A Scalable Big Stream Cloud Architecture for the Internet of Things

Fog Computing ◽  
2018 ◽  
pp. 25-53 ◽  
Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.

Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.


2020 ◽  
pp. 1260-1284
Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) is expected to interconnect billions (around 50 by 2020) of heterogeneous sensor/actuator-equipped devices denoted as “Smart Objects” (SOs), characterized by constrained resources in terms of memory, processing, and communication reliability. Several IoT applications have real-time and low-latency requirements and must rely on architectures specifically designed to manage gigantic streams of information (in terms of number of data sources and transmission data rate). We refer to “Big Stream” as the paradigm which best fits the selected IoT scenario, in contrast to the traditional “Big Data” concept, which does not consider real-time constraints. Moreover, there are many security concerns related to IoT devices and to the Cloud. In this paper, we analyze security aspects in a novel Cloud architecture for Big Stream applications, which efficiently handles Big Stream data through a Graph-based platform and delivers processed data to consumers, with low latency. The authors detail each module defined in the system architecture, describing all refinements required to make the platform able to secure large data streams. An experimentation is also conducted in order to evaluate the performance of the proposed architecture when integrating security mechanisms.


2019 ◽  
Vol 1 (2) ◽  
pp. 16 ◽  
Author(s):  
Deepak Choudhary

The Internet of Things (IoT) enables the integration of data from virtual and physical worlds. It involves smart objects that can understand and react to their environment in a variety of industrial, commercial and household settings. As the IoT expands the number of connected devices, there is the potential to allow cyber-attackers into the physical world in which we live, as they seize on security holes in these new systems. New security issues arise through the heterogeneity  of  IoT  applications and devices and their large-scale deployment.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 274 ◽  
Author(s):  
Ms U. Harita ◽  
K V.DayaSagar

The Internet of Things (IoT) introduces an inventive and perceptive of a future Internet where users, computing systems, and everyday items owning sensing and actuating abilities cooperate with unique comfort and financial advantages. Many heterogeneous devices get connected and contribute to the IoT and are known as things.Internet of Things (IoT) enables these things to correspond, compute and make decisions on the network. In such a heterogeneous environment, every user of IoT will have a unique purpose to be served in the form of communication and computation. There is a threat that a malicious user can demolish the security and privacy of the network. Hence any application in the environment of IoT is prone to various attacks and threats. At this point, security becomes a high priority in IoT. To ensure security, care must be taken to guarantee confidentiality, authenticity, data integrity and non-repudiation. In this paperaddress various conventional techniques for providing security of IoT devices and present analysis of existing solutions for IoT. Firstly, as security will be a fundamental allowing thing of most IoT applications, mechanisms must also be designed to defend communications enabled by such technologies. Later, we identify some suitable security algorithms.


Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) is expected to interconnect billions (around 50 by 2020) of heterogeneous sensor/actuator-equipped devices denoted as “Smart Objects” (SOs), characterized by constrained resources in terms of memory, processing, and communication reliability. Several IoT applications have real-time and low-latency requirements and must rely on architectures specifically designed to manage gigantic streams of information (in terms of number of data sources and transmission data rate). We refer to “Big Stream” as the paradigm which best fits the selected IoT scenario, in contrast to the traditional “Big Data” concept, which does not consider real-time constraints. Moreover, there are many security concerns related to IoT devices and to the Cloud. In this paper, we analyze security aspects in a novel Cloud architecture for Big Stream applications, which efficiently handles Big Stream data through a Graph-based platform and delivers processed data to consumers, with low latency. The authors detail each module defined in the system architecture, describing all refinements required to make the platform able to secure large data streams. An experimentation is also conducted in order to evaluate the performance of the proposed architecture when integrating security mechanisms.


Author(s):  
Prerak Gada ◽  
Kulsum Sayed

One of the jargons in Information Technology is the Internet of Things (IoT). The future is the Internet of Things, which will transform real-world objects into intelligent objects. IoT aims to introduce plug-and-play technology providing the ultimate user, ease of operation, remote access control, and configurable. This paper presents IoT technology from a bird’s eye view covering its applications in all fields, various challenges faced, and future prospects/trends. IoT applications require higher data rates, large bandwidth, increased capacity, low latency, and high throughput..


2021 ◽  
Vol 25 (1) ◽  
pp. 34-38
Author(s):  
Jonathan Oostvogels ◽  
Fan Yang ◽  
Sam Michiels ◽  
Wouter Joosen ◽  
Danny Hughes

Latency-sensitive applications for the Internet of Things (IoT) often require performance guarantees that contemporary wireless networks fail to offer. Application scenarios involving real-time control of industrial machinery, robotics, or delay-sensitive actuation therefore typically still rely on cables: today's wireless networks cannot deliver messages in a sufficiently small and predictable amount of time. Drop-in wireless replacements for these cabled systems would nevertheless provide great benefit by eliminating the high cost and complexity associated with running cables in harsh industrial environments [1]. The symbolsynchronous bus, introduced in this article and embodied in a platform called Zero-Wire, is a novel wireless networking paradigm that addresses this gap. Using concurrent optical transmissions, it strives to bring low-latency deterministic networking to the wireless IoT.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
S. A. Zhezhkun ◽  
◽  
L. B. Veksler ◽  
S. M. Brezitsʹkyy ◽  
B. O. Tarasyuk

This article focuses on the analysis of promising technologies for long-range traffic transmission for the implementation of the Internet of Things. The result of the review of technical features of technologies, their advantages and disadvantages is given. A comparative analysis was performed. An analysis is made that in the future heterogeneous structures based on the integration of many used radio technologies will play a crucial role in the implementation of fifth generation networks and systems. The Internet of Things (IoT) is heavily affecting our daily lives in many domains, ranging from tiny wearable devices to large industrial systems. Consequently, a wide variety of IoT applications have been developed and deployed using different IoT frameworks. An IoT framework is a set of guiding rules, protocols, and standards which simplify the implementation of IoT applications. The success of these applications mainly depends on the ecosystem characteristics of the IoT framework, with the emphasis on the security mechanisms employed in it, where issues related to security and privacy are pivotal. In this paper, we survey the security of the main IoT frameworks, a total of 8 frameworks are considered. For each framework, we clarify the proposed architecture, the essentials of developing third-party smart apps, the compatible hardware, and the security features. Comparing security architectures shows that the same standards used for securing communications, whereas different methodologies followed for providing other security properties.


Sign in / Sign up

Export Citation Format

Share Document