Internet of Things (IoT) with Cloud Computing and Machine-to-Machine (M2M) Communication
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2016, Vol 3, Issue 9
Abstract
The Internet of Things (IoT) is a new revolution of the Internet. Objects make themselves recognizable and they obtain intelligence by making or enabling context related decisions. They can communicate information about themselves. They can access information that has been aggregated by other things, or they can be components of complex services. The three important factors propelling the IoT forward are Sensing Nodes, Embedded Processing and Communication. This transformation is accompanied with the emergence of cloud computing capabilities supported by an increase in storage capacity and high end processing and the Machine-to-Machine (M2M) communication for data transport with security. By introducing cloud computing technology, we can make a full call to the storage resource pool and computing resource pool in the cloud computing architecture, and provide high reliability for IoT cloud storage service and efficient cloud computing services to users. The service layer for M2M type of communication will provide a framework for the integration of the different communication technologies deployed in the field of IoT. This M2M service layer will provide the needed services like data transport, security, devices management and device discovery in a harmonized manner across a multitude of vertical domains to the application layer. In this paper, a brief introduction of IoT is given and the IoT with cloud storage and M2M communication is explained. The main issues of IoT related with storage, requirement of high end devices, security, privacy, data transport can be solved by the combination of IoT with cloud computing and M2M communication. This will also benefit the IoT in its ease of use in day-to-day life and believe to be future in this area which is getting ready for its revolution.
Authors and Affiliations
Sherin C Abraham
Improving Cluster-Based Certificate Revocation and Integral Component CCRVC Scheme for Authentication in Mobile Adhoc Network
Certificate revocation is a crucial integral element to secure network communications. During this paper, we tend to specialize in the problem of certificate revocation to isolate attackers from any collaborating in netw...
Predicting User Geographical Service Rating in Social Network Using Point of Interest Recommendation
Online social networks (OSNs) have experienced tremendous growth in recent years and become a de facto portal for hundreds of millions of Internet users. These OSNs offer attractive means for digital social interactions...
Approximate Entropy as a Measure of Cognitive Fatigue: An EEG Pilot Study
Nonlinear analysis of electroencephalogram (EEG) activity can provide a better understanding of brain signal dynamics during cognitive fatigue. The aim of this study was to analyse the regularity of EEG time series of he...
To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing
The cloud can offer services to the users at lower cost and services are available at anytime, anywhere, user data security is the main challenge in cloud computing. The data encryption is the best way for providing data...
THE SECOND HANKEL DETERMINANT FOR A CLASS OF SPIRALLIKE FUNCTIONS DEFINED BY HOHLOV OPERATOR
LetAdenotes the class of normalized analytic functions of the form, f(z) = z + X∞ k=2 akz k (1.1) where, z ∈ E {z : z ∈ C & |z| < 1} (1.2) LetSdenotes the class of all functions inAwhich are univalent. Robertson [14] int...