You are on page 1of 4

Cloud Computing 

is defined as storing and accessing of data and computing services over the internet. It
doesn’t store any data on your personal computer. It is the on-demand availability of computer services like
servers, data storage, networking, databases. The main purpose of cloud computing is to give access to data
centers to many users. Users can also access data from a remote server.Examples: AWS, Azure, Google Cloud
Characteristics:
1. On-demand self-services:The Cloud computing services does not require any human administrators,
user themselves are able to provision, monitor and manage computing resources as needed.
2. Broad network access:The Computing services are generally provided over standard networks and
heterogeneous devices.
3. Rapid elasticity:The Computing services should have IT resources that are able to scale out and in
quickly and on as needed basis. Whenever the user require services it is provided to him and it is scale
out as soon as its requirement gets over.
4. Resource pooling:The IT resource (e.g., networks, servers, storage, applications, and services) present
are shared across multiple applications and occupant in an uncommitted manner. Multiple clients are
provided service from a same physical resource.
5. Measured service:The resource utilization is tracked for each application and occupant, it will provide
both the user and the resource provider with an account of what has been used.
Service models: Software as a service (SaaS): provides applications to the clouds end user that are mainly
accessed via a web portal or service-oriented architecture-based web service technology. These services can
be seen as ASP (application service provider) on the application layer. Usually, a specific company that uses
the service would run, maintain and give support so that it can be reliably used over a long period of time.
Platform as a service (PaaS): consists of the actual environment for developing and provisioning cloud.
applications. The main users of this layer are developers that want to develop and run a cloud application for a
particular purpose. A proprietary language was supported and provided by the platform (a set of important
basic services) to ease communication, monitoring, billing and other aspects such as startup as well as to
ensure an application’s scalability and flexibility. Limitations regarding the programming languages supported,
the programming model, the ability to access resources, and the long-term persistence are disadvantages.
Infrastructure as a service (IaaS): provides the necessary hardware and software upon which a customer can
build a customized computing environment. Computing resources, data storage resources and the
communications channel are linked together with these essential IT resources to ensure the stability of
applications being used on the cloud. Those stack models can be referred to as the medium for IoT, being used
and conveyed by the users in different methods for the greatest chance of interoperability. This includes
connecting cars, wearables, TVs, smartphones, fitness equipment, robots, ATMs, and vending machines as
well as the vertical applications, security and professional services, and analytics platforms that come with
them.
Cloud Storage: Cloud storage is basically an online storage of data. Data that is stored can be accessed from
multiple connected devices, which constitute a cloud. Cloud storage can provide various benefits like greater
accessibility and reliability, strong protection of data backup, rapid deployment, and disaster recovery
purposes. Moving to the cloud also decreases overall storage costs due to cutting costs incurred on the
purchase of storage devices and their maintenance.
WAMP: Web Application Messaging Protocol (WAMP) was developed as a solution to the problem of
integrating PubSub and RPC. The design objectives of WAMP were to provide high performance, safety, and
easy implementation. WAMP solves the integration problem by separating communication components. The
separation happens through routing messages thereby eliminating the need for components to identify other
components. it supports separation of components that need to communicate. Direct communication is not
required instead a router handles message distribution. Another advantage of WAMP is it is language agnostic
therefore it does not limit you to a specific programming language. 
Instance storage: Virtual disks in the cloud: In a traditional virtualized environment, the virtual disk storage
model is the eminent one. The nomenclature of this model is based upon this very reason, instance storage,
meaning storage that is used like conventional virtual disks. It is crucial to note that instance storage is a
storage model, not a storage protocol. This storage can be implemented in numerous ways. For example, DAS
(Direct attached storage) is generally used to implement instance storage. It is often stated as ephemeral
storage as the storage isn’t highly reliable.
Advantages & Disadvantages: Hard drives that instance storages run on are physically attached to the EC2
hosts which are running the store. Their endurance depends upon the lifetime of thebinstances attached to
them.2)Due to the paucity of speed and persistence in instance storage, it’s usually used on data that requires
quick but temporary assessment, like swap or paging files. However, it is also used to store data that requires
regular replication to multiple locations.
Volume storage: SAN(storage area network) sans the physical: Volume storage is also known as block storage.
It supports operations like read/write and keeping the system files of running virtual machines. As suggested
by its name, data is stored in structured blocks and volumes where files are split into equal-sized blocks. Each
block has its own address. However, unlike objects, they don’t possess any metadata. Files are bifurcated into
simpler blocks of fixed size, storing large amounts of data, which are dispensed amongst the storage nodes.
Advantages & Disadvantages: Public cloud providers allow the creation of various file systems on their block
storage systems, thus enabling users to store incessant data like a database. Exp Amazon. Another advantage
of using volume/block storage is its backup mechanism. For example, AWS EBS extends a snapshot feature
that is necessarily an incremental point in a timely backup of your volume.
Object storage: Web-scale NAS(network-attached storage): Cloud-native applications need space, for storing
data that is shared between different VMs. However, often there’s a need for spaces that can extend to
various data centers across multiple geographies which is catered by Object storage. For example, Amazon
Simple Storage Service (S3) caters to a single space across an entire region, probably, across the entire world.
Object storage stores data as objects, unlike others which go for a file hierarchy system. But it provides for
eventual consistency. Object storage also saves a substantial amount of unstructured data. This kind of
storage is used for storing songs on audio applications, photos on social media, or online services like Dropbox.
Advantages & Disadvantages: Storing virtually unlimited files is one of many advantages for installing object
storage. Having an HTTP(S) based interface, object storage also maintains file revisions.In this kind of storage,
files are distributed in different nodes which means that to modify a file you will need to upload a new revision
of the entire file which can significantly impact performance.
CLOUD STORAGE API:A cloud storage API is an application program interface that connects a locally-based
application to a cloud-based storage system, so that a user can send data to it and access and work with data
stored in it. To the application, the cloud storage system is just another target device, like tape or disk-based
storage. An application program interface (API) is code that allows two software programs to communicate
with each other. The API defines the correct way for a developer to write a program that requests services
from an operating system (OS) or other application.
Three basic types of APIs: 1. Local APIs are the original form, from which the name came. They offer OS
or middleware services to application programs. Microsoft's .NET APIs, the TAPI (Telephony API) for voice
applications, and database access APIs are examples of the local API form. 2. Web APIs are designed to
represent widely used resources like HTML pages and are accessed using a simple HTTP protocol. Any web URL
activates a web API. Web APIs are often called REST (representational state transfer) or RESTful because the
publisher of REST interfaces doesn't save any data internally between requests. 3. Program APIs are based on
remote procedure call (RPC) technology that makes a remote program component appear to be local to the
rest of the software. Service oriented architecture (SOA) APIs, such as Microsoft's WS-series of APIs, are
program APIs.Why APIs are important for business:The web, software designed exchange information via the
internet and cloud computing have all combined to increase the interest in APIs in general and services in
particular.
What Is IoT Cloud: An IoT cloud is a massive network that supports IoT devices and applications. This
includes the underlying infrastructure, servers and storage, needed for real-time operations and
processing. An IoT cloud also includes the services and standards necessary for connecting, managing,
and securing different IoT devices and applications.
benefits of IoT cloud: 1. Accessibility:This infrastructure allows for seamless mobility of data from multiple
devices into a single server, making for streamlined storage, analysis, and overview. The on-demand nature of
the cloud makes accessibility, at any given time and on any device, possible. 2. Scalability: As a business grows
in size, so do its IoT devices, and so does the need for increased investment for the additional networks and
data storage to house the new data. IoT cloud makes it feasible for a business to integrate additional devices
into an already-existing cloud with minimal costs and minimal need for increased IT infrastructures, such as
more servers or hard drives. With every device that’s added, its content will coherently be placed among the
rest up in the cloud. 3. Fewer cables, papers, and minerals: Cloud computing can reduce the consumption of
resources such as paper, electricity, metal and mined minerals found in steel servers and cables. Since the
generated data from all IoT devices is stored in the cloud, there is no longer a need for an on-premise physical
storage medium that needs wires and steels to function. 4. Collaboration: With data from IoT devices stored
in a cloud and accessible to the authorized employees from anywhere, the collaboration between different
departments in an organization will be seamless. This will increase team-work, engagement, efficiency,
productivity, and interest among the employees. 5. Disaster recovery: IT disasters happen, data can be
deleted, and its recovery is not always possible. IoT cloud platforms, or cloud computing services in general,
offer fast data recovery for all kinds of emergency situations, be it natural disasters, individual errors, or power
outages. Challenges of IoT cloud: 1. Data breaches and security: Security challenges and data breaches
are estimated to be the topmost concern with cloud computing. If there is a bug within the cloud computing
provider’s network, there is the possibility of hackers getting access not only to your data, but to all other
subscribers’ information. 2. Internet connectivity: You need internet connectivity to have access to the cloud.
If there is an internet outage, you will not be able to access your data.
3. Migration: Whether you are transitioning toward cloud computing, or you are migrating from one cloud
provider to another, transferring huge amount of data can be time-consuming, and prone to human error.
4. Costs: The initial cost of an IoT cloud storage base can be costly, especially if the company requires a private
domain. 5. Environmental concerns: Even though cloud computing can reduce carbon footprint, that does not
mean it’s a completely green platform.
IoT Data Analytics: Internet of Things (IoT) analytics enables organizations to leverage the massive amounts
of data generated by IoT devices. IoT analytics is often considered a subset of big data, involved with
combining heterogeneous streams and transforming them into consistent and accurate insights. Insights
generated by IoT streams can help organizations improve many aspects of their operations.
Challenges of DA: 1)Data Diversity: IoT data streams are multi-model and heterogeneous in nature. So, IoT
analytics applications expose variety and veracity. Bigdata solutions are meant to deal with this data diversity.
2)Data Quality:Most IoT streams are noisy and incomplete. This poses uncertainty to IoT analytics.
Probabilistic and statistical approaches must be employed to take the noisy nature of IoT into account.
3)Real-Time Data:IoT streams feature a high volume of data. The data of such volume from multiple
application should be processed in real-time. Hence, analytics can benefit from data streaming platforms
associated with the big data ecosystem. The high velocity of data can be in several cases controlled by
different data patterns and reports.
4)Cyber Security:The data from different IoT sensors are typically associated with cybersecurity requirements
and privacy sensitivities. 
Big data:Big data means a large set (petabytes or gigabytes) of structured, unstructured or semi-structured
data and analyzing those data to get the insights of the business trend.
Role of Big Data in IoT: When organizations are grabbing hold of the data for analysis purpose, IoT is acting as
a major source for that data, and this is the point where the role of big data in IoT comes into the picture. Big
data analytics is emerging as a key to analyzing IoT generated data from “connected devices” which helps to
take the initiative to improve decision making. The role of big data in IoT is to process a large amount of data
on a real-time basis and storing them using different storage technologies.
IoT security: IoT security refers to the methods of protection used to secure internet-connected or network
based devices. IoT security is the family of techniques, strategies and tools used to protect these devices from
becoming compromised. Because IoT is so broad, IoT security is even broader. This has resulted in a variety of
methodologies falling under the umbrella of IoT security. Application program interface (API) security, public
key infrastructure (PKI) authentication and network security are just a few of the methods IT leaders can use
to combat the growing threat of cybercrime and cyber terrorism rooted in vulnerable IoT devices.
IOT security challenges: 1. Software and firmware vulnerabilities: Ensuring the security of IoT systems is
tricky, mostly because a lot of smart devices are resource-constrained and have limited computing power.
Thus, they can’t run powerful, resource-hungry security functions and are likely to have more vulnerabilities
than non-IoT devices. Many IoT systems have security vulnerabilities for the following reasons:

 Lack of computational capacity for efficient  Users may not update their devices, thus
built-in security restricting vulnerability patching
 Poor access control in IoT systems  With time, software updates might be
 Limited budget for properly testing and unavailable for older devices
improving firmware security  Poor protection from physical attacks: an
 Lack of regular patches and updates due to attacker can get close enough to add their
limited budgets and technical limitations of chip or hack the device using radio waves
IoT devices

2. Insecure communications: Most existing security mechanisms were initially designed for desktop
computers and are difficult to implement on resource-constrained IoT devices. That’s why traditional security
measures aren’t as efficient when it comes to protecting the communication of IoT devices. One of the most
dangerous threats caused by insecure communications is the possibility of a man-in-the-middle (MitM) attack.
Hackers can easily perform MitM attacks to compromise an update procedure and take control of your device
if it doesn’t use secure encryption and authentication mechanisms. Attackers can even install malware or
change a device’s functionality.
3. Data leaks from IoT systems: We’ve already established that by capturing unencrypted messages from your
IoT system, hackers can get access to the data it processes. This might include even sensitive data like your
location, bank account details, and health records. However, abusing poorly secured communications isn’t the
only way attackers can gather valuable data. All data is transferred via and stored in the cloud, and cloud-
hosted services can also experience external attacks.
4. Malware risks: If attackers find a way to inject malware into an IoT system, they may change its
functionality, collect personal data, and launch other attacks. Moreover, some devices can be infected with
viruses out of the box if manufacturers don’t ensure adequate software security.
5. Outdated software: As vulnerabilities in software are discovered and resolved, it is important to distribute
the updated version to protect against the vulnerability. This means that IoT devices must ship with up-to-date
software without any known vulnerabilities, and that they must have update functionality to patch any
vulnerabilities that become known after the deployment of the device.

You might also like