R18 IT - Internet of Things (IoT) Unit-IV
R18 IT - Internet of Things (IoT) Unit-IV
Services and attributes for IoT: Cloud Computing and IoT, Big-Data Analytics
and Visualization, Dependability, Security, Localization, Maintainability
UNIT-IV
Services and Attributes for IOT
IoT devices are devices with multiple sensors connected to the cloud, typically via
gateways. There are several IoT Cloud Platforms in the market today provided by
different service providers that host wide ranging applications. These can also be
extended to services that use advanced machine learning algorithms for predictive
analysis, especially in disaster prevention and recovering planning using data from
the edge devices.
What are the key features of an IOT cloud platform
An IoT cloud platform may be built on top of generic clouds such as those
from Microsoft, Amazon, Google or IBM. Network operators such as AT&T,
Vodafone and Verizon may offer their own IoT platforms with stronger focus
on network connectivity. Platforms could be vertically integrated for specific
industries such as oil and gas, logistics and transportation, etc. Device
manufacturers such as Samsung (ARTIK Cloud) are also offering their
own IoT cloud platforms.
Today, for IoT Cloud Platforms, the goal is to stretch the analytics and data
processing across Cloud and Device, leveraging the resources at each end
seamlessly. In general, we are beginning to see a shift towards leveraging the
compute and service capabilities of the cloud to manage IoT devices better.
This is also quite evident from a snapshot of the Google Trends showing
increasing interest in Cloud compute compared to just IoT.
How is an IoT cloud platform different from traditional cloud infrastructure?
The traditional cloud infrastructure focuses on a model of cloud computing
where a shared pool of hardware and software resources are made available
for on-demand access in such a way that they can be easily and rapidly
provisioned and released with minimal effort. IoT Cloud Platform extends
this capability to resources that are more user-centric, which increases the
count and scale of data and devices. The cloud platform services can not
only process big data from a wider set of IoT devices, but also provides a
smart way to provision and manage each of them in an efficient manner.
This also includes fine-grained control, configuration and management
of IoT devices.
One of the IoT Cloud platform differentiators is the ability of the engine to
massively scale to handle real-time event processing of large volumes of data
generated by various devices and applications. The providers of IoT Cloud
Platforms typically work with multiple parties such as hardware vendors
(both for cloud services and IoT devices), telecommunication providers,
software service providers and system integrators to build the platform.
What exactly is meant by Application Enablement Platform (AEP)?
The world of IoT is one of variety: many hardware platforms, many
communication technologies, many data formats, many verticals, and so
on. AEP is a platform that caters to this variety by providing basic
capabilities from which developers can build complete end-to-
end IoT solutions. For example, AEP might offer location-tracking feature
rather than a more restrictive fleet tracking feature. The former is more
generic and therefore can be used in a number of use cases.
With AEP, app developers need to worry about scaling up. AEP will take care
of communication, data storage, management, application building and
enablement, user interface security, and analytics. When selecting an AEP,
developers should consider developer usability including good
documentation and modular architecture, flexible and scalable deployment,
good operational capability, and a mature partnership strategy and
ecosystem.
Could you list some IoT cloud platforms out there in the industry today?
A selection of cloud platforms for Industrial IoT. Source: Newark 2016.
With the advent of IoT with billions of devices getting connected to the
internet which not only does compute, storage and run applications, there is
also a needed to handle large amounts of data coming into the system via
the various interfaces such as sensors and user inputs.
Each of these sectors has its own performance criteria such as real time
data capture capability, data visualization, cloud model type, data analytics,
device configuration, API protocols, and usage cost. Data analytics
performance and outcome also depends on factors such as device ingress
and device egress, intermediate connectivity network latencies and speeds
and support for optimized protocol translations. Visualization of data,
filtering of large masses of data and configurability of the millions of devices
using smart application tools is another differentiating factor.
What are some challenges of adopting IoT cloud platforms?
Security and privacy are the main concerns delaying the adoption
of IoT Cloud Platforms. Cloud providers typically will not own the data and
are only authorized to do the analytics and control of systems as permitted
by the owner of the data. Any breach of data access either during transit or
from storage is a concern from privacy and security perspective. Also, since
the value of IoT data is immense, proper legal agreements and mechanisms
must be in place to ensure the data or outcome of data analysis is only used
for the intended purpose by the authorised personnel.
Existing IoT cloud platforms may not always conform to standards, thereby
causing interoperability issues. They may also not support heterogeneous
modules or communication technologies. When there's too much data,
context awareness can help, including decisions of what needs to be done at
the edge. Vertical silos continue to exist and this prevents horizontal flow of
information. Middleware can solve this problem. Many system continue to
use IPv4 and this could be a problem as devices run out of
unique IP addresses.
Could you compare IoT components from Amazon, Microsoft and Google?
BIG DATA ANALYTICS AND DATA VISUALIZATION:
Big Data visualization calls to mind the old saying: “a picture is worth a thousand
words.” That’s because an image can often convey “what’s going on”, more quickly,
more efficiently, and often more effectively than words. Big data visualization
techniques exploit this fact: they are all about turning data into pictures by
presenting data in pictorial or graphical format This makes it easy for decision-
makers to take in vast amounts of data at a glance to “see” what is going on what
it is that the data has to say.
1. Prevention
2. Removal
3. Forecasting
4. Tolerance
Fault Prevention deals with preventing faults being introduced into a system. This
can be accomplished by use of development methodologies and good
implementation techniques.
Fault Removal can be sub-divided into two sub-categories: Removal During
Development and Removal During Use.
Removal during development requires verification so that faults can be detected
and removed before a system is put into production. Once systems have been put
into production a system is needed to record failures and remove them via a
maintenance cycle.
Fault Forecasting predicts likely faults so that they can be removed or their effects
can be circumvented.
Fault Tolerance deals with putting mechanisms in place that will allow a system to
still deliver the required service in the presence of faults, although that service
may be at a degraded level.
Dependability means are intended to reduce the number of failures made visible to
the end users of a system.
Persistence
Based on how faults appear or persist, they are classified as:
Security:
Security is freedom from, or resilience against, potential harm (or other
unwanted coercive change) caused by others. Beneficiaries (technically referents)
of security may be of persons and social groups, objects and institutions,
ecosystems or any other entity or phenomenon vulnerable to unwanted change.
Refugees fleeing war and insecurity in Iraq and Syria arrive at Lesbos Island,
supported by Spanish volunteers, 2015
Security mostly refers to protection from hostile forces, but it has a wide range of
other senses: for example, as the absence of harm (e.g. freedom from want); as the
presence of an essential good (e.g. food security); as resilience against potential
damage or harm (e.g. secure foundations); as secrecy (e.g. a secure telephone line);
as containment (e.g. a secure room or cell); and as a state of mind (e.g. emotional
security).
The term is also used to refer to acts and systems whose purpose may be to
provide security (e.g.: security companies, security forces, security guard, cyber
security systems, security cameras, remote guarding).
Security is not only physical but it can also be Virtual.
OVERVIEW:
Referent
A security referent is the focus of a security policy or discourse; for example, a
referent may be a potential beneficiary (or victim) of a security policy or system.
Security referents may be persons or social groups, objects, institutions,
ecosystems, or any other phenomenon vulnerable to unwanted change by the
forces of its environment. The referent in question may combine many referents, in
the same way that, for example, a nation state is composed of many individual
citizens.
Context
The security context is the relationships between a security referent and its
environment.[2] From this perspective, security and insecurity depend first on
whether the environment is beneficial or hostile to the referent, and also how
capable is the referent of responding to its/their environment in order to survive
and thrive.
Capabilities
The means by which a referent provides for security (or is provided for) vary
widely. They include, for example:
Computer security
Computer security, also known as cybersecurity or IT security, refers to the
security of computing devices such as computers and smartphones, as well
as computer networks such as private and public networks, and the Internet. The
field has growing importance due to the increasing reliance on computer systems
in most societies.[9] It concerns the protection of hardware, software, data, people,
and also the procedures by which systems are accessed. The means of computer
security include the physical security of systems and security of information held
on them.
Corporate security
Corporate security refers to the resilience of corporations against espionage, theft,
damage, and other threats. The security of corporations has become more complex
as reliance on IT systems has increased, and their physical presence has become
more highly distributed across several countries, including environments that are,
or may rapidly become, hostile to them.
Ecological security
Ecological security, also known as environmental security, refers to the integrity
of ecosystems and the biosphere, particularly in relation to their capacity to
sustain a diversity of life-forms (including human life). The security of ecosystems
has attracted greater attention as the impact of ecological damage by humans has
grown.[10]
Graffiti about ecological security, Belarus, 2016
Food security[
Food security refers to the ready supply of, and access to, safe
and nutritious food.[11] Food security is gaining in importance as the world's
population has grown and productive land has diminished through overuse
and climate change.[12][13]
Perceptions of Security:
Since it is not possible to know with precision the extent to which something is
'secure' (and a measure of vulnerability is unavoidable), perceptions of security
vary, often greatly.[3][17] For example, a fear of death by earthquake is common in
the United States (US), but slipping on the bathroom floor kills more
people;[17] and in France, the United Kingdom and the US there are far fewer
deaths caused by terrorism than there are women killed by their partners in the
home.[18][19][20][21]
Another problem of perception is the common assumption that the mere presence
of a security system (such as armed forces, or antivirus software) implies security.
For example, two computer security programs installed on the same device can
prevent each other from working properly, while the user assumes that he or she
benefits from twice the protection that only one program would afford.
Security theater is a critical term for measures that change perceptions of security
without necessarily affecting security itself. For example, visual signs of security
protections, such as a home that advertises its alarm system, may deter
an intruder, whether or not the system functions properly. Similarly, the increased
presence of military personnel on the streets of a city after a terrorist attack may
help to reassure the public, whether or not it diminishes the risk of further
attacks.
LOCALIZATION:
Localization is often confused with translation, but these terms actually mean two
different things. Localization is the entire process of adapting a product or content
to a specific location or market, according to the Globalization and Localization
Association.
Localization makes content more appealing, which as a result makes the audience
more likely to buy. In fact, 75 percent of consumers said they were more likely
to purchase goods and services if the corresponding product information is
in their native language, according to a 2014 Common Sense Advisory report.
By that logic, anyone who is trying to reach a global audience should consider
localization as well as translation. To truly expand your audience, however, you’ll
need to localize more than just your website. Localization should also include:
Localizing your content allows your organization to expand its reach to a new
audience, build credibility, and increase sales. It also helps you build loyalty
among existing customers. In another Common Sense Advisory survey, half of
senior executives said they believed localization leads to profitability and
growth.
Choosing a Localization Provider
Localizing a product or website can seem intimidating, but it doesn’t have to be. A
full-service language services provider (LSP) has all the resources necessary to
produce high-quality localization on time and on budget, thereby reducing your
need to be involved in the day-to-day execution of the project.
When aggressive timelines are required, these LSPs have the ability to build and
manage large teams. They are also able to perform both linguistic and functional
quality assurance to ensure the localization is correct. And, they probably have an
engineering team that can work with, and extract text from any file type. Perhaps
most significantly, most firms will be able to use sophisticated localization tools
that will yield significant savings on future projects.
In the end, the most important factor in determining whether your localization
project is successful is the skill of the team who actually works on your materials.
When delivering fully localized materials, it should not be apparent to the
audience that the content they are reading or the product they are holding has
been localized from another language.
The fact that your product or content was originally created in English (for
example) and then localized into the consumer’s native language should be
undetectable. A properly localized product should have the look and feel of having
been created specifically for the target market.
LanguageLine has the expertise and technology to handle any type or size of
localization project, from websites, to software, to technical documentation,
multimedia, training and eLearning, and marketing materials.
Localization can help you expand your reach and make the customers you serve
feel more at home. Start reaching new audiences with localization.
MAINTAINABILITY:
In engineering, maintainability is the ease with which a product can be
maintained in order to: