Professional Documents
Culture Documents
net/publication/313879843
CITATION READS
1 423
10 authors, including:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Shrivatsa d Perur on 22 February 2017.
Abstract:
I
nternet of things (IoT) plays crucial role in the today’s world. The day by day needs of human being are
increasing and as a result there is need for latest technology. IoT need other technologies like big data storage
and therefore one more entity Cloud computing. Through the cloud the sharing of data take place very
conveniently. IoT will encourage the development of new applications such as smart cities, grids, and transportation
systems respectively and considers many parameters to provide services in appropriate way.
Keywords: IoT, RFID, CoT: Integration of Cloud Computing and Internet of things.
I. INTRODUCTION
In the Internet of things (IoT) paradigm, many of the objects that surround us are on network in one form or
another. Radio Frequency Identification (RFID) and sensor network technologies will gain importance to meet this new
challenge, in which information and communication systems are invisibly embedded in the environment around us. This
result in the generation of enormous amounts of data which have to be stored, processed and presented in a seamless,
efficient, and easily interpretable form[1]. This model will consist of services that are commodities and delivered in a
manner similar to traditional commodities. Cloud computing can provide the virtual infrastructure for such utility
computing which integrates monitoring or storage devices, analytics tools, visualization platforms and client delivery.
The cost based model that Cloud computing offers will enable end-to-end service provisioning for businesses and users
to access applications on demand from anywhere[3]. ―Any time , Anywhere‖ [9] With the growing presence of WiFi and
Fourth Generation - Long Term Evolution (4G-LTE) wireless Internet access, the evolution towards ubiquitous
information and communication networks is already evident. However, for the IoT vision to successfully emerge, the
computing paradigm will need to go beyond traditional mobile computing scenarios that use smart phones and portables,
and evolve into connecting everyday existing objects and embedding intelligence into our environment. For usability the
IoT demands:
1. A shared understanding of the situation of its users and their appliances,
2. Software architectures and pervasive communication networks to process and convey the contextual information
to where it is relevant, and
3. The analytics tools in the IoT that aim for autonomous and smart behavior.
Figure 1. Internet of things schematic showing the end users and application areas based on data. [2]
IoT was first coined by Kevin Ashton [1] in 1999 in the context of supply chain management. However, in the
past decade, the definition has been more inclusive covering wide range of applications like health care, utilities and
transport. Although the definition of ‗Things‘ has changed as technology evolved, the main goal of making a computer
As depicted in Figure 2[3], there are five layers in IoT, which are:
A. Business layer: Business layer is processing the data or services received from application layer. For
management of IoT system including the applications and services are responsible of the business layer. The
success of IoT technology depends on good business models.
B. Application layer: Application layer couples business services and provides services to the end user (Web
Service, User Interface (UI)). The application layer bridges the gap between the business layer and the boundary
technology.
C. Perception layer: The perception layer can be abstracted as sensing components/nodes, actuator
components/nodes. Sensing components include sensors, RFID, barcode label, Quick Response Code (QR)
codes, intelligent detection instruments and meters. Actuator Components include valve, switch, relay. Sensing
components and actuator components realize signal acquisition and control functions. The collected information
is forwarded to the Network layer for secure transmission.
The adoption of the CoT concept enables new scenarios for smart services and applications based on the
extension of Cloud through the ―things‖:
1. SaaS (Sensing as a Service), providing ubiquitous access to sensor data.
2. SAaaS (Sensing and Actuation as a Service), enabling automatic control logics implemented in the Cloud.
3. SEaaS (Sensor Event as a Service), dispatching messaging services triggered by sensor __events.
4. SenaaS (Sensor as a Service), enabling ubiquitous management of remote sensors.
5. DBaaS (DataBase as a Service), enabling ubiquitous database management.
6. DaaS (Data as a Service), providing ubiquitous access to any data.
7. EaaS (Ethernet as a Service), providing ubiquitous connectivity to remote devices.
8. IPMaaS (Identity and Policy Management as a Service), enabling ubiquitous access to __policy and identity
management functionalities.
9. VSaaS (Video Surveillance as a Service), providing ubiquitous access to recorded video and implementing
complex analyzes in the Cloud.
V. CONCLUSION
Internet of things to successfully emerge as the computing paradigm, it will need to go beyond traditional
mobile computing scenarios that use only smart phones and portables, and evolve into connecting everyday existing
objects and embedding intelligence into our environment.
The adoption of the CoT concept enables new scenarios for smart services and applications based on the
extension of Cloud through the ―things‖.
REFERENCES
[1] K. Ashton, That ‗‗Internet of Things‘‘ thing, RFiD Journal (2009)
[2] J. Gubbi, R. Buyya, S. Marusic, M. Palaniswami, "Internet of things (IoT): A vision architectural elements and
future directions", Future Gen. Comput. Syst., vol. 29, no. 7, pp. 1645-1660, 2013.
[3] R. Khan, S. U. Khan, R. Zaheer, and S. Khan, ―Future Internet: The Internet of Things Architecture, Possible
Applications and Key Challenges,‖ 2012 10th International Conference on Frontiers of Information Technology,
pp. 257–260, 2012.
[4] M. J. Booysen, S. Gilmore, S. Zeadally, G. J. van Rooyen,‖Machine-to-Machine (M2M) Communications in
Vehicular MIH Media Lab”, KSSI transactions on internet and information systems Vol. 6, no. 2, February -
2012.