Professional Documents
Culture Documents
MODULE - V Cloud For IoT, CASE STUDIES-1
MODULE - V Cloud For IoT, CASE STUDIES-1
MODULE - V Cloud For IoT, CASE STUDIES-1
• Case Studies:
• Smart Cities and Smart Homes
INTRODUCTION
• Professor Ramnath Chellappa from Emory University defines cloud computing as,
• “A Computing paradigm where the boundaries of computing will be determined by
economic rationale rather than technical limits”.
• Cloud computing does not only give Technical strength to the application,but also
adds to economic viability.Storage,analytics,platform,etc.,are accomplished at the
cloud.
• It is important to learn about cloud computing storage for most IoT Applications
takes place at the cloud. The most significant reason to opt for cloud is that it is more
economical when used for storage.
• Cloud is preferred more than expected as it is affordable,effective and efficient for
data storage.
• Cloud services could be any of the following:
• Software-as-a-Service (SaaS): Complete software application as a service is provided
to the user. (( It can also be called application as a service as a pay monthly, yearly
etc.,subscription)
• Platform-as-a-Service (PaaS): Development tools, APIs,libraries etc. will be provided
by the cloud service provider. Users have to build, manage and maintain the
applications (provides platform to develop)
• Infrastructure-as-a-Service (laaS): Virtual Machines kind of support. Users shall
manage the machines. Users shall select the OS and underlying applications. PAY as
YOU use! (with laas approach, you can choose virtual machines over physical
machines)
• Some well-known service providers in the market include the following:
• Amazon web service
• Azureo
• Adafruit
• Private and
• Hybrid.
• Private Cloud Deployment: This is one of the best models,where the data generated is
safeguarded without any flaw. This particular deployment model can be opted
whenever confidentiality matters the most.This model can be chosen whenever the
Intellectual Property (IP) needs to be protected. When this model is chosen,the
complete control of everything is well within the organization for which the
deployment is carried out.
• The Cloud servers are typically in the datacentres inside the organization.Everything
has to be taken care of by the organization that owns this deployment.This model
demands that the hardware,software,datacentre,personnel,infrastructure,etc.,be
maintained,monitored,and installed by the organization,which makes this model
expensive.
• This model offers the organization complete flexibility in terms of deciding and
managing the resources.Data security can be ensured in the best possible way through
this model as per the organization’s datasecurity guidelines.
• The main Advantages of private cloud deployment include the following:
• Data security is paramount in this model and is ensured.
• This model is seen as a flexible model compared to others.
• The main disadvantages of private cloud deployment include the following:
• Expensive
• Maintenance,periodic upgradation,etc.,could be difficult
• Policies and other related things are to be framed carefully to make sure that the data
is safe.
• 2. Public Cloud Deployment:This deployment is for general public or a large group.The
cloud service provider owns all the resources,which include
hardware/infrastructureand software.
• Cloud service provider (e.g.,Amazon,Microsoft)will take care of all the resource
management.Installation,maintenance,upgradation,and monitoring everything
comes under the pursuit of the service provider.
• Access to this cloud service happens via the internet.The biggest advantage of this
approach is the ease of usage and it being inexpensive compared to private cloud
deployment.The Pay and use approach makes it easier for the cloud service
consumer.you will get 24*7 customer support for technical support for technical and
other related clarifications when you opt for this deployment model.Security and
Privacy issues are the Major Challenges.
• The main advantages of public cloud deployment include the following:
• It is a simple approach where the user needs to pay for what he has used.It is also
termed as pay and use system.
• You do not need to invest in setting up the hardware or infrastructure when it comes
to this approach.
• Customer support team can be reached on demand and the team should try to resolve
the challenges.
• It can be easily scaled up or scaled down based on requirements.
• The main disadvantages of public cloud deployment include the following:
• Data is not within the walls of the organization or user.
• Securing the data while ensuring privacy.
• 3.Hybrid Cloud Deployment: As the name suggests, this deployment is a mix of both
private and public cloud deployment.In this approach,the resources offered and
managed are both in-house and third party based.
• Organization and service providers both have the control and stake.This approach
offers flexibility to decide what is to be owned by the organization and what can be
leased to a third party.
• This would help in access control and also data can be secured to a great extent.But
even then,the data is not 100% safe.
• The main advantages of Hybrid cloud deployment include the following:
• i)Both Organization and third party come together.
• ii)Not as expensive as private cloud deployment
• iii)Flexible and controlled access can be enabled.
• The main disadvantages of Hybrid cloud deployment include the following:
• It is public cloud,which means the service being opted for is shared with other
users.Hence,there is higher chance that the data may be unsafe.The data could be
vulnerable to attacks as well.
• Private cloud have Advantages security and Privacy
•
• IOT WITH CLOUD-CHALLENGES
• There are many challenges one could list.
• Here, we shall see 7 such challenges, with some relevant example for each.
• Privacy and Security.
• Bandwidth Cost.
• Migration and Portability.
• Reliability and Availability.
• Costing.
• Data Ownership.
• Expertise.
Challenge 1 - Privacy and Security
• Security is a major concern in the field of IoT
• Valuable and confidential data goes into the cloud, outside the firewall.The moment
the firewall is crosses,this data becomes hackable.There is a possibility that this data
could be monitored without informing the user.
• The following are solutions to this privacy and security challenge.
• Periodic monitoring of the network activities,tracking unusual events in the
network,opting for private cloud if the data is confidential, and using recognized anti-
virus solutions could certainly reduce the risk of being exposed.
• Before signing the contract with a cloud service provider,it is necessary to read and
understand the regulations involved in the service being provided.
• The data received is from multiple sensor nodes.It is important to interpret this data
in the correct sequence.This will safeguard the data and ensure that it is not stolen.
• Challenge - 2 - Bandwidth Cost:
Cloud computing is favoured for storage/processing because of the following reasons:
There is no need to invest on hardware and to maintain it.
Hardware/software upgrade is not the responsibility of the end user but that of the
service provider.
Customer service and technical support is provided 24*7
There are some challenges with cloud computing.Bandwidth is one such concern.If the
IoT application is on a small-scale demanding lesser resources,then requirement for
investment in bandwidth would not be too much.In case the application is data-
intensive,then the investment would be huge.IoT is all about data,and in most
cases,this would be big data.There is always the necessity for huge investment.
3. Migration and Portability: When data is moved to the cloud.
How safe is it to move the data?
How much downtime would this process require?
How easy is it to move the data?
What is the strategy to migrate data to the cloud?
When data is to be migrated from the cloud.Will it be easy to opt out of the cloud and
take data out safely back to the infrastructure?
How much would it cost?
Would the move of data affect current workflow?
What would be the downtime?
Would there be support offered to migrate smoothly to another cloud service
provider?
All these challenges are doubled with IoT as the data comes from the sensory nodes
at a very high speed.
4.Availabilty,Reliability and Robustness:
In IoT,there is a continuous monitoring and reading of the data.Data generation and storage
have to be spontaneous.This forces the need to have continuous cloud service
availability(24*7 availability).If there is a downtime,it would/could miss critical
data.Hence,reliability of the process has to be monitored,which decides the effectiveness of
the service.
The process should be robust towards handling data at different rates.IoT could flood data at
any particular time,while it could be slow some other times.Both these situations should be
handled effortlessly.
5.Costing:One of the main advantages of cloud is that it can scale up with rising demand.While
it is scalable and flexible,an organization should plan its budget carefully.If someone opts for
subscription without having clear vision and planning,it may lead to unnecessary cost.
6.Data Ownership:The data stored by the user on the cloud is owned by the user.This means
that the data is under the ownership of the person who generates it.However,when opting for
cloud storage(i.e.,public/hybrid deployment model),the data is under the custody of the cloud
service provider.Then, it appears that the service provider owns the data.There are still
challenges surrounding this debate of data ownership.When it comes to IoT,the data is
generated at multiple points and ownership could lie with multiple participating parties.Hence
in IoT the ownership-related challenges are multiplied.
7.Expertise: To use the cloud with IoT requires a specific skill set.The cloud platform gets
updated every time and then experts have to constantly upgrade themselves.When it comes
to IoT,the challenge lies with understanding the sensors and at the same time,getting updated
on cloud development.
Selection of Cloud Service Provider - An Overview
There are many parameters and considerations to select the cloud service provider.
•
• Working of Fog Computing
• As shown in Fig 5.4 Sensors/devices generate data and transmit to the middle layer,which
is veryclose the data source.These nodes in the middle layer are capable of handling the
data.This requires minimum power and lesser resources.
• The idea is that all data need not go to the cloud at the instant it is generated.also,sensitive
data gets processed very fast,which results in an instant response.Fog is not meant for
hefty storage.It is still the cloud that does the task of storing big data.Fog is just an
intermediary layer that enables faster data processing,thereby facilitating faster response
time.
• The following points summarize the concept of fog nodes:
• It receives the data feed from the sensors,in real time.
• Response time for this is very minimal - Ideally in milliseconds.
• Fog computing is transit,where data is stored for a limited time only.
• Data is then sent to cloud as a summary. It is important to note that not all data goes to
the cloud.
• The following points summarize the concept of cloud computing platform:
• It receives the data summary from the fog.
• Data prediction,data analytics,data storage,etc.takesplace here.
• The benefits of using fog computing model are as follows:
• 1.Minimal amount of data sent to the cloud.
• 2.Reduced bandwidth consumption
• 3.Reduced data latency
• 4.Improved data security.When limited data goes to cloud,it is easier to protect it.
• 5.Immediate processing of data in real time(this is very much needed in industrial
applications)
• Difference Between Edge and Fog Computing
• Both fog and edge are concerned with the computing capabilities to be executed
locally,before passing it to the cloud.Both aim at reducing complete dependency on the
cloud to perform computation.Analysing data and processing it at the cloud is to be avoided
and both edge and fog computing helps in accomplishing this aspect.
• Both these approaches essentially reduce the time delay due to decision-making before
the data is passed on to the cloud.Data-driven decisions would be much faster,which is
crucial for real-time applications.
• The main difference between edge and fog computing is where data processing takes
place.Edge computing is the computing carried out at the device itself,where all the sensors
are connected.That is,the computing devices would be physically much closer to the data
generation point(i.e.,sensors). In fog computing,data processing is moved to the processors
that are connected to the local area network(LAN),making it a little farther from the
sensors and actuators.The main difference between edge and fog computing is the
distance.
• Cloud Computing :Security Aspects
• The security of any computing platform includingCloud computing depends on software
security , infrastructure security , storage security and network security . If any of these is
compromised,it would result in security violation and could cause damages. Let us discuss
these security aspects briefly:
• 1.Software Security: Software is the core component and plays a vital role in presenting
and ensuring a secure environment . If there are defects created/generated during the
development phase ,it is a software security threat . Defects such as simple software
implementation defects,memory allocation,design issues, and exception handling all
contribute to security issues. Care should be taken to write software for IoT without
errors/defects. This can be ensured by complete and comprehensive testing carried out at
all stages.
• 2.Infrastructure Security:The infrastructure provided by the CSP is safe is a must.The entire
data is stored and is dependent on this infrastructure.Since a thirdparty could also
contribute to the infrastructure,it is extremely important to check the security
vulnerabilities with the infrastructure.All infrastructure related guidelines should be
mentioned clearly in the agreements and should be made transparent to the customer.If
data is damaged,everything is damaged and lost.Hence care should be taken to protect the
infrastructure.
• 3.Storage Security:It is important to be informed of who owns the data and the location
where it is stored.
• Data leak,snooping,malware attacks,etc.are all threats to the stored data and can be listed
under storage security.Appropriate antivirus software and periodic monitoring,should help
protect the data.
• 4.Network Security:Data is stored in the cloud via the internet,and hence all network
threats become a possibility.
• Case Study: How to use Adafruit Cloud?
• Adafruit is one of the simplest platforms and provides multiple features and easy
access.Also,there are many data representation options in Adafruit.
• Insights into Adafruit Cloud
• Step1:Creation of Account:
• The very first step to access the cloud service is to create an account.To do this,visit
https://io.adafruit.com/,which is the homepage of Adafruit.On the home page,at the top
right corner,you will find the button”Get started for Free”
• Click on it to go to the page where you will need to fill in all your personal details.
• Fig(a) Adafruit web page for creation of account
•
• Fig(b) Sign up screen
• Step2:Generation of AIO Key: For every account ,there will be a unique asynchronous input-
output (AIO)key that is used by the program to identify the account without any error.The
AIO key is a prerequisite for every code and leaving this field empty may lead to
misidentification of the account.The processes to get the AIO key are shown in Figs© and
(d).
•
Fig(d)Image revealing the AIO key of the respective account
The AIO key must be copied and preserved for future use.However,it can be regenerated if
needed.
• Step3:Creation of Feeds
• In Adafruit cloud, feeds play a major role because all the data sent into the cloud will be
stored in these feeds.These serve as variables that can hold different types of data.We can
send values such as analog values,digital values,timestamp,latitudes,and longitudes of a
location.The feeds can hold any type of data passed in the form of a string.Let us see how
to create our own feed.Let us consider that we need to monitor the brightness of a room
for the duration of one hour.To upload the data we need to create a feed inside our
respective account for collection and representation of the sensor data.Figures(e) and (f)
illustrate the procedure for creation of feeds along with the description.
•
• Figure(e) Creation of a new feed
• By clicking on the “Create a New feed”tab you can create a new feed.In this case,the feed’s
name is given as “LDR data”as we intend to measure the brightness of the room.In order
to achieve this,we use a light-dependent resistor(LDR)sensor mounted inside the
room.Fig(f) shows the fields to be entered for the creation of feeds.The description field is
optional.
• Fig(f)Fields to be filled while creating a new feed
•
Step4:Methods of Uploading data
We have seen how to deal with Adafruit cloud from the web interface only.We will now look
at how to deal with existing methods of uploading data into the feeds that are created.This can
be done via MQTT client and Python client.
Method1:MQTT Client
MQTT is a publish-subscribe message protocol.In order to upload the data into feeds,we use
an embedded device called NodeMCU,which is a microcontroller withgeneral purpose input-
output(GPIO)pins.These pins help in hooking up sensors to the boardand making data
transmission possible.this module is used especially for data upload because it contains the
ESP8266 Wi-Fi module that can connect Wi-Fi to a home with ease.The connection time is
minimal and the transmission speed is almost 7Mbps,which is an optimal speed for
transmission.Figure(g0 shows a NodeMCU module mounted with ESPWi-Fi module.
Line13:All the required parameters that are specified by the userare passed into the function
Adafruit_MQTT_Client.
Line 15:It specifies the web page so as to tell theprogram where to publish the data from the
sensor.Figure(j) shows the feed link containing the URL.
After completing this step,click on “Next step”tab for creating the dashboard icon.You can see
your live data being uploaded to the cloud and represented in the dashboard.
In this way,you utilize the cloud services and can integrate them in daily projects for yielding
better results with accuracy at high speeds.this is one of the best and easiest ways to access
cloud services.
• Case Studies:
• Smart Cities and Smart Homes
• SMART CITIES:
• INTRODUCTION: A smart city may be defined as a developed urban area that contains
economic development and high quality of life by excelling in multiple areas like
infrastructure, living, environment, its people etc. A smart city is a city that is well planned,
and it provides the cost efficient services for the welfare of the citizens. Smart solutions can
be helpful in controlling the ever increasing population in the cities.
• A smart city has no particular definition and its components may vary easily in different
parts of the world according to the need of that area and its people A smart city is
sometimes also referred to as a digital city, intelligent city, knowledge city, sustainable city,
etc.
• OBJECTIVE:The objective of the mission is to promote cities that cater core infrastructure
and provide its citizens a decent quality of life, a clean and sustainable environment and
application of “smart solutions” Such Smart Solutions include interventions for e-
governance, online government services, and for improving the efficiency of core services
at a relatively lower cost Annual revenue generation for state and central government.
• The Smart Cities Mission (SCM) of the Government of India, promotes cities that provide
core infrastructure and give a decent quality of life to its citizens, a clean and sustainable
environment and application of ‘Smart Solutions'.
•
• HISTORY The earliest smart grid project in Teleogestore,Italy in 2005 which offered a
saving of 500 million Euros per year. IBM and CISCO had visions to use information
technology to make cities smarter Various smart cities were being developed in the last
20 years like Los Angeles, Vienna, Rome etc. "100 Smart Cities Mission" was launched
by Prime Minister Narendra Modi in June 25, 2015. A total of 98,000 crore has been
approved for development of 100 smart cities.
• Smart cities are being developed to improve the quality of life of all people
•
•
SMART SOLUTIONS AND ROLE OF A CIVIL ENGINEER E-Governance and Citizen Services like
public information, Grievance redressal, citizen engagement, video crime monitoring. Civil Engineer can
provide the required infrastructure for these services Waste management like waste to fuel and energy,
waste to compost, treating waste water, recycling. The structures required to complete this work are
designed by a civil engineer to provide maximum workspace and efficiency.
Water management like smart meters and management, leakage identification and prevention,
water quality management Energy management by smart meters and management and renewable
sources of energy. Efficient structures are made by civil engineers to produce energy harmlessly
Urban mobility like public parks, smart parking and intelligent traffic management. The facilities
required are to be made by a civil engineer
Smart Building - The most important concentration of any construction is building. Improvement is
being done as per the necessities over the time. The features like lightning, ventilation, heating, air
conditioning, and security can be selected separately. The vision is successfully implemented only
when the energy is minimized, boot support to electrical grid and accessing the impacts in the
environment. The serviceability of the building is considered on the basis of good sanitation,
thermal comfortableness, good quality of air, security system etc. with minimum possible
expenditures.
Smart Infrastructure - Infrastructure is the term used for facilities that support city systems and
keep a city functioning It includes roads, buildings, electricity grids and communication networks
City infrastructures will need to withstand pressures such as extra stress on the electricity grid
resulting from more homes. Smarter infrastructure will lead to less environmental impact
Smart Transportation - It advocates more efficient transportation systems and promotes new social
attitudes towards vehicle usage, ensuring that citizens have access to local and public
transportation
CONCLUSION A considerable amount of time, money and effort will be required to make cities
smart The planning, designing and development for any smart city should be such that it is
sustainable and also ensure successful returns The technologies like ICT which uses various tools
like GIS, GPS have to be used as smart solution for the infrastructure strategies like pan city
development and redevelopment.
SMART HOMES:
Introduction:
--It is one of the applications of smart technologies within our home,in creating a comfortable
home,an effective lifestyle.
Smart Home is applicable in various aspect of our home and environment to suite our
different preferences.
Entertainment
Smart Homes offers ease of controlling devices around the home.This is one of its
outstanding feature.
These features offers automation remote control of devices around the home from any
location within such as:
.Automatic shut down of appliance when not in use;.Automatic setting and maintenance of
right temperature for each room;Automatic adjust/regulate light intensity based on room
luminosity.
Smart Home offers multi room entertainment network which enables listening of
audio music and watching of movies from any part in the house.
Easy control:Parental control feature on television channels for children to watch only
certain programmes.
Digital Access:Access favourite CD’s,DVD’s from any music system and television
around the home;
Digital Storage:
System automatically stores most played music based on number of play.
Controlled Access: Granting access using finger print,eye or face recognition. The system
informs the user if a visitor is at the door;the owner can then grant or deny access.
SMART homes offers benefits for the disabled and elderly persons in the various ways:
Monitory systems.
Automated alarm systems directly connected to hospitals in case of incidents like a fall or
collapse.