Iot with CC
✅ Unit 1: Introduction to Cloud
Computing
📌 1. Overview of Cloud Computing
What is Cloud Computing?
Cloud Computing is the on-demand delivery of IT resources like servers, storage,
databases, networking, software, and analytics over the Internet (“the cloud”) with
pay-as-you-go pricing.
How it Works:
● You don’t buy hardware/software.
● You rent computing resources from a cloud provider like AWS, Microsoft Azure, or
Google Cloud.
● You can scale up/down based on your needs without physical infrastructure.
Real-Life Example:
Using Google Drive to store your documents or watching movies on Netflix — you’re
consuming a cloud service. You don't know or care where the servers are — it "just works."
📌 2. Characteristics of Cloud Computing
Cloud computing has five essential characteristics as defined by the NIST (National
Institute of Standards and Technology):
1. On-Demand Self-Service
● You can automatically provision computing resources (like storage or servers)
without needing human intervention.
● Like booking a movie ticket online — you don’t need to call the theatre.
2. Broad Network Access
● Services are available over the network (usually the Internet) and can be accessed
via standard platforms (e.g., laptops, phones, tablets).
3. Resource Pooling
● Cloud providers use multi-tenant models — multiple users share the same physical
resources.
● These are dynamically allocated and reallocated based on demand.
● You don’t know the exact physical location, but you can often specify a geographic
region (e.g., "US-West").
4. Rapid Elasticity
● Resources can scale up or down quickly and automatically depending on demand.
● E.g., during a sale, Amazon’s servers scale up to handle millions of users.
5. Measured Service
● Cloud systems automatically control and optimize resource usage.
● Usage is metered (like electricity) — you pay only for what you use.
📌 3. Cloud Deployment Models
Deployment models define how the cloud is set up and used.
🔹 A. Public Cloud
● Owned and managed by third-party cloud service providers.
● Resources are delivered over the Internet.
● Shared among multiple organizations.
● Example Providers: Amazon Web Services (AWS), Microsoft Azure, Google Cloud.
Advantages:
● Cost-effective (no infrastructure investment)
● Highly scalable and elastic
● Easy to start
Disadvantages:
● Limited customization
● Security concerns for sensitive data
🔹 B. Private Cloud
● Used exclusively by a single organization.
● Can be on-premises or hosted by a third-party.
● Greater control over data, security, and compliance.
Advantages:
● High security and privacy
● Customizable to meet internal requirements
Disadvantages:
● Expensive to set up and maintain
● Limited scalability compared to public cloud
🔹 C. Hybrid Cloud
● Combination of public and private clouds, allowing data and applications to be
shared between them.
● Example: Sensitive data in private cloud, but less sensitive operations in public cloud.
Advantages:
● Flexibility and cost-efficiency
● Better disaster recovery and backup
Disadvantages:
● Complex to manage and secure
● Requires strong integration
🔹 D. Community Cloud
● Shared by several organizations with common goals or compliance requirements
(e.g., banks, healthcare providers).
● Managed internally or by a third party.
Advantages:
● Cost-effective for a group of users
● Collaborative efforts for similar needs
Disadvantages:
● Shared responsibility and management
● Limited scalability
📌 4. Cloud Service Models
These define what the customer is responsible for and what the cloud provider
manages.
🔸 A. IaaS — Infrastructure as a Service
Provides virtualized computing resources over the internet.
Includes: Servers, storage, networking, and virtualization.
You manage: Operating system, applications, data.
Provider manages: Hardware, virtualization, networking, storage.
Example Providers:
● Amazon EC2
● Microsoft Azure Virtual Machines
● Google Compute Engine
Use Case:
● Hosting websites
● Setting up test and development environments
● Backup and recovery
🔸 B. PaaS — Platform as a Service
Provides a platform allowing customers to develop, run, and manage applications without
managing the infrastructure.
Includes: OS, middleware, runtime, and development tools.
You manage: Applications and data.
Provider manages: Everything else — servers, OS, storage, networking.
Example Providers:
● Google App Engine
● Microsoft Azure App Services
● Heroku
Use Case:
● Developing web/mobile apps
● Application testing and deployment
🔸 C. SaaS — Software as a Service
Delivers fully functional applications over the internet. End-users access it through a web
browser or app.
You manage: Nothing (only use it).
Provider manages: Everything including the application itself.
Example Providers:
● Gmail
● Microsoft Office 365
● Salesforce
● Dropbox
Use Case:
● Email services
● Customer relationship management (CRM)
● Document collaboration
🔁 Comparison of IaaS, PaaS, SaaS
Feature IaaS PaaS SaaS
You Manage Apps, OS, data Apps, data Just use the app
Provider Servers, storage, OS, runtime, Everything
Manages network servers
Flexibility Highest Moderate Least
Complexity Most Moderate Least
Example AWS EC2, Azure VM Google App Engine Gmail, Salesforce
✅ Summary Points
● Cloud computing delivers scalable, flexible, on-demand IT services.
● Key characteristics: On-demand, Elasticity, Resource pooling, etc.
● Deployment models: Public, Private, Hybrid, Community
● Service models: IaaS (infrastructure), PaaS (platform), SaaS (software)
✅ Unit 2: IoT Data Management and
Analytics in the Cloud – Full Detailed
Explanation
🟦 1. Data Management in IoT
IoT involves millions of devices collecting data. Effective data management ensures this
massive, diverse, and often real-time data is collected, transmitted, stored, and
processed correctly for analysis and decision-making.
📌 1.1 IoT Data Sources
These are the origins of the data in IoT systems. Common sources include:
🔹 a. Sensors
● Measure physical conditions: temperature, humidity, light, pressure, gas, etc.
● Found in home automation, smart agriculture, weather monitoring.
🔹 b. RFID (Radio Frequency Identification)
● Used in inventory and logistics systems.
● Tracks movement and identity of objects using tags and readers.
🔹 c. Wearables
● Smartwatches, fitness trackers.
● Collect data like heart rate, steps, sleep quality.
🔹 d. Smart Appliances & Devices
● Smart TVs, thermostats, lights, fridges.
● Collect usage, location, and operational data.
🔹 e. Vehicles (Telematics)
● Send GPS location, speed, engine diagnostics.
● Useful in fleet management and logistics.
🔹 f. Industrial Equipment
● Machines with embedded sensors in factories.
● Used for predictive maintenance and production analytics.
📌 1.2 Types of IoT Data
IoT generates heterogeneous data. Understanding types helps choose the right storage
and processing tools:
Type Description Examples
Structured Tabular data with a fixed schema Sensor ID, timestamp,
numeric value
Semi‑structure Data with tags or markers but no fixed JSON payloads from smart
d schema devices
Unstructured Raw data without any predefined Video feeds, audio
model recordings, logs
Time-series Sequence of data points indexed by Temperature readings every
time minute
Spatial Data that includes geographical or GPS coordinates from
locational info vehicles
📌 1.3 Challenges in IoT Data Management
1. Volume
○ Billions of devices generate petabytes of data daily.
○ Storage and processing costs can skyrocket without proper design.
2. Velocity
○ Data streams in real‑time—sometimes at millisecond frequencies.
○ Systems must ingest and process with minimal lag.
3. Variety
○ Heterogeneous formats—JSON, XML, binary, images, video.
○ Requires flexible storage (NoSQL, data lakes) and schema‑on‑read
approaches.
4. Veracity
○ Sensor readings can be noisy or faulty.
○ Data cleaning and validation pipelines are essential.
5. Value
○ Turning raw streams into actionable insights demands sophisticated analytics.
○ Risk of drowning in data without deriving ROI.
6. Security & Privacy
○ IoT devices often lack robust security controls.
○ Encrypted transmission, secure boot, and identity management mitigate risks.
7. Scalability
○ Architecture must scale horizontally—adding more nodes rather than beefier
machines.
○ Cloud “serverless” and containerized microservices help here.
🟦 2. Data Ingestion, Storage, and Processing in the
Cloud
📌 2.1 Data Ingestion
Definition: Collecting data from devices and delivering it to cloud endpoints for
storage/processing.
● Protocols:
○ MQTT (lightweight, publish/subscribe)
○ CoAP (for constrained devices)
○ HTTP/REST (for web‑enabled devices)
● Platforms/Services:
○ AWS IoT Core: Manages device connections, message brokering.
○ Azure IoT Hub: Secure device provisioning, bi‑directional communication.
○ Google Cloud IoT Core: Scalable ingestion with MQTT/HTTP bridges.
○ Apache Kafka & Kinesis: High‑throughput streaming for batch and real‑time.
● Batch vs. Stream:
○ Batch: Periodic uploads—good for non‑time‑sensitive bulk data.
○ Stream: Continuous flow—essential for live monitoring and real‑time
analytics.
📌 2.2 Storage
Choosing the right storage tier is vital for cost, performance, and query patterns:
Storage Tier Best For Services
Object Large blobs—images, video, AWS S3, Azure Blob Storage
Storage logs
Time‑Series High‑frequency numeric data InfluxDB, AWS Timestream
DB
Relational DB Transactional, structured data Amazon RDS, Azure SQL Database
NoSQL DB Flexible schemas, high DynamoDB, Azure Cosmos DB,
throughput MongoDB
Data Lake Centralized raw data repository AWS Lake Formation, Azure Data
Lake
📌 2.3 Data Processing
1. Batch Processing
○ Process large volumes in scheduled jobs.
○ Frameworks: Apache Hadoop, Spark, AWS Glue.
2. Stream Processing
○ Low‑latency, continuous computations.
○ Frameworks: Apache Flink, Kafka Streams, AWS Kinesis Data Analytics,
Azure Stream Analytics.
3. Serverless Compute
○ Event‑driven functions scale automatically.
○ Services: AWS Lambda, Azure Functions, Google Cloud Functions.
🟦 3. Data Integration & Interoperability
📌 3.1 Interoperability Issues
● Protocol Diversity: MQTT, CoAP, HTTP, Zigbee, BLE all talk differently.
● Data Format Fragmentation: Proprietary binary vs. JSON vs. XML.
● Vendor Lock‑in: Proprietary platforms hinder multi‑cloud or hybrid deployments.
📌 3.2 Solutions
● Adopt Standards: MQTT, OPC UA, LwM2M for constrained devices.
● Middleware/Gateways: Translate between protocols and normalize payloads.
● Semantic Models: Use ontologies (e.g., W3C Web of Things Thing Description) to
define device capabilities and data schemas.
● API‑First Design: Expose all device interactions via REST or gRPC for consistency.
🟦 4. IoT Analytics in the Cloud
Transforming raw IoT data into insights through analytics and machine learning.
📌 4.1 Introduction to Data Analytics & Machine Learning for IoT
● Descriptive Analytics: What happened? (dashboards, reports)
● Diagnostic Analytics: Why did it happen? (root‑cause analysis)
● Predictive Analytics: What will happen? (forecasting, risk scoring)
● Prescriptive Analytics: What should we do? (recommendations, automated actions)
ML Lifecycle in IoT:
1. Data Preparation: Clean, normalize, enrich sensor feeds.
2. Feature Engineering: Extract trends, rolling averages, time‑domain features (e.g.,
FFT for vibration).
3. Model Training: Use historical labeled data (failure logs) to train models.
4. Deployment: Deploy models at edge (for low latency) or in cloud (for heavy
compute).
5. Monitoring & Retraining: Continuously evaluate model performance and retrain on
fresh data.
📌 4.2 Predictive Analytics
● Goal: Forecast future states—equipment failures, demand spikes, environmental
changes.
● Techniques:
○ Time‑Series Forecasting: ARIMA, Prophet, LSTM neural nets.
○ Regression Models: Linear, Random Forest, Gradient Boosting.
● Use Case: Predictive maintenance—schedule repairs before breakdowns, reducing
downtime and costs.
📌 4.3 Anomaly Detection
● Goal: Spot deviations from normal behavior to catch faults or security breaches early.
● Statistical Methods:
○ Z‑score: Flag values beyond a threshold of standard deviations.
○ IQR (Interquartile Range): Identify outliers outside [Q1–1.5×IQR,
Q3+1.5×IQR].
● Machine Learning Methods:
○ Isolation Forest: Builds random forests to isolate anomalies.
○ Autoencoders: Train neural nets to reconstruct normal data; high
reconstruction error = anomaly.
○ One‑Class SVM: Learns the boundary of normal data in feature space.
✅ Key Takeaways
● IoT data is vast, varied, and often real‑time—requiring scalable ingestion, flexible
storage, and fast processing.
● Interoperability hinges on adopting standards, using gateways, and semantic models.
● Cloud analytics leverages both traditional BI and advanced ML to move from “what
happened” to “what should happen.”
● Predictive analytics and anomaly detection are at the heart of intelligent, proactive
IoT systems.
Unit 3
1. Overview of IoT Platforms
An IoT platform is the middleware that connects devices, ingests and processes their data,
and enables you to build applications on top. Think of it as the “operating system” for your
IoT solution.
Key Functions of an IoT Platform
1. Device Management
○ Onboarding/Provisioning: Securely register new devices.
○ Configuration & Control: Push firmware updates, change settings.
○ Health Monitoring: Track device connectivity, battery, uptime.
2. Data Ingestion & Processing
○ Protocol Support: MQTT, CoAP, HTTP, WebSockets.
○ Edge vs. Cloud Processing: Decide what runs on‑device/edge (“edge
computing”) vs. in the cloud.
3. Data Storage & Analytics
○ Time‑series Databases: Optimized for sensor data.
○ Data Lakes: For raw, unstructured data.
○ Real‑time Analytics Engines: For live dashboards and alerts.
4. Application Enablement
○ APIs & SDKs: For building custom dashboards, mobile apps, integrations.
○ Rule Engines & Workflows: Trigger actions (e.g., SMS alerts) when
conditions are met.
5. Security & Compliance
○ Identity & Access Management (IAM): Authenticate devices and users.
○ Encryption & Key Management: Secure data in transit and at rest.
○ Audit & Compliance Tools: Ensure GDPR, HIPAA, or industry‑specific
standards.
Why Use an IoT Platform?
● Speeds Development: Removes boilerplate for device connectivity and data
plumbing.
● Scales Seamlessly: Handles millions of devices and petabytes of data.
● Ensures Security Best Practices: Built‑in authentication, encryption, and
role‑based access.
● Enables Rapid Innovation: Focus on business logic—analytics, workflows, and
user interfaces.
2. Cloud IoT Architecture
A reference architecture helps you design scalable, secure IoT solutions. Below is a
common multi‑layered model:
css
CopyEdit
[Devices & Edge] → [Edge Gateway] → [Cloud Ingestion Layer] → [Data
Platform] → [Analytics & Apps]
2.1 Devices & Edge
● Sensors/Actuators: Collect and act on data in the physical world.
● Edge Gateways: Local compute units (e.g., Raspberry Pi, Jetson Nano) that
aggregate, preprocess, and secure device data.
2.2 Connectivity Layer
● Protocols:
○ MQTT: Lightweight pub/sub over TCP.
○ CoAP: REST‑style for constrained devices over UDP.
○ HTTP/WebSockets: Standard web protocols for more capable devices.
● Network Technologies: Wi‑Fi, Ethernet, LTE/5G, LoRaWAN, NB‑IoT.
2.3 Cloud Ingestion Layer
● Message Brokers & Hubs:
○ AWS IoT Core, Azure IoT Hub, Google Cloud IoT Core—manage device
connections, authentication, and high‑throughput messaging.
● API Gateways: Expose REST/gRPC endpoints for device or third‑party integration.
2.4 Data Platform Layer
● Stream Processing: AWS Kinesis Analytics, Azure Stream Analytics, Apache Flink.
● Storage Services:
○ Time‑series: AWS Timestream, InfluxDB Cloud.
○ Object: AWS S3, Azure Blob Storage.
○ NoSQL: DynamoDB, Cosmos DB.
● Integration: ETL services (AWS Glue, Azure Data Factory) to feed data lakes or
data warehouses.
2.5 Analytics & Application Layer
● Real‑time Dashboards: Grafana, Power BI, Cloud provider dashboards.
● Machine Learning / AI: SageMaker, Azure ML, Google Vertex AI for training and
deploying predictive models.
● Business Applications: Custom web/mobile apps, integrations with CRM/ERP.
3. IoT Cloud Services Overview
Let’s survey the major cloud‑provider offerings that streamline each architectural layer.
Layer AWS Microsoft Azure Google Cloud
Device AWS IoT Core & Azure IoT Hub & Cloud IoT Core & IoT
Management Device Defender IoT Central Device Management
Edge Computing AWS IoT Azure IoT Edge Edge TPU & Cloud IoT
Greengrass Edge
Messaging/Brokers Amazon MQ, SNS, Azure Service Bus, Cloud Pub/Sub
SQS Event Hubs
Streaming Kinesis Data Stream Analytics Dataflow (Apache
Analytics Analytics Beam)
Time‑Series Timestream Time Series Bigtable (with
Storage Insights time‑series schema)
Data Lake & S3 + Lake Data Lake Storage, Cloud Storage,
Warehouse Formation, Synapse BigQuery
Redshift
ML & AI SageMaker Azure ML Studio Vertex AI
Visualization & BI QuickSight Power BI Looker
Security & IAM IAM, KMS, Azure AD, Key Cloud IAM, KMS,
Security Hub Vault, Security Security Command
Center Center
Highlights and Differentiators
● AWS IoT Greengrass vs. Azure IoT Edge vs. Google Edge TPU:
○ Greengrass lets you run Lambda‑like functions on devices.
○ IoT Edge uses containers for modules.
○ Edge TPU hardware accelerators for on‑device ML inference.
● IoT Central (Azure) vs. IoT Core (AWS/Google):
○ IoT Central is a SaaS offering—turnkey IoT app with minimal setup.
○ IoT Core provides PaaS—more flexibility at the cost of more configuration.
● Integrated Analytics Suites:
○ SageMaker and Vertex AI offer end‑to‑end ML workflows tightly coupled with
IoT data.
○ Azure Synapse combines data warehousing and big data analytics in a
unified workspace.
✅ Summary of Unit 3
● IoT Platforms accelerate development by handling device management, data
plumbing, and security.
● Reference Architectures guide you through layers: devices, connectivity, ingestion,
data platform, analytics & apps.
● Cloud‑Native IoT Services from AWS, Azure, and Google cover every
layer—choose based on your project’s scale, expertise, and ecosystem preferences.
🔐 1. IoT Security Challenges
IoT devices are highly vulnerable because they:
● Are resource-limited (low CPU, memory, power).
● Often lack built-in security.
● Operate in physically exposed or hostile environments.
● Are deployed in large numbers, making them harder to manage individually.
Major Challenges:
Challenge Description
Device Ensuring only trusted devices join the network. Many IoT devices
Authentication skip proper authentication.
Data Confidentiality Data should remain private. Attacks like sniffing,
man-in-the-middle (MitM) threaten this.
Firmware Many devices use outdated or hardcoded firmware, making them
Vulnerabilities easy to hack.
Scalability of It's hard to secure thousands or millions of devices at once.
Security
Physical Attacks Devices can be tampered with physically (e.g., plugging into a
USB port).
Update Mechanisms Lack of secure OTA (Over-The-Air) update mechanisms exposes
devices to known vulnerabilities.
🔒 2. Security Protocols for IoT
IoT requires lightweight, efficient, and scalable security protocols due to hardware
limitations.
Key Protocols:
Protocol Use Case Descriptio
n
DTLS (Datagram Transport Encrypts communication over UDP (used
Layer Security) with CoAP).
TLS (Transport Layer Used with MQTT, HTTPS for secure
Security) communication.
IPSec Network-level encryption for IP-based
communication.
OAuth 2.0 For secure authorization in constrained
RESTful environments.
Lightweight Cryptography Algorithms like ECC (Elliptic Curve
Cryptography) are used in constrained
devices.
👉 Protocols like MQTT with TLS, or CoAP with DTLS are most common in IoT platforms.
👤 3. Privacy Considerations in IoT
IoT systems collect personal and behavioral data. Poor privacy practices can lead to:
● Location tracking
● Identity theft
● Unauthorized profiling
Key Privacy Challenges:
Issue Description
Data Ownership Who owns data collected by smart meters or health wearables?
User or company?
Consent and Users often don’t know what data is collected and why.
Transparency
Data Minimization Only necessary data should be collected – often violated in IoT.
Data Retention How long is data stored? Who has access to it?
Policies
Regulations Must follow GDPR (Europe), CCPA (California), etc. regarding
user data protection.
Solutions:
● Use privacy-by-design principles.
● Allow users to opt in/out of data sharing.
● Implement anonymization and encryption of sensitive data.
● Store data only for the minimum required duration.
☁️ 4. Cloud Security Issues
The cloud offers scalability, but also introduces security concerns:
Issue Description
Data Breaches Misconfigured S3 buckets or poor access controls can leak personal
data.
Insider Threats Employees or contractors with access might misuse sensitive data.
Shared Multi-tenancy means many clients share the same infrastructure. One
Resources attack can affect many.
Insecure APIs Cloud APIs must be secured to prevent misuse.
Data Loss Due to deletion, software bugs, or failure in cloud infrastructure.
Cloud-specific Threats:
● Account hijacking
● Denial of Service (DoS)
● Man-in-the-Cloud attacks
● Lack of visibility & control over data
🔑 5. Identity and Access Management (IAM)
IAM is essential for both IoT and cloud security. It ensures only authorized users and
devices can access specific resources.
IAM Functions:
Function Description
Authentication Verifying identity using passwords, OTPs, certificates,
biometrics.
Authorization Granting access only to permitted services/data.
Role-Based Access Control Users/devices get permissions based on roles.
(RBAC)
Policy Enforcement Conditional access based on time, location, device.
Federated Identity Allows multiple systems to trust a single identity
provider (SSO).
In Cloud (e.g., AWS IAM):
● Create users, groups, roles, and policies.
● Use multi-factor authentication (MFA).
● Implement least privilege access.
🔐 6. Secure Communication Protocols
IoT and cloud communication must be encrypted and authenticated.
Common Secure Protocols:
Protoco Description
l
HTTPS HTTP over TLS. Common for RESTful APIs.
MQTTS MQTT over TLS. Lightweight and secure.
CoAPS CoAP over DTLS. Used in constrained devices.
VPN Secure tunneling of all data through encrypted
channels.
SSH Secure access to remote devices.
Best Practices:
● Always use end-to-end encryption.
● Avoid sending data in plain text.
● Implement certificate pinning.
● Use unique device credentials instead of shared keys.
✅ Summary of Key Concepts
Topic Key Takeaway
IoT Security IoT devices are vulnerable due to limited resources and poor
Challenges management.
Security Protocols TLS/DTLS, OAuth, and lightweight encryption are key to securing
communication.
Privacy in IoT Focus on data minimization, transparency, and user control.
Cloud Security Multi-tenancy, insecure APIs, and insider threats are major risks.
IAM Manages identity and access; role-based models enhance
security.
Secure Protocols HTTPS, MQTTS, CoAPS ensure encrypted communication
between devices/cloud.
Unit 5: Choosing the Right IoT Cloud Platform. This unit helps you understand how
businesses evaluate and select cloud platforms to manage their IoT systems efficiently. We'll
cover business and technical considerations, the role of dashboards and web portals,
and a detailed comparison of popular platforms like Google IoT Core, AWS IoT Core,
and Azure IoT Hub.
📊 1. Business Considerations for IoT Cloud Platforms
Key Business Considerations:
Factor Explanation
Cost and Pricing Pay-as-you-go vs. subscription, data usage limits, device count,
Model analytics costs.
Vendor Lock-in Risk of getting tied to one cloud vendor. Businesses prefer
portability and open standards.
Scalability Ability to support future growth – more devices, more users,
more services.
Compliance & Does the platform comply with data privacy laws like GDPR,
Regulations HIPAA, etc.?
Support and SLA Is 24/7 support available? What is the uptime guarantee?
Ecosystem and Compatibility with existing systems (ERP, CRM, SAP), and
Integrations third-party services.
Deployment Region Is the cloud platform available in your region? This affects
latency and compliance.
⚙️ 2. Technical Considerations for IoT Cloud Platforms
These are engineering-level concerns to ensure smooth development and operations.Key
Technical Considerations:
Factor Description
Device Management Provisioning, onboarding, remote control, firmware updates.
Protocol Support MQTT, HTTPS, CoAP, AMQP support for communication with
IoT devices.
Security Features Device authentication, encryption, access control, anomaly
detection.
Data Analytics & ML Built-in tools for analytics, predictive modeling, and ML
integration.
Edge Computing Support for edge computing where local processing is needed.
Data Storage & Real-time databases, time-series databases, and integration
Integration with data lakes.
APIs and SDKs Developer support through REST APIs, SDKs in various
languages.
Real-time Processing Capabilities like stream analytics, real-time alerts, and
dashboards.
📈 3. Introduction to Dashboards and Web Portals
IoT dashboards and portals are front-end interfaces that allow businesses to monitor and
control their IoT ecosystems.
Features of IoT Dashboards:
Feature Description
Real-Time Monitoring View current device states, metrics (temperature, humidity,
GPS, etc.).
Visualization Tools Use graphs, maps, gauges, and charts to represent sensor
data.
Alerts and Notifications Trigger alerts when thresholds are crossed (e.g., high
temperature).
Control Interfaces Buttons or switches to remotely control actuators (e.g., open a
valve).
User Access Role-based dashboards for admins, technicians, customers,
Management etc.
Customization Drag-and-drop widgets, color themes, and modular layout
support.
Web Portals
These are broader admin or user interfaces (beyond dashboards) that support:
● Device onboarding
● Billing and subscription
● API keys and security settings
● Reports and analytics
Popular platforms like ThingsBoard, Node-RED, and built-in dashboards in AWS, Azure,
Google provide customizable web interfaces.
☁️ 4. Comparison of Google IoT Core, AWS IoT Core,
and Azure IoT Hub
Here’s a detailed comparison of the three major cloud IoT platforms:
Feature AWS IoT Core Azure IoT Hub Google Cloud IoT
Core (retired in
2023)
Launch Year 2015 2015 2017
Device Millions of devices, Bi-directional Supported
Support fine-grained control communication, digital MQTT/HTTP (retired
twins mid-2023)
Protocols MQTT, MQTT over MQTT, AMQP, HTTPS MQTT, HTTP (now
Supported WebSockets, HTTPS discontinued)
Device Fine-grained policies, Device twin, Used to support
Management registry, shadow auto-scaling, module device registry
(digital twin) identities
Integration Lambda, DynamoDB, Stream Analytics, BigQuery, Dataflow,
Kinesis, S3, Event Grid, Azure ML, Pub/Sub, AI Platform
SageMaker Blob
Security X.509 certificates, IAM, Role-based access, IoT IAM roles, JWT auth
encryption at identity registry (when active)
rest/in-transit
Pricing Model Pay-per-message, Based on units Based on data
connection, and rules (messages, operations, volume (when active)
engine usage devices)
Current Active Active Shut down as of
Status 2023
Verdict:
● AWS IoT Core: Best for flexibility, largest ecosystem, good for enterprise-grade IoT.
● Azure IoT Hub: Strong integration with Microsoft tools, good for digital twins and
industrial IoT.
● Google IoT Core: Was simpler, but now discontinued—users are advised to migrate
to partners like Litmus or ClearBlade.
🧠 Summary of Key Takeaways
Topic Key Points
Business Focus on cost, compliance, vendor trust, data location, ecosystem.
Considerations
Technical Support for protocols, scalability, integration, device management.
Considerations
Dashboards Essential for real-time monitoring, control, and visualization of IoT
systems.
Platform AWS and Azure dominate; Google IoT Core is retired; choose
Comparison based on project size, tech stack, and vendor alignment.