Fig 3 - uploaded by Kostas E. Psannis
Content may be subject to copyright.
IoT & Cloud Computing integration. 

IoT & Cloud Computing integration. 

Source publication
Article
Full-text available
Mobile Cloud Computing is a new technology which refers to an infrastructure where both data storage and data processing operate outside of the mobile device. Another recent technology is Internet of Things. Internet of Things is a new technology which is growing rapidly in the field of telecommunications. More specifically, IoT related with wirele...

Context in source publication

Context 1
... the integration of IoT and Cloud we have the opportunity to expand the use of the available technology that provided in cloud environments. Applications and information that use the Internet of Things technology with this integration can be used through the cloud storage. The integration of IoT and Cloud technologies represented in Fig. 3. The cloud offers to mobile and wireless users to access all the information and the application that needed for the IoT ...

Similar publications

Article
Full-text available
This project aims to design and implement a novel real-time data acquisition and batch-processing technique on an Internet of Things (IoT) based customizable control unit. The scope of the project is to incorporate the use of interconnectivity between devices, which generate data and to process the generated data onboard with the use of a real-time...
Article
Full-text available
The Internet of Things (IoT) is an interconnected network of objects which range from simple sensors to smartphones and tablets; it is a relatively novel paradigm that has been rapidly gaining ground in the scenario of modern wireless telecommunications with an expected growth of 25 to 50 billion of connected devices for 2020 Due to the recent rise...
Article
Wireless sensor networks have been widely used in industrial IoT contexts due to their useful support during the production monitoring and risk pre-warning. However, complicated and extremely variable industrial environments call for higher communication stability and reliability to guarantee timely transmission of monitored data. Considering mobil...
Preprint
Full-text available
Mobile Cloud Computing (MCC) has been introduced to be a prospective technology with the explosive growth of mobile applications and evolving cloud computing concept. MCC is the integration of cloud computing in the mobile technology environment. It refers to an infrastructure where both data processing and data storage is taken away from the mobil...
Article
Full-text available
With the development of the Internet of Things (IoT) technology, a vast amount of the IoT data is generated by mobile applications from mobile devices. Cloudlets provide a paradigm that allows the mobile applications and the generated IoT data to be offloaded from the mobile devices to the cloudlets for processing and storage through the access poi...

Citations

... IOT SECURITY PARAMETERSAs per literature review, IoT devices are vulnerable to attack. The top security vulnerabilities highlighted were in addition to ISO/IEC 25010 security parameters[5 ...
... Stergiou et al 10,11 conducted a survey of IoT and Cloud Computing with a focus on the security issues of both technologies. Individually, by combining the two techniques above (ie, Cloud Computing and IoT) to examine the standard features and in order tο discover the benefits of their integration, 10,[12][13][14] Renata Pereira et al 15 conducted an experiment using IoT embedded Linux system to cloud monitoring of the photovoltaic system in real time by incorporating Raspberry Pi as the central controller. It exemplifies the multiuser monitoring system with a cloud server through an embedded Linux system of Raspberry Pi to measure photovoltaic plant voltage, current, temperature, and humidity. ...
Article
Full-text available
Apart from being fundamental in industry 4.0, IoT also extends its capability to smart transportation in an oil pipeline system. The initiation of the Internet of Things has witnessed incredible success in the application of wireless sensor networks and ubiquitous computing for various smart‐control applications. In the oil industry, for smooth, accident‐less, long‐range pipeline transportation, data communication through wireless sensor networks plays a predominant role in IoT. For the prominent integration with the internet, it is essential to fabricate a middleware by overcoming the shortcomings like interoperability and heterogeneity. But yet there is no compact, integrated IoT module with power and energy‐efficient configuration to take the modern technology to the next level of innovation of wireless network systems with embedded sensors in the oil industry. Hence, this paper presents a novel, unique‐integrated compact, smart IoT module that aims at reducing costs associated with commercial data loggers and sensing modules, requiring control and data storage that need proprietary software. Other usual drawbacks of commercial solutions are limited sensor connections with low expansion flexibility and maintenance restricted to the manufacturer and long cable communication distances. The proposed integrated smart IoT module operation relies on free software, allowing online distribution and communication with a cloud server wirelessly via Wi‐Fi through message queuing telemetry transport (MQTT) and hypertext transfer protocol (HTTP) for efficient data communication. A secured high‐level engineering web page called Web Monitor was developed for online data analysis with real‐time monitoring and control to afford intelligent transportation in oil pipelines. Further, in this work, the real‐time validation of the proposed smart IoT module performance in the oil pipeline during abnormal circumstances is also provided. Through this integrated IoT module, the entire oil pipeline network with each substation can be interconnected and controlled beneficial with its intelligence, low cost, and portability.
... Die Cloud ist eine "allgegenwärtige" und "günstige" IT-Infrastruktur, welche über das Internet ortsunabhängig IT-Ressourcen in Form von Servern, Speichersystemen, Applikationen und Services zur Verfügung stellt (Mell und Grance 2011;Stergiou et al. 2016). Da das generierte Datenvolumen kontinuierlich zunimmt, stößt die Cloud (teilweise) an ihre Tragfähigkeitsgrenzen. ...
Chapter
Full-text available
Zusammenfassung Durch die industrielle, digitale Transformation, insbesondere durch die Vernetzung von Fertigungsanlagen, wird zusehends eine sehr große Datenmenge in der Schweizer Fertigungsindustrie generiert. Viele Daten bleiben dabei lokal (oft) ungenutzt oder werden über weite Transportwege an zentrale Rechenzentren zur Analyse gesendet. Vor diesem Hintergrund stellt sich die Frage, wie Daten so genutzt werden können, dass lange Transportwege entfallen und zeitgleich, durch die Verarbeitung dieser Daten, Wissen generiert werden kann. Dieser Beitrag liefert erste Antworten auf der Basis von empirischen Erkenntnissen, welche durch Befragungen von Anbietern, Beratungsunternehmen und Fertigungsunternehmen im Bereich Edge Computing durchgeführt wurden. Dabei liefert die vorliegende Studie Erkenntnisse in den Bereichen technisches Verständnis, Geschäftsmodelle und Anwendungsszenarien sowie praktische Umsetzungen im Sinne von Pilotierungen und Rollouts als Proof of Concept.
... Li et al., 2017). Due to a history of data leaks, privacy concerns have had a serious impact on the cloud in recent years, especially due the lack of privacy protection and authentication mechanisms (Stergiou et al., 2018). Cloud storage and processing are usually spread over multiple locations, which results in privacy leaks. ...
... This approach has several solutions for privacy, but issues like data leaks and lack of trust are large in number (Soubra, 2012;J. Singh et al., 2016;Henze et al., 2017;Zhou et al., 2017), (Stergiou et al., 2018), (Mollah et al., 2017). ...
Article
Full-text available
The Internet of Things (IoT) has been evolving for more than a decade. Technological advancements have increased its popularity, but concerns and risks related to IoT are growing considerably along with the increased number of connected devices. In 2013, a new cryptography-based infrastructure called blockchain emerged with the potential to replace the existing cloud-based infrastructure of IoT through decentralization. In this article, we provide a taxonomy of the challenges in the current IoT infrastructure, and then we provide literature survey with a taxonomy of the issues to expect in the future of the IoT after adopting blockchain as an infrastructure. The two architectures are compared on the basis of their strengths and weaknesses. Then a brief survey of ongoing key research activities in blockchain is presented which will have a considerable impact to overcome the issues encountered in applicability of blockchain for IoT. Finally, considering the challenges and issues in both infrastructures and the latest research activities, we propose a high-level Hybrid-IoT approach that uses the cloud, edge/fog, and blockchain together to avoid the limitations of each infrastructure.
... Thus, based on previous works (Stergiou et al., 2018b;Stergiou & Psannis, 2017a;Stergiou et al., 2018f;Stergiou et al., 2018c;Stergiou et al., 2018d;Stergiou & Psannis, 2017b;Plageras et al., 2017;Stergiou et al., 2018a; ...
Chapter
Full-text available
Mobile Cloud Computing provides the opportunity to restrict the usage of huge hardware infrastructure, and to provide access to data, applications and computational power from every place and in any time with the use of a mobile device. Furthermore, the Mobile Cloud Computing (MCC) offers a number of possibilities, but additionally places several challenges and issues that need to be addressed as well. Through this work, we try to define the most important issues and challenges in the field of Mobile Cloud Computing technology, by illustrating the most significant works related to MCC through the recent years. Count on our study, and regarding the huge benefits offered by the Mobile Cloud Computing technology, we try to achieve a more safe and trusted environment for the MCC users in order to operate the functions, and transfer, edit and manage data and applications, proposing a new method based on the existing AES encryption algorithm, which is according to our study, the most relevant encryption algorithm to a Cloud environment. As a conclusion to our work, we suggest as a future plan to focus on finding new ways to achieve a better integration MCC with other technologies, focusing on security algorithms and all the challenges that the technologies faced on the security level.
... Mobile devices (smartphones and tablets), when connected to the cloud, can upsurge their processing power and storage capacity [24]. The continued improvement of cloud computing technologies has enabled ubiquitous, real-time, and on-demand access to computing resources (e.g., applications, platforms, infrastructure) with nominal management efforts [25]. Currently, many smartphone applications related to health, entertainment, communication, education, and safety are using complementary features of clouds to mix and match their needs [26,27]. ...
... A quality of service-aware dynamic pricing and scheduling algorithm [13] was proposed to overcome the challenges in the wireless cloud environment and to enrich the gain of the provider by concentrating only on the current state and length of the job queue. In [14], a survey was done of the security issues while integrating two wireless domains such as cloud computing and IoT, and it was also concluded that cloud computing increases the performance of the IoT. Efficient task scheduling [15] was used to attain the optimal solution by clustering the resources by fuzzy logic and it reduced the initialization time of the jobs across the resource clusters. ...
... The proposed RDENP algorithm mainly depends on the weight (potential) calculation of each and every resource. Potential calculation [14] or weight of the resource can be calculated by using the time and work equation as total work = men × days. This equation can also be reframed based on the environment as Maximum efficiency (total work) = Number of resources (NR) × Makespan (MK). ...
Article
Full-text available
In the current era, cloud computing is the major focus of distributed computing and it helps in satisfying the requirements of the business world. It provides facilities on demand under all the parameters of the computing, such as infrastructure, platform, and software, across the globe. One of the major challenges in the cloud environment is to cluster the resources and schedule the jobs among the resource clusters. Many existing approaches failed to provide an optimal solution for job scheduling due to inefficient clustering of resources. In the proposed system, a novel algorithm called resource differentiation based on equivalence node potential (RDENP) is proposed for clustering the resources in a simulated wireless personal cloud environment. The performance evaluation is done among the existing and proposed approaches; as a result, the proposed RDENP algorithm produces the optimal solution for clustering the resources, which will lead to an efficient scheduling policy in a cloud environment in the future. To take this idea forward, an optimal energy consumption algorithm is to be designed to process the jobs among the resources and to minimize the infrastructure of the cloud environment by clustering the resources virtually.
... On the other hand, the scientific community is rich of valuable works. In [60], a survey of IoT and Cloud Computing security issues has been presented. Instead, a location privacy-preserving algorithm with good advantages in term of lower probability of re-leaving the user's location has been presented in [61]. ...
Article
Full-text available
Nowadays, the latest technological advancements have changed the centralized Cloud Computing model, going through Edge and Internet of Things (IoT), which are closer to end users. In particular, current Cloud Computing programming models deal with the recent evolution of the IoT phenomenon because smart devices are becoming more and more pervasive, powerful and inexpensive. Therefore, services need to be placed near such devices and resource orchestration techniques need to be redesigned. In this regard, Osmotic Computing aims at providing a new computing paradigm based on the deployment and migration strategies related to the infrastructures and applications requirements across Cloud, Edge, and IoT layers. The objective of this scientific work is to propose an Osmotic Computing architecture, based on a multi-agent system, according to a new software abstraction called MicroELement (MEL), that encapsulates resources, services and data necessary to run IoT applications. A Body Area Network (BAN) scenario is proposed in order to explore the Osmotic Computing potentiality and explain the reasons behind this new paradigm.
... Internet of Things (IoT) is a special type of network comprising of physical objects or things, embedded with electronics, sensors, software and communications systems, enabling greater value and service via data exchange with manufacturers, operators and other connected devices (Stergiou, Psannis, Kim & Gupta, 2018). Data gathered by these devices requires mass storage, which is facilitated via utilization of "Cloud Computing". ...
Chapter
Smart world is envisioned via the fusion of diverse technologies like sensor communications, cloud computing , internet of things, AI, machine and deep learning. No doubt, new technologies bring revolution and innovation in every aspect of human life, but they are accompanied by lots of limitations in terms of energy wastage, environmental hazards like carbon or other chemical emissions, extreme consumption of natural or renewable sources and greenhouse effects. In order to minimize the negative impact of these technologies on the environment, it is utmost important to move towards green technology. That is the reason researchers are working hard and moving towards green computing, ICT, and IoT. This chapter explores an in-depth analysis of principles of G-IoT, making significant progress towards improvising the quality of life and sustainable environment. In addition to this, the chapter outlines various Green ICT technologies explores potential towards diverse real-time areas and also highlights various challenges acting as a barrier towards G-IoT implementation in the real world.
... of development and growth. In other words, smart cities provide a better way to manage and counter attack risks faced in day to day life. Apart from enormous benefits, these advancements have also brought new ways to hack and disrupt smart city. These systems, like doors, grills and fences also have some vulnerability, which has to be dealt with ( (Stergiou et. Al, 2018), Amin, 2015). ...
... Few security goals to be attained while designing a smart city are (Stergiou et. al, 2018): ...
Chapter
Smart cities are composed of interlinked components with constant data transfer and services targeted at increasing the life style of the people. The chapter focuses on diverged smart city components as well as the security models designed to be implemented. The four major paradigms discussed in this chapter are smart grids, building automation system (BAS), unmanned aerial vehicle (UAV), and smart vehicles. Apart from addressing the security concerns of every component, the major highlights of this chapter are architecture, smart environment, industry, lifestyle, services, and digital lifestyle quality. Finally, the chapter focuses on privacy preserving mechanisms, its essence over smart cities, strong architecture related to privacy, preserving mechanism, and various approaches available that can retaliate these issues in a smart city environment.