0% found this document useful (0 votes)
119 views70 pages

Unit - IV

The document discusses challenges in developing IoT applications and frameworks that can help address those challenges. Some key challenges include privacy and security of data transmitted between devices, physical security of devices, cloud storage security, and ensuring reliable connectivity. Popular IoT frameworks mentioned are KAA IoT, MACCHINA.io, ZETTA, GE PREDIX, ThingSpeak, DeviceHive, and Eclipse Kura, which provide tools to help manage devices, transmit and analyze data, and develop applications across different operating systems and devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
119 views70 pages

Unit - IV

The document discusses challenges in developing IoT applications and frameworks that can help address those challenges. Some key challenges include privacy and security of data transmitted between devices, physical security of devices, cloud storage security, and ensuring reliable connectivity. Popular IoT frameworks mentioned are KAA IoT, MACCHINA.io, ZETTA, GE PREDIX, ThingSpeak, DeviceHive, and Eclipse Kura, which provide tools to help manage devices, transmit and analyze data, and develop applications across different operating systems and devices.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 70

Unit - IV

IoT Application Development: Solution


framework for IoT applications
Challenges during the development of IoT app
• The challenges for developing an IoT app are given below-
Privacy and security-
• Privacy, as well as security, can e considered to be one of the controversial
issues related to IoT app development yet the challenge is very significant.
• However, it is very important to know that security is not only about the
security of the network but it is also about the security of components
involved in IoT application development.
• The applications are basically backed by a network that plays an important
role in connecting the software and hardware components along with the
involvement of a huge amount of traveling of data.
• The traveling of data takes place via a number of connected devices that
interfere with the user’s personal space. As there is a huge amount of data
that is online and so chances of cyber threats and hacking are also more.
• So security is always considered to be a major challenge when a developer
is developing an IoT application.
Some of the other things that must be kept into consideration while you are
developing any IoT app are-
• Physical security- IoT devices are basically unattended, so hackers can
tamper with that device very easily. So it is always a challenge to check
whether the security component is added to the IoT devices.
• Cloud storage- Everyone knows that cloud storage is a secure place but
still the IoT developers have to ensure that the encryption of the IoT
platform is done properly. Moreover, proper authorization and access are
also to be taken care of.
• Data exchange- The transferring of data from IoT devices and sensors to a
gateway or a platform and then storing that data in the cloud is tough
work where security is essential. So the developers must pay great
attention to see that the protocol of data encryption is followed while the
development of the IoT app is taking place.
• Privacy updates- There are always rules and regulations for the data which
are fetched by IoT devices. For example, it is known that all fitness trackers
make a collection of user data depending on the guidelines of HIPAA. So it
can be said that certain regulations for data are stored in the cloud. So if
the app is complying with the regulation then the privacy of the data is
ensured.
Connectivity-
The essence of developing IoT applications is the real-time transmission of
data. Because of the latency and poor connectivity, this is a very important
difficulty or challenge that a developer has to face.
• Useful front-end information that is provided by connected devices is very
important. So poor connectivity is basically a challenging factor when
there is a requirement for IoT sensors for monitoring, supplying
information, and also processing data.
• There are many huge companies that are unable to perform because of
the server breakdown. Connectivity can be considered the most important
concern when you are connecting devices.
• This challenge can be addressed in the environment of the device and
design application. It is possible to connect the printer to a laptop or
mobile through wifi but in case of establishing a connection for smart
vehicles, an internet connection is very essential.
• So the developers must have a good understanding of the features and
functions of devices. In order to make sure that the platforms as well as
IoT devices are performing well it is essential that the connectivity is good.
Cross-platform compatibility
• In order to develop the perfect IoT app the changes of the
future technology must be kept in mind.
• In order to do all this a good balance between the software
and hardware is essential. The team of developers must
pay good attention to development as well as product
updates.
• So it is a challenge for the developers as they have to
ensure that the IoT platforms and devices are giving perfect
performance instead of heavy bug fixing, device updates,
and operating systems.
• The integration of the legacy system and IoT application
makes it the job for developers difficult to meet the
standard and protocol of the industry. The developers must
also look into the matter that there is no increase in
difficulties in the ecosystem of IoT.
Processing and Data collection
• There is an involvement of a huge amount of data and
so data processing and collection act as a challenge to
the developers. Not only privacy and security, but the
developers also have to take care of the plan for
storing, processing, and collecting data that is taking
place within the environment.
• In order to ensure the storing of data in the cloud and
comply with the requirement of platform analytic
engineers, data experts, and machine learning
resources must be employed for getting insights from
data that is stored in the cloud.
• Data is very important in the case of IoT app
development but the most important of all is the
storing as well as processing of data.
Lack of skill set
• The above challenges can be faced only if there is
a correct skilled resource working for developing
IoT applications.
• IoT depends on the resources that have ideas
about software as well as hardware
implementations. If the talent is right then it will
surely help you in getting through all the
challenges.
• So you have to choose the perfect mobile app
development service to face all these challenges.
• As you have known about all the challenges of
developing an IoT app, you must have some idea
about the IoT framework.
• What is the IoT framework?
• Till now you have known about the challenges and from
there you have got some idea about IoT that it is not just a
single element.
• It is basically an ecosystem that is an infrastructure of
devices that are connected with each other for
communicating with the help of the internet.
• Many Blockchain development companies also prefer IoT
frameworks. IoT framework is basically that component
that helps in the seamless transmission of data.
The components of the IoT framework are-
• Cloud application.
• Software application.
• Hardware devices.
• Cloud and communication platform.
Few IoT frameworks
• There are many frameworks for IoT but some of the
popular and common frameworks are given below-
• KAA IoT-
This framework is considered to be one of the rich as
well as an open-source platform.
• Here anyone can materialize their concept of smart
products on a freeway.
• With the help of cross-device interoperability, it is
possible to establish an unlimited connection of
devices.
• Real-time device monitoring is also possible with the
help of remote device configuration and provisioning.
This platform is the most flexible of all and is also very
scalable, fast, and modern.
MACCHINA.io-
• This platform is generally web-enabled. The platform also provides an
extensible and modular run-time environment for C++ as well as Java in
order to develop the gateway application of IoT.
• A wide variety of technologies as well as sensors are supported by these
platforms and they are Xbee, Tinkerforge, Bricklets, and others including
accelerometers.
• This platform is having the capability of developing and deploying device
software for V2X and automotive telematics, home and building
automation, IoT gateways and computing of industrial edge, energy
management systems, and finally smart sensors.
ZETTA
• This platform is generally server-oriented.
• It is built around REST, NodeJS, and react programming
development which is flow-based and linked with the APIs
of Siren hypermedia.
• After the abstraction of REST APIs, they are connected with
the services of the cloud.
• These services of the cloud generally include a visualization
tool as well as a supporting tool for machine analytics like
Splunk.
• A geo-distributed network is created with the help of
endpoint connections like Arduino hacker and Linux
boarding with Heroku-like platforms.
• GE PREDIX-
This is a service platform that is basically based on the cloud
foundry. It adds device security as well as real-time, asset
management, and predictive analytics that play a role in supporting
the acquisition of heterogeneous data, accessing it, and also storing
it. The development for this platform took place by GE and that was
also for their own operations but later on, it became popular with
the IoT platform.

• ThingSpeak-
This is also another platform which will also help the developer in
visualizing as well as analyzing the data in MATLAB and eliminating
the need for buying a license for it. It also helps in collecting and
storing the sensor data in channels which are basically private.
However, the storing may be private but you have the freedom of
sharing them in public. It works with particle photon and electron,
Arduino, and many other applications. There is also a worldwide
community for this platform which acts as a helpful thing for the
developers who are joining new.
• DeviceHive-
This is also an open-source platform for IoT solution
development. The distribution of this platform is under the
Apache version 2.0. The platform is free to change as well
as use. Deployment of Kubernetes and Docker is also
provided along with both downloading and using it with
both private and public clouds. Running of batch analytics is
possible through this platform and machine learning is also
possible. DeviceHive is special and preferred by developers
as this IoT platform is having many libraries including iOS
and Android libraries.

• Eclipse Kura-
The building of this platform took place around OSGI or
Java which is based on the Kura API container. Eurotech’s
everywhere cloud framework is the main source for
developing the Kura framework. This Kura framework is
often having integration with the Apache Camel. Some of
the important sub-projects are the Eclipse SmartHome
framework and PAho messaging protocol framework.
• OpenHAB -

Any device that is having the capability of running JVM


can also run OpenHAB. A modular stack is the reason
for the abstraction of IoT technologies and also offering
scripts, supports, and rules for persistence which the
ability for retaining the state of the device for a certain
period of time. Different types of UIs which are web-
based is offered by OpenHAB. The supporting also
takes place by major boards of Linux hackers. The
deployment takes place in premise and the connection
to services and devices takes place through different
vendors.
• DSA-

DSA stands for Distributed Services architecture. This is


also an open-source platform for developing IoT. It
unifies services, devices, and also applications. This
unifying takes place in real-time and structured data
model which facilitates decentralized device logic,
inter-communication, and applications. The links for
distributed services is basically a community library
which helps in allowing data integration as well as
protocol translation to the third-party data sources and
also getting back from them. As the models are
lightweight they are more flexible for use. An in-built
hardware integration support is there and it also helps
in the implementation of DSA query DSL.
Implementation of Device integration
• IoT integration is all about APIs, the logical
connectors that allow applications to
communicate with each manufacturer's IoT
devices.
• APIs expose data that enables those devices to
transmit data to your applications, acting as a
data interface. Or, they can allow your
application to control the device and serve as
a function interface.
The data interface
• With so many IoT devices out there, many organizations are
focused on gathering data from all connected devices. Data
interfaces are key and can be used for such things as:
• Determining data patterns that may require fixes or
maintenance.
• For example, data generated by jet engines can be analyzed
to determine whether an engine needs attention ahead of
regular maintenance.
• Data produced by drones that are programmed to orbit
agricultural fields to determine the effectiveness of
irrigation
• Data produced by a health activity tracker may indicate that
the wearer is in danger of suffering from heatstroke or
heart attack. Activity trackers are also being used as tools
physicians can use to track higher-risk patients between
exams.
• While the types of data accessed on devices vary
greatly, common uses include placing that data within
big data systems for data analytics processes to analyze
the data in real time or near real time.
• Data science is joined at the hip with IoT. Pulling the
data off devices is becoming easier, and offline analysis
of the data is where innovation is occurring.
• For example, healthcare providers might analyze health
telemetry data to gather information from patients,
look for patterns that the patient might change to
improve wellness, or diagnose diseases earlier.
The function interface
• The function interface controls the device. People have
been doing this for years with process control systems,
dashboards, and so on.
• Now the idea is to provide interfaces that let applications
perform the same function, such as building an application
that can shut off the fuel system in your car when the
airbag deploys or that lets the power company
automatically turn up the temperature on your thermostat
on warm days to save power and avoid a brownout. Many
smart thermostats, such as EcoFactor, now work with
power companies to provide these "load-shedding"
capabilities, offering thermostat owners significant cost
savings, while allowing the utility company to avoid
building more carbon-producing power plants to keep up
with peak demand.
Linking with the cloud
• The cloud is a key enabler for the IoT. In the
EDC(Edge Data Centers) Internet of Things Study,
more than half (55 percent) of IoT developers
said that they connect to devices primarily
through the cloud, with 32 percent saying they
connect through a hub or middle tier.
• More than a quarter (26 percent) of IoT
developers said that they associate cloud
computing with the IoT, and that group of
respondents was three times more likely to use
the cloud as a development environment.
• Software engineers who build IoT applications using
APIs need a quick way to provide resources to provide
the massive amounts of data storage required, and the
fact that public clouds are already API-oriented is a big
advantage.
• In essence, developers take an API or service-oriented
approach to development. Building applications is
about creating composites of services: cloud
services/APIs and device services/APIs.
• By taking this approach, you can abstract your
application away from the underlying complexities of
dealing with data storage and device communication.
• Moving forward, new technologies will come onto the
scene to make IoT development even easier, including
tools for API management and security.
Use the data to innovate
• What's most important to understand about the IoT is the number
of different, high-value applications involved, from better health to
safer travel. The value of the IoT isn't in what's been done but what
you can do with it going forward.
• For year, software engineers have designed applications that
communicate with devices, machines, and "things." What has
changed is the power of available resources they can use to process
and store IoT data and the cost-effectiveness of the devices
themselves.
• As those technologies become more powerful and cost-effective, so
will the IoT. Big data and the cloud are IoT enablers, so software
engineers who want to build applications that fully exploit these
devices—whether it's a factory robot, a drone, or a Nest
thermostat—should focus on what they can do with the data
IoT data integration

• Turn data into actionable intelligence with


device interoperability and IoT data
integration between people, systems, and
things
• The Internet of Things (IoT) introduces new
formats and immense volumes of data.
• Data Integration for the Internet of Things
enhances data utilization and communication
for better, quicker decision-making.
What is IoT data integration?
• IoT data integration offers actionable insights,
connecting data from operational systems
with IoT sensors for immediate and contextual
information.
• By integrating both historical and real-time
data from multiple components with business
systems, data lakes, and analytical tools, it
delivers performance information that
improves productivity and reduces cost.
• The IoT Platform standardizes how data is identified and
represented, ensuring the highest level of security and integrity can
be maintained at scale.
• It rapidly, securely, and flexibly integrates structured and
unstructured data. This eliminates the cost and complexity of
managing changing document types, data formats, and protocols or
creating and syndicating integrations for machine-to-machine and
application-to-application scenarios.
• Integration for IoT uses an identity-centric approach to secure
device management, providing connected devices with a digital
identity, a digital twin that authenticates and verifies the device.
• A digital identity makes it possible to configure business logic based
on events, process sequences, or analytic thresholds that deliver
notifications or take other informed actions.
• With an integrated IoT, enterprises can easily collaborate with
internal or partner-led development teams to create value-added
services, improve customer experiences and, ultimately, grow
revenue.
What makes IoT integration so challenging
• As technology is booming so fast, and so does its implementation. It
comes with new challenges with them. However, with IoT, there is nothing
somewhat like what enterprises usually tackle the complication and level
of Integration. Here are some features that differentiate IoT.
• Stream messaging:
It is a critical task to stream 100 of IoT data. We collect and process a
stream of data from numerous smart sensors and make it worth using.
• An Immense number of connected devices:
Data exchange is the next common thing in the market full of information
where thousands of connected devices are indulging. Connecting and
integrating them for the sheer number of endpoints is challenging.
• Dynamic parameter counts:
IoT is rapidly exploring in terms of connecting n number of endpoints as
these days, it’s quite standard with technology in advance. Conventional
Integration and dynamic parameters are designed to work and support a
fixed amount of parameters.
• New communication protocols:
IoT and Smart use wholly new and communication protocols, which
means enterprises need integration platforms that can adjust seamlessly
with new IoT protocols.
• Low latency tolerance:
Due to IoT implementations, your integration platforms enable super-fast
data processing and relay.
Data
Acquisition
The process of sampling signals that measure real world physical conditions
and converting the resulting samples into digital numeric values that can be
manipulated by a computer.

• Data acquisition system, also known as DAS or DAQ, is a


system that performs the above process
P hysical Transducer Signal Analog - Digital
Converter Computer
System Sensor Conditioning

2 2 2 2
8 Bit Code
P hy sical S y stem Noisy S ignal F iltered S ignal D igitalized S ignal
1.5 1.5 1.5 1.5 0 1 1 1
0 0 0 1
1 1 1 1
0 1 1 1
1 0 1 1
Measured Value

Measured Value

Measured Value

0.5 0.5 0.5 0.5

Discrete Value
1 1 0 0
0 0 0 0
1 1 1 1
-0.5 -0.5 -0.5 -0.5 0 1 1 0
1 0 1 0
-1 -1 -1 -1
1 1 1 0
-1.5 -1.5 -1.5 -1.5 1 1 1 1
0 1 1 1
-2 -2 -2 -2
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 5 10 15 20 25 30 1 1 1 0
10
Seconds 10
Seconds 10
Seconds Sample Number
1 1 1 1
0 0 1 1

Physical Signal Noisy Electrical Signal Conditioned Signal


2
1 1 0 0
D igitalized S ignal
1.5
0 1 1 1
0 1 1 1
1
0 1 1 0
0.5 0 1 1 0
Discrete Value

1 0 1 1
0
1 1 1 0
-0.5 0 0 0 1
1 1 1 1
-1
1 0 1 1
-1.5 0 0 1 0
0 0 1 1
-2
0 5 10 15 20 25 30 1 1 1 1
Sample Number 1 0 0 1
1 1 0 1
Digitalized Signal 1 1 1 0

https://en.wikipedia.org/wiki/Data_acquisition 3
Remote Data
Acquisition
• Traditional, wired sensors

sensor field Network

Remote
monitoring
Data loggers
Local
monitoring

2
Remote Data
Acquisition
• Wireless sensors
• Sensors communicate with data logger via radio links

Network
sensor field

Remote
radio link monitoring

3
Remote Data
Acquisition
• Wireless Sensor Networks – WSN
• Sensor nodes deployed and forming an ad hoc network
◦ Requires no hubs, access points
◦ Instantly deployable

Sensor node

Sensor network
Gateway Network
• Targeted applications
◦ Emergency responses
◦ Hazardous area monitor
Remote
monitoring

3
Internet of Things
(IoT)

http://www.opinno.com/en/content/internet-things-0 7
IoT Reference
Model

https://insightaas.com/new-iot-reference-model-creates-common-tongue/ 8
SCADA
System
• Supervisory Control And Data Acquisition
• Mostly used in industrial, since 1960s

https://en.wikipedia.org/wiki/SCADA 9
IIoT and Industry
4.0
• IIoT – Industrial Internet of Things

Industry 4.0

cyber-physical system

https://www.i-scoop.eu/internet-of-things-guide/industrial-internet-things-iiot-saving-costs-innovation/industrial-internet-things-iiot/ 10
DAQ/IoT Hardware
Platforms
• Various communication protocols: BLE, Wi-Fi, LoRa
IEEE802.15.4, etc.
Adafruit’s Feather M0+LoRa
Raspberry Pi
ESP32 WiFi/BLE module

https://www.adafruit.com/product/3178
https://docs.espressif.com/projects/esp-idf/en/release-v3.3/hw-reference/modules-and-boards.html
https://www.raspberrypi.org
and many more…
36
DAQ Application
Examples
• Agriculture
◦ Smart/precision farming
• Civil engineering
◦ Structural response
◦ Disaster management Image by Sarah Clarry from Pixabay

• Environmental sciences
◦ Habitat monitoring
• Factory monitor and control

Image by skeeze from Pixabay

37
DAQ Design
Consideration
• Internet access vs. no access
• Wired vs. wireless connectivity
• Short-range vs. long-range communication
• Single-hop vs. multi-hop data transfer
• Main vs. battery power
• Real-time vs. non real-time data

http://clipart-library.com 13
Human Data
Sources
• Questionnaires
• Social sensing
◦ Analyzing hashtags
◦ Text mining

Image by Shahid Abdullah from Pixabay

14
Data
Integration
• Data transformation
• Data storage
• Data administration
• Data visualization

http://clipart-library.com 15
Real-Life
Projects
• Growth chamber monitoring
• Cattle tracking
• Telemetry system at Yom River
• Landslide monitoring in Krabi

41
Growth Chamber
Monitoring
• Monitors temperature and humidity in a chamber for
tissue culture

sensor node
sensor
node

42
Growth Chamber
Monitoring

43
Cattle
Tracking
• Tracks and records cattle movements with GPS receiver

19
44
Cattle Tracking: Power Management

https://www.cpe.ku.ac.th/~cpj/cattrack/kps.2018-06-11.html

20
45
Yom River
Telemetry
• Collaborating with Royal Irrigation Department (RID),
supported by JICA/JST
• Problem: no cellular coverage at
a telemetry station along
the Yom River in Phrae Province

46
Yom River Telemetry:
Design

47
Landslide
Monitor
• Collaborate with Geotechnical Engineering Research and
Development Center (GERD), supported by JICA/JST
• Two purposes
◦ Provide real-time alert and early warning for the villagers
◦ Provide field data for researchers

48
Khao Phanom, Krabi Province, Southern Thailand
Landslide Monitor: System
Overview
KU
Internet
sensor
nodes
Debris flow
detector

Gateway

Village Head
Rain gauge

Village Area Relay Network Observation area


50
Landslide Monitor: Observation
Areas
• Rain gauge installation

• Debris flow detector


installation

51
Landslide Monitor: Relay
Nodes

52
Landslide Monitor: Relay
Network
• IEEE 802.15.4 @2.4GHz

Gateway

Sensor Node

53
Landslide Monitor: Long-Range Link
• IEEE 802.11 (Wi-Fi) @5GHz

Gateway
@Foothill
~4km

Village Head

54
Landslide Monitor: Warning
Report Accumulation
Condition Risk Level
Period
< 100 mm. Low
1 day
≥ 100 mm. High
< 300 mm. Low
3 days
≥ 300 mm. High

55
Landslide Monitor:
Deployment

56
Demonstration:
MQTT
• Install MQTT software on your mobile devices
MyMQTT (for Android) MQTTool (for iOS)

57
Content-Centric Networking Model

Internet

58
What is Unstructured Data?
• Primarily, unstructured data storage is all the data that doesn’t fall under the
horizon of relational databases.
• The data here is not structured using predefined data models. Still, it
upholds an internal structure that may be textual or non-textual, generated
by humans or machines. It gets stored within non-relational databases such
as NoSQL.
• Unstructured data can be anything from social media posts, images, audio
files, sensor data, text data, and many different data types. The term
unstructured highlights the fact that large datasets aren’t in a defined
structure layout.
• At first glance, unstructured data is a possible storage headache, but it
provides a valuable source of intelligence and insight.
• This article will underline unstructured data storage and the cloud services
and structures that exist to ensure it works effectively in the Cloud, including
NAS and object storage.
How Does Unstructured Data Storage Work?
• Unstructured data has seen tremendous exponential growth
because of the ongoing technological advancements driving
eCommerce, cloud migration of businesses, and social media
activities.
• Also, excessive growth means that data storage has to get
redefined
• Regarding data size and format, unstructured data comprises
everything, including IoT, remote system monitoring, and data
to video and Images. File sizes can range from a few bytes to
many gigabytes plus.
Cloud Storage of Unstructured Data
• The Cloud provides high-performance, scalable storage infrastructure
services to customers. There is increasing demand for such flexible
services.
• Hence providers and pioneers of cloud innovations offer their infrastructure
on a subscription basis or as open-source software to reduce the overall
financial burden on business organizations.
• Unstructured data pretty much includes every kind of information. The file
sizes range from a few bits and bytes to gigabytes or more.
• But there is no uniform approach regarding data storage.
• The type of storage used to store collected data depends on the computing
capacity and the preset thresholds for input and output, including
everything from low-performance cloud instances to high-performing,
distributed files.
Network Attached Storage
• Before, Network-Attached Storage (NAS) was just
associated with single file, siloed data storage.
• Nowadays,scale-out NAS can handle big data and high-
capacity data storage.NAS scaling has elevated file storage
access into realms of higher performance and capacity.
• Scale-out NAS has a parallel file system that provides a
namespace across multiple attached storage boxes to
scale billions of file data. You can add computing capacity
and processing power in some cases.
Object Storage
• Object storage is the more recent development of unstructured data storage that
keeps data in a flat format.
• You can access the data using unique identification models with metadata headers
that enable search and analysis. The service grew in popularity after providing an
effective solution to the shortfalls of scale-out NAS.
• Object storage is arguably the native format of the Cloud, too. It is hugely scalable
and accessible via application programming interfaces (APIs), which fits well with
the DevOps way of doing things.
• Object storage falls short of file locking, and it recently improved in terms of
performance.
• The big cloud service companies have their primary storage offerings built on
object storage. They offer different service tiers also, to cater to many business
cases. For instance, Amazon web services provide various courses of S3 storage
with variations determined by accessibility, speed, and the reproducibility of the
data.
Unstructured Data vs. Structured Data
• Unstructured data is data not managed using a transactional
system.
• These include data not stored in a relational database
management system. Otherwise, structured data comprises
records and transactions within a database environment, for
instance, the rows in an SQL database.
• Both structured and unstructured data storage tools allow users
to access information. Just unstructured data comes in
significantly larger quantities than structured data.
The Challenges of Working with Unstructured Data

• Scale: It’s pretty standard for many businesses to come across


unstructured datasets with massive scales of tens or hundreds of
billions of data files. The files or objects can be a few bytes (simple
production-line reading) to terabytes (a full-length 8K video).
• Collaboration: Increasing amounts of unstructured data deliver
immense value as they get transferred and shared. For example,
research facilities at different hospitals share substantial genomic
sequences. Otherwise, traditional approaches limit the capacity to
share massive sets of unstructured data across regions and
businesses. It attracts costly replication and governance.
Cloud Benefits of Unstructured Data Storage

• The three leading cloud providers offer core object storage services
for data lake storage use.
• For instance, Microsoft provides a targeted service, Azure Data Lake,
to handle unstructured data.
• The primary benefits here include the expandable capacity provided
as a means of transferring using different gateways.
IoT Authentication
• IoT (Internet of Things) Authentication refers to ways to securely
and conveniently access connected devices such as smart homes,
autos, transportation hubs, and workplaces.
• The smart device ecosystem is highly fragmented, having not yet
settled on a standard for what hardware, software, and
communications protocols are the dominant means to access
devices.
• Enterprises may use RFID badges for secure entryways, while
homeowners may use proprietary apps for autos and thermostats.
• This fragmentation causes poor usability — UX being paramount
to the success of the IoT and digital transformation — and higher
risk, as system fragmentation and varied settings are unsafe.
• In all, today’s IoT security is lightweight compared to enterprise
application security, and the IoT’s aggressive rollout despite this
has created a situation where IoT authentication must catch up.
IoT Authentication
• IoT authentication would benefit from a single
standard onto which all device makers and solution
providers deploy their technology.
• One solution is to settle on a single user interface (UI)
such as consumer mobile devices and to authenticate
based on FIDO Alliance open standards for True
Keyless Authentication. This would reduce the
fragmentation and an over-reliance on passwords,
whose use as an authentication mechanism hinders IoT
adoption by degrading usability.
• Whose security is not in step with the security demands
of workplaces, homes, cars, transportation hubs, and
critical infrastructure?
Example
• “IoT authentication is important since the security of
devices, autos, and workplaces is paramount.
• The risk of unauthorized management of these smart
things is too great to cede that security to passwords,
whose poor usability has not kept pace with the IoT just
as they haven’t kept pace with mobile.
IoT Authorization
• The Internet of Things (IoT) is not just a
single technology, but a connected
environment of various machines (“things”)
that work together independently – without
human interaction.
• The authorization process is the tool used to
validate the identity of each endpoint in the
IoT system.
• The certification process is
configured upon enrollment entry and informs
the service provider of the method to be used
when checking the system’s identity during
registration.

You might also like