Iot With CC
Iot With CC
How it Works:
● You rent computing resources from a cloud provider like AWS, Microsoft Azure, or
Google Cloud.
● You can scale up/down based on your needs without physical infrastructure.
Real-Life Example:
Using Google Drive to store your documents or watching movies on Netflix — you’re
consuming a cloud service. You don't know or care where the servers are — it "just works."
1. On-Demand Self-Service
● Like booking a movie ticket online — you don’t need to call the theatre.
2. Broad Network Access
● Services are available over the network (usually the Internet) and can be accessed
via standard platforms (e.g., laptops, phones, tablets).
3. Resource Pooling
● Cloud providers use multi-tenant models — multiple users share the same physical
resources.
● You don’t know the exact physical location, but you can often specify a geographic
region (e.g., "US-West").
4. Rapid Elasticity
5. Measured Service
● Usage is metered (like electricity) — you pay only for what you use.
🔹 A. Public Cloud
● Owned and managed by third-party cloud service providers.
● Example Providers: Amazon Web Services (AWS), Microsoft Azure, Google Cloud.
Advantages:
● Easy to start
Disadvantages:
● Limited customization
🔹 B. Private Cloud
● Used exclusively by a single organization.
Advantages:
Disadvantages:
🔹 C. Hybrid Cloud
● Combination of public and private clouds, allowing data and applications to be
shared between them.
● Example: Sensitive data in private cloud, but less sensitive operations in public cloud.
Advantages:
Disadvantages:
🔹 D. Community Cloud
● Shared by several organizations with common goals or compliance requirements
(e.g., banks, healthcare providers).
Advantages:
Disadvantages:
● Limited scalability
Example Providers:
● Amazon EC2
Use Case:
● Hosting websites
Example Providers:
● Heroku
Use Case:
Example Providers:
● Gmail
● Salesforce
● Dropbox
Use Case:
● Email services
● Document collaboration
You Manage Apps, OS, data Apps, data Just use the app
✅ Summary Points
● Cloud computing delivers scalable, flexible, on-demand IT services.
🔹 a. Sensors
● Measure physical conditions: temperature, humidity, light, pressure, gas, etc.
🔹 c. Wearables
● Smartwatches, fitness trackers.
🔹 f. Industrial Equipment
● Machines with embedded sensors in factories.
Semi‑structure Data with tags or markers but no fixed JSON payloads from smart
d schema devices
2. Velocity
○ Data streams in real‑time—sometimes at millisecond frequencies.
3. Variety
4. Veracity
5. Value
7. Scalability
● Protocols:
● Platforms/Services:
○ Apache Kafka & Kinesis: High‑throughput streaming for batch and real‑time.
📌 2.2 Storage
Choosing the right storage tier is vital for cost, performance, and query patterns:
📌 3.2 Solutions
● Adopt Standards: MQTT, OPC UA, LwM2M for constrained devices.
● API‑First Design: Expose all device interactions via REST or gRPC for consistency.
ML Lifecycle in IoT:
2. Feature Engineering: Extract trends, rolling averages, time‑domain features (e.g.,
FFT for vibration).
3. Model Training: Use historical labeled data (failure logs) to train models.
4. Deployment: Deploy models at edge (for low latency) or in cloud (for heavy
compute).
5. Monitoring & Retraining: Continuously evaluate model performance and retrain on
fresh data.
● Statistical Methods:
✅ Key Takeaways
● IoT data is vast, varied, and often real‑time—requiring scalable ingestion, flexible
storage, and fast processing.
● Cloud analytics leverages both traditional BI and advanced ML to move from “what
happened” to “what should happen.”
● Predictive analytics and anomaly detection are at the heart of intelligent, proactive
IoT systems.
Unit 3
1. Overview of IoT Platforms
An IoT platform is the middleware that connects devices, ingests and processes their data,
and enables you to build applications on top. Think of it as the “operating system” for your
IoT solution.
○ APIs & SDKs: For building custom dashboards, mobile apps, integrations.
○ Rule Engines & Workflows: Trigger actions (e.g., SMS alerts) when
conditions are met.
css
CopyEdit
[Devices & Edge] → [Edge Gateway] → [Cloud Ingestion Layer] → [Data
Platform] → [Analytics & Apps]
● Edge Gateways: Local compute units (e.g., Raspberry Pi, Jetson Nano) that
aggregate, preprocess, and secure device data.
● Protocols:
○ AWS IoT Core, Azure IoT Hub, Google Cloud IoT Core—manage device
connections, authentication, and high‑throughput messaging.
● Stream Processing: AWS Kinesis Analytics, Azure Stream Analytics, Apache Flink.
● Storage Services:
● Integration: ETL services (AWS Glue, Azure Data Factory) to feed data lakes or
data warehouses.
● Machine Learning / AI: SageMaker, Azure ML, Google Vertex AI for training and
deploying predictive models.
Device AWS IoT Core & Azure IoT Hub & Cloud IoT Core & IoT
Management Device Defender IoT Central Device Management
Edge Computing AWS IoT Azure IoT Edge Edge TPU & Cloud IoT
Greengrass Edge
Security & IAM IAM, KMS, Azure AD, Key Cloud IAM, KMS,
Security Hub Vault, Security Security Command
Center Center
● AWS IoT Greengrass vs. Azure IoT Edge vs. Google Edge TPU:
✅ Summary of Unit 3
● IoT Platforms accelerate development by handling device management, data
plumbing, and security.
● Cloud‑Native IoT Services from AWS, Azure, and Google cover every
layer—choose based on your project’s scale, expertise, and ecosystem preferences.
🔐 1. IoT Security Challenges
IoT devices are highly vulnerable because they:
Major Challenges:
Challenge Description
Device Ensuring only trusted devices join the network. Many IoT devices
Authentication skip proper authentication.
Physical Attacks Devices can be tampered with physically (e.g., plugging into a
USB port).
Key Protocols:
Protocol Use Case Descriptio
n
👉 Protocols like MQTT with TLS, or CoAP with DTLS are most common in IoT platforms.
● Location tracking
● Identity theft
● Unauthorized profiling
Data Ownership Who owns data collected by smart meters or health wearables?
User or company?
Consent and Users often don’t know what data is collected and why.
Transparency
Data Minimization Only necessary data should be collected – often violated in IoT.
Data Retention How long is data stored? Who has access to it?
Policies
Solutions:
● Use privacy-by-design principles.
Issue Description
Data Breaches Misconfigured S3 buckets or poor access controls can leak personal
data.
Insider Threats Employees or contractors with access might misuse sensitive data.
Shared Multi-tenancy means many clients share the same infrastructure. One
Resources attack can affect many.
Cloud-specific Threats:
● Account hijacking
● Man-in-the-Cloud attacks
Best Practices:
● Always use end-to-end encryption.
IoT Security IoT devices are vulnerable due to limited resources and poor
Challenges management.
Security Protocols TLS/DTLS, OAuth, and lightweight encryption are key to securing
communication.
Cloud Security Multi-tenancy, insecure APIs, and insider threats are major risks.
Cost and Pricing Pay-as-you-go vs. subscription, data usage limits, device count,
Model analytics costs.
Vendor Lock-in Risk of getting tied to one cloud vendor. Businesses prefer
portability and open standards.
Compliance & Does the platform comply with data privacy laws like GDPR,
Regulations HIPAA, etc.?
Support and SLA Is 24/7 support available? What is the uptime guarantee?
Ecosystem and Compatibility with existing systems (ERP, CRM, SAP), and
Integrations third-party services.
Deployment Region Is the cloud platform available in your region? This affects
latency and compliance.
Factor Description
Data Analytics & ML Built-in tools for analytics, predictive modeling, and ML
integration.
Edge Computing Support for edge computing where local processing is needed.
APIs and SDKs Developer support through REST APIs, SDKs in various
languages.
Visualization Tools Use graphs, maps, gauges, and charts to represent sensor
data.
Alerts and Notifications Trigger alerts when thresholds are crossed (e.g., high
temperature).
Web Portals
These are broader admin or user interfaces (beyond dashboards) that support:
● Device onboarding
Popular platforms like ThingsBoard, Node-RED, and built-in dashboards in AWS, Azure,
Google provide customizable web interfaces.
Feature AWS IoT Core Azure IoT Hub Google Cloud IoT
Core (retired in
2023)
Protocols MQTT, MQTT over MQTT, AMQP, HTTPS MQTT, HTTP (now
Supported WebSockets, HTTPS discontinued)
Device Fine-grained policies, Device twin, Used to support
Management registry, shadow auto-scaling, module device registry
(digital twin) identities
Security X.509 certificates, IAM, Role-based access, IoT IAM roles, JWT auth
encryption at identity registry (when active)
rest/in-transit
Verdict:
● AWS IoT Core: Best for flexibility, largest ecosystem, good for enterprise-grade IoT.
● Azure IoT Hub: Strong integration with Microsoft tools, good for digital twins and
industrial IoT.
● Google IoT Core: Was simpler, but now discontinued—users are advised to migrate
to partners like Litmus or ClearBlade.
Platform AWS and Azure dominate; Google IoT Core is retired; choose
Comparison based on project size, tech stack, and vendor alignment.