Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Analytics for the Internet of Things (IoT)

You're reading from   Analytics for the Internet of Things (IoT) Intelligent analytics for your intelligent devices

Arrow left icon
Product type Paperback
Published in Jul 2017
Publisher Packt
ISBN-13 9781787120730
Length 378 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
Andrew Minteer Andrew Minteer
Author Profile Icon Andrew Minteer
Andrew Minteer
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Defining IoT Analytics and Challenges 2. IoT Devices and Networking Protocols FREE CHAPTER 3. IoT Analytics for the Cloud 4. Creating an AWS Cloud Analytics Environment 5. Collecting All That Data - Strategies and Techniques 6. Getting to Know Your Data - Exploring IoT Data 7. Decorating Your Data - Adding External Datasets to Innovate 8. Communicating with Others - Visualization and Dashboarding 9. Applying Geospatial Analytics to IoT Data 10. Data Science for IoT Analytics 11. Strategies to Organize Data for Analytics 12. The Economics of IoT Analytics 13. Bringing It All Together

Cloud security and analytics

You can build security into analytics using several methods supported by major cloud infrastructure providers.

Public/private keys

Cloud providers use asymmetric cryptography throughout their services. The public and private keys are generated. You keep the private key, so the service does not have a copy. The service holds the public key. Communication using public/private key is secure and has never been broken.

The cloud provider could publish the public key in tomorrow's newspaper and it would not matter; the encryption cannot be broken with just the public key. It may seem counterintuitive that a public key is used to encrypt data but cannot be used to decrypt it. But it works.

Every...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime