Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Analytics for the Internet of Things (IoT)

You're reading from  Analytics for the Internet of Things (IoT)

Product type Book
Published in Jul 2017
Publisher Packt
ISBN-13 9781787120730
Pages 378 pages
Edition 1st Edition
Languages
Author (1):
Andrew Minteer Andrew Minteer
Profile icon Andrew Minteer

Table of Contents (20) Chapters

Title Page
Credits
About the Author
About the Reviewer
www.PacktPub.com
Customer Feedback
Preface
Defining IoT Analytics and Challenges IoT Devices and Networking Protocols IoT Analytics for the Cloud Creating an AWS Cloud Analytics Environment Collecting All That Data - Strategies and Techniques Getting to Know Your Data - Exploring IoT Data Decorating Your Data - Adding External Datasets to Innovate Communicating with Others - Visualization and Dashboarding Applying Geospatial Analytics to IoT Data Data Science for IoT Analytics Strategies to Organize Data for Analytics The Economics of IoT Analytics Bringing It All Together

Cloud security and analytics


You can build security into analytics using several methods supported by major cloud infrastructure providers.

Public/private keys

Cloud providers use asymmetric cryptography throughout their services. The public and private keys are generated. You keep the private key, so the service does not have a copy. The service holds the public key. Communication using public/private key is secure and has never been broken.

The cloud provider could publish the public key in tomorrow's newspaper and it would not matter; the encryption cannot be broken with just the public key. It may seem counterintuitive that a public key is used to encrypt data but cannot be used to decrypt it. But it works.

Every time you visit a website starting with HTTPS:, a public/private key encryption is being used. It is the basis of SSL and TLS encryption, which is employed for HTTPS communications.

You will use the public/private keys often for IoT analytics when you build secure processes. Think...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}