billion IoT devices worldwide, and by 2025
this number will exceed 75 billion connected things.

These tools will produce huge amounts of data that will have to be processed quickly and
permanently. F fog computing works similarly to cloud computing to meet the growing demand
for IoT solutions.

Fog is even better on some things. This article aims to compare Fog vs. Cloud and tell you
more about Fog vs. cloud computing possibilities and their pros and cons.

We provide leading-edge IoT development services for companies looking to transform their
business.

Cloud Computing

We are already used to the technical term cloud, a network of multiple devices, computers, and
servers connected to the Internet.

Such a computing system can be figuratively divided into two parts:

o Frontend- is made up of the client device (computer, tablet, mobile phone).


o Backend- consists of data storage and processing systems (servers) that can be located
far from the client device and make up the Cloud itself.
These two layers communicate with each other using a direct wireless connection.

Cloud computing technology provides a variety of services that are classified into three groups:

o IaaS (Infrastructure as a Service) - A remote data center with data storage capacity,
processing power, and networking resources.
o PaaS (Platform as a Service) - A development platform with tools and components to
build, test, and launch applications.
o SaaS (Software as a Service) - Software tailored to suit various business needs.

By connecting your company to the Cloud, you can access the services mentioned above from
any location and through various devices.

Therefore, availability is the biggest advantage. Plus, there's no need to maintain local servers
and worry about downtimes - the vendor supports everything for you, saving you money.

Integrating the Internet of Things with the Cloud is an affordable way to do business. Off-
premises services provide the scalability and flexibility needed to manage and analyze data
collected by connected devices. At the same time, specialized platforms (e.g., Azure IoT Suite,
IBM Watson, AWS, and Google Cloud IoT) give developers the power to build IoT apps
without major investments in hardware and software.

Advantages of Cloud for IoT


Since connected devices have limited storage capacity and processing power, integration with
cloud computing comes to the aid of:

o Improved performance - faster communication between IoT sensors and data


processing systems.
o Storage Capacity - Highly scalable and unlimited storage space can integrate,
aggregate, and share huge data.
o Processing Capabilities - Remote data centers provide unlimited virtual processing
capabilities on demand.
o Low Cost - The license fee is less than the cost of on-premises equipment and its
ongoing maintenance.

Disadvantages of Cloud for IoT


Unfortunately, nothing is spotless, and cloud technology has some drawbacks, especially for
Internet of Things services.

o High latency - More and more IoT apps require very low latency, but the Cloud cannot
guarantee this due to the distance between client devices and data processing centers.
o Downtimes - Technical issues and network interruptions can occur in any Internet-
based system and cause customers to suffer from outages; Many companies use
multiple connection channels with automatic failover to avoid problems.
o Security and Privacy - your data is transferred via globally connected channels along
with thousands of gigabytes of other users' information; No wonder the system is
vulnerable to cyber-attacks or data loss; the problem can be partially solved with the
help of hybrid or private clouds.

Fog Computing
Cisco coined the term fog computing (or fogging) in 2014, so it is new to the general public.
Fog and cloud computing are intertwined. In nature, Fog is closer to Earth than clouds; In the
tech world, it's the same; Fog is closer to end-users, bringing cloud capabilities to the ground.

The definition may sound like this: Fog is an extension of cloud computing that consists of
multiple edge nodes directly connected to physical devices.
Such nodes tend to be much closer to devices than centralized data centers so that they can
provide instant connections.

The considerable processing power of edge nodes allows them to compute large amounts of
data without sending them to distant servers.

Fog can also include cloudlets - small-scale and rather powerful data centers located at the
network's edge. They are intended to support resource-intensive IoT apps that require low
latency.

The main difference between fog computing and cloud computing is that Cloud is a centralized
system, whereas Fog is a distributed decentralized infrastructure.

Fog is an intermediary between computing hardware and a remote server. It controls what
information should be sent to the server and can be processed locally. In this way, Fog is an
intelligent gateway that dispels the clouds, enabling more efficient data storage, processing,
and analysis.

It should be noted that fog networking is not a separate architecture. It does not replace cloud
computing but complements it by getting as close as possible to the source of information.

There is another method for data processing similar to fog computing - edge computing. The
essence is that the data is processed directly on the devices without sending it to other nodes or
data centers. Edge computing is particularly beneficial for IoT projects as it provides bandwidth
savings and better data security.

The new technology is likely to have the biggest impact on the development of IoT, embedded
AI, and 5G solutions, as they, like never before, demand agility and seamless connections.
Advantages of fog computing in IoT

The fogging approach has many benefits for the Internet of Things, Big Data, and real-time
analytics. The main advantages of fog computing over cloud computing are as follows:

o Low latency - Fog tends to be closer to users and can provide a quicker response.
o There is no problem with bandwidth - pieces of information are aggregated at
separate points rather than sent through a channel to a single hub.
o Due to the many interconnected channels - loss of connection is impossible.
o High Security - because the data is processed by multiple nodes in a complex
distributed system.
o Improved User Experience - Quick responses and no downtime make users satisfied.
o Power-efficiency - Edge nodes run power-efficient protocols such as Bluetooth,
Zigbee, or Z-Wave.

Disadvantages of fog computing in IoT


The technology has no obvious disadvantages, but some shortcomings can be named:

o Fog is an additional layer in a more complex system - a data processing and storage
system.
o Additional expenses - companies must buy edge devices: routers, hubs, gateways.
o Limited scalability - Fog is not scalable like a cloud.

Conclusion:
The demand for information is increasing the overall networking channels. And to deal with
this, services like fog computing and cloud computing are used to quickly manage and
disseminate data to the end of the users.

However, fog computing is a more viable option for managing high-level security patches and
minimizing bandwidth issues. Fog computing allows us to locate data on each node on local
resources, thus making data analysis more accessible.

Role of Cloud Computing in IoT


Innovations lead to a continuing expansion of technologies. IoT and cloud computing are now
two upcoming internet technologies that are closely linked, with one providing the
groundwork for the success of the other.
Cloud computing is helping the IoT in getting success. Cloud is a big factor in the success of
IoT. As cloud enable user to carry and access all thing over internet without any storage, IoT
is related with cloud computing. Future users of these technologies will gain a number of
benefits. As was already mentioned, cloud computing allows for scalability in the delivery of
applications and software as a service by enabling businesses to manage and store data across
cloud platforms.

What is IoT?
In, IoT we do not need interaction between human or between human and computer. We can
communicate data over a network of linked devices like objects, computers, or digital devices.

A heart monitor implant is an example of IoT usage. An in-built sensor that gives alert to driver
on path danger in car is also example of IoT. IoT device is an object which can transfer or
receive the data across network and can have IP address. IoT object should be capable of
having IP address.

Increased data output has led to the growth of IoT. Due to the Internet of Things Cloud
Service's excessive communication between cheap sensors in the IoT, there will soon be
billions of connected machines and devices joining human users.

Why Cloud Computing Is Essential For IoT?


As a result of cloud computing, storage options for personal and professional use have
undergone tremendous change. Data is also available from a distance, thanks to cloud
solutions' scalability and data dynamics. It has thus shown to be a successful solution for data
transfer across internet channels and via specialized direct links, depending on the
organization's needs.

The cloud is an excellent IoT enabler that satisfies the data-driven requirements of the
company. Cloud also offers technology framework. Using that framework, we can develop
better IoT devices.

Speed and scale are two essential aspects of cloud computing, and they work in unmatched
harmony with IoT networking and mobility. So, user can benefit more by combine use of cloud
computing and IoT. Unquestionably, some factors show that the cloud is necessary for the
success of IoT, and here are some of them.
Cloud Functions as a Distant Computing Power
On-premises infrastructure reliance is no longer a viable option. As usage of cloud and IoT
devices are increasing day by day, we generated large amount of data. We need to process that
data quickly using big data. The advantage of having a tonne of storage capacity in this
situation comes from the cloud. As we are heading towards 5G from 4G, cloud computing also
enables developer more speed in getting access to data.

IoT Data is More Secure And Private as a Result of Cloud Computing.


IoT involves significant data generation. And when you work with data, the data security and
data privacy become issue. IoT also makes use of mobility. Cloud uses advance encryption
algorithms and authentication. Which enable cloud to provide its user high security.

No Requirement For Hosting on-premises


For IoT devices, plug-and-play hosting services are necessary. This will become quite
expensive due to plug-and-play hosting services. This will cost more to organizations. This
type of hosting services needs hardware system. Due to the combined power of cloud
computing and IoT, you do not need to depend on substantial machinery. As cloud computing
infrastructure make it ready to use without having hardware storage device set-up offline. This
makes it easy for IoT hosting organizations.

Improved Device-To-Device Communication


We can use cloud technology for the communication using the IoT. Smart device can easily
connect with each other using IoT APIs. It also makes internal communication between
devices fast and easy.

Less Cost of Ownership


While preventing enterprises from putting up the infrastructure, cloud technology also
provides many resources. As a result, it saves lot of money on infrastructure construction.
Additionally, because there is no idea of local systems, hardware, and software in the cloud,
the IT teams are abler to concentrate on their regular tasks.

Program For Business Continuity


Business continuity is guaranteed by cloud computing, even if unexpected disasters occur
while it is being used. There is no danger of data loss because data is maintained on additional
distinct servers, which is considerably more crucial in the case of IoT-based architecture.
IoT innovations with low entry barriers require hassle-free hosting options. As a result, cloud
computing in IoT is a suitable solution. IoT players can use the power of distant data centers
due to cloud computing without requiring on-premises gear and software. IoT cloud
computing is the best option financially because users need to adhere to the pay-as-you-go
concept. It also saves a tonne of money upfront.

This helps businesses can launch massive IoT projects with ease. This removes many obstacles
to entry for the majority of IoT-based organizations.

Communication Between Devices


By using cloud computing in proper way, IoT devices can communicate with each other
seamlessly. As a result, connected devices and smart devices can communicate with various
reliable APIs. In this way, networked technologies are made possible by cloud computing.

Conclusion
Every firm works individually to keep up with this evolving technology's pace. IoT technology
is predicted to connect billions of devices, and the information that these devices produce will
be challenging to handle and process using the current methods.

CHALLENGES FACING CLOUD-BASED IoT INTEGRATION


There are a vast number of challenges faced by the integration of Cloud and IoT. Some of
which are listed below:
Devices and their capacity
Device’s security approaches normally depend on the encryption most of the security
approaches whenever we talk about it depends upon encryption but when going about IoT the
entire environment is all about constrained environments and the devices are also about
constrained devices which means they are not having sorts of luxury in terms of resource
availability in terms of memory in terms of processor speed in terms of many things they are
constrained even including power so when you go with encryption it is not a good fit for this
constrained environment are constrained devices and this complex encryption and decryption
may take time for this constrained devices it might not work well so these products with
constrained resources are most vulnerable to the side-channel attacks and reverse engineering
of the algorithms is also possible so it is not a great idea to go with encryption techniques
towards the constrained environment this is the first challenge that we normally face. Sensitive
information leakage can also occur due to multi-tenancy. Moreover, public-key cryptography
cannot be applied to all layers because of the processing power constraints imposed by IoT
objects. New challenges also require specific attention; for example, the distributed system is
exposed to several possible attacks, such as SQL injection, session riding, cross-site scripting,
and side-channel. Moreover, important vulnerabilities, including session hijacking and virtual
machine escape are also problematic.
Authorization and the Authentication
Although security and privacy are both critical research issues that have received a great deal of
attention, they are still open issues that require more effort. Indeed, adapting to different threats
from hackers is still an issue. The device authorization is not a separate work it also goes with
authentication the device authorization must go hand-in-hand with authentication and is pretty
critical when it comes to IoT products because you are not only authorized but also you need to
authenticate so the one who tries to access this must establish their identity before proceeding
further with the Gateway access and to other cloud resources so I would each platform with the
two-factor authentication and usage of strong passwords are the major ones that we are relying
on till so you need to think about this aspect of the security authentication and authorization
both are to be very good just the point that you need to remember.
Updates
The third aspect the device updates whenever you have a device it gets updates these states in
terms of member update or something security patches firmware or the software will have
several challenges means every day every second now and then we see that there are a lot of
new security threats are coming in and how do we address it we normally address it through the
patches on the security firmware updates so these updates are to be very good and this might
not be feasible or possible with every IoT device so how do we handle it do we have a chance
to go ahead and update the firmware of every IoT device concerning the newly incoming attacks
in that case that is fine but there are some cases where we really may not have an opportunity to
go ahead and update the firmware because of constrained environments and all those stuff so
many a times the device roller may not also show much interest in applying an update this very
important point, forgetting the importance of the security updates we postpone this security
updates so that’s the major problem that we are facing and that’s one of the biggest challenges.
Communication Channel
The communication channel needs to be much secured the encrypting messages before the
transfer is good but the better one is to use the transport encryption and to adapt the standards
like TLS(Transport Layer Security) see this point here in the communication channels when
you are about to send before that you encrypt and standard the first point that we said is the
encryption that is happening in the devices but now we are talking about the so there is a lot of
difference between these two points so understand the difference and when we talk about the
vulnerabilities it can cost constraints it can be expertise constraints it can be known operation
of the software by the customers it can be the market created the way the mandate for speedy
deployment when it has to be fast it cannot go for multiple checking that is that has to happen
to make sure the system is secure and operational constraints all these are the major security
vulnerabilities that we are facing when one deploys any IoT devices. Besides, when critical IoT
applications move into the Cloud, issues arise because of the lack of trust in the service provider,
information regarding service level agreements (SLAs), and the physical location of data.
Retain collected data
The sensor data should be stored and processed securely the sensor data may come from
different sensors it is attached to different equipment all the different equipment could be at
different places so it is a challenge we need to make sure that the data integrity has to be
maintained including some checksums or signatures that can be included to make sure that the
original raw data is not modified during the transfer what it means is that we have generated the
data that should go to the destination and in between the data should not be changed so what do
we have checksums we have other methods we can make sure that the data order is not changed
and all those are to be practised and most an important point the data that you think is not
required anymore should be removed retaining that data will increase the complexity and will
cost us more in the maintenance part of it.
Performance
The performance here is concerned with the network bandwidth which depends upon the type
of IoT sensors and applications for which they are used. If the application is not at an industrial
level, then large bandwidth is not required else the transfer of heavy amounts of data from
sensors to cloud requires a large amount of bandwidth. This is because timeliness might be
affected by unpredictable matters and real-time applications are very sensitive to performance
efficiency. Cloud environments; indeed, this is because broadband growth is not keeping pace
with storage and computation evolution.

Connecting IoT with Cloud


Connecting IoT (Internet of Things) devices to the cloud is a crucial aspect of modern IoT
systems. By integrating IoT devices with cloud services, you can store, analyze, and manage
data generated by these devices on a scalable and secure platform. Here's a general outline of
the steps involved in connecting IoT to the cloud:

1. Choose the right cloud service provider: Select a cloud service provider that suits
your needs and requirements. Major cloud providers like Amazon Web Services
(AWS), Microsoft Azure, Google Cloud Platform (GCP), and others offer IoT-specific
services to facilitate device connectivity and data management.

2. Set up IoT devices: Prepare your IoT devices by ensuring they have the necessary
sensors, communication modules (e.g., Wi-Fi, Bluetooth, Zigbee, LoRa, etc.), and
firmware to connect to the internet and send data to the cloud.

3. Implement communication protocols: Choose a suitable communication protocol


for your IoT devices to communicate with the cloud. Common protocols include
MQTT (Message Queuing Telemetry Transport), CoAP (Constrained Application
Protocol), and HTTP/HTTPS.

4. Security considerations: IoT devices are often vulnerable to security threats, so it's
essential to implement robust security measures. This includes using secure
communication protocols, encrypting data in transit and at rest, and implementing
authentication and authorization mechanisms to ensure only authorized devices can
access the cloud.

5. IoT Gateway (optional): For more complex IoT systems or devices that cannot
directly connect to the cloud, you may need an IoT gateway. The gateway acts as an
intermediary that collects data from the devices and forwards it to the cloud securely.

6. Cloud IoT services: Leverage the IoT services provided by your chosen cloud
provider. These services often include IoT hubs, device management platforms, data
storage solutions, and real-time data processing and analytics capabilities.

7. Device registration and management: Set up processes to register and manage your
IoT devices on the cloud platform. This involves assigning unique identifiers to each
device and tracking their status and metadata.

8. Data ingestion and storage: Design the data ingestion process to receive data from
the IoT devices and store it in the cloud. Define the data schema and storage strategy
based on the type and volume of data you expect to handle.
9. Data processing and analytics: Implement data processing pipelines and analytics to
gain valuable insights from the IoT data. This may involve real-time processing or
batch processing, depending on your application's needs.

10. Visualization and application development: Create user interfaces or applications to


visualize the data and provide insights to end-users or stakeholders. You can build
dashboards, reports, or integrate the data into existing applications.

11. Scalability and monitoring: Ensure that your IoT-cloud infrastructure can scale to
handle a growing number of devices and data. Implement monitoring and alerting
mechanisms to detect issues and address them promptly.

Remember that the specifics of connecting IoT to the cloud can vary depending on your IoT
device types, application requirements, and the cloud provider you choose. Always consider
security, scalability, and data privacy throughout the process

You might also like