COREbeat Technology Pillars, a short intro

A short intro of

COREbeat Technology Pillars


Authors: Georgios Fiotakis, Nikos Monios, Andreas I. Mantelos, Dr Apostolos Chondronasios

26th September 2022


The COREbeat platform brings together cutting-edge technologies to facilitate easy deployment, security, and unparalleled accuracy. But what are those technologies exactly?

 

Here, we take a closer look at the technologies involved and the outline of COREbeat’s architecture.

The beatBox, which lies at the ‘Edge’, makes up the physical entity of the COREbeat platform. Looking past the controversy about the definition of ‘Edge’ in the Industry 4.0 era, we position the ‘Edge’ at the location/point where data are generated. At this ‘Edge’, we place an efficient computing hardware device (beatBox) able to acquire, process, communicate and even infer predictions. This way, the beatBoxes acquire vibration and temperature signals at the asset level using our own sensing module in sync with our in-house deep learning algorithms. The signals are transformed, packed, and securely transmitted using message broker and data streaming technologies to CORE Innovation’s own cloud platform.

The main goal of COREbeat’s cloud platform is to receive, persist, analyze, and distribute vast amounts of high-volume heterogeneous data in real-time between physically different computation environments, tailored towards Industry 4.0. The COREbeat platform exists within a hybrid computation environment composed of public (AWS, Azure, GCP, etc.), private, and IoT clouds, leveraging different benefits such as scalability, robustness, security and real-time computation.

Following the latest technology trends on cloud computing and orchestration, we are leveraging Kubernetes to construct an environment that allows us to manage and deploy our applications and services seamlessly and securely. The nature of our services demands us to utilize the modern software architecture paradigms. The COREbeat platform is designed based on a microservices architecture (MSA), an event driven architecture (EDA), while data persistence is achieved by a scalable data warehouse solution that will keep your data safe and always available.

To secure a platform such as this, we have considered and deployed machine (M2M) and human-to-machine (H2M) interactions. The COREbeat platform employs certificates, generated and assigned to each device. It uses an asymmetric encryption mechanism to secure end-to-end communication channels, while on a higher level, exposure of our services is secured through reverse proxies. Users and organizations need to be certain that their data are securely stored and distributed across their applications. A key security feature is the authentication & authorization of a platform’s users, which we implemented based on the OAuth 2.0 protocol. Although, there are considerably more practices for security used in different layers and locations throughout our architecture, these will be further explored in a dedicated instalment of our blog soon. Stay tuned!  

 
Previous
Previous

COREbeat front-end design and why we chose React

Next
Next

CORE's technical results in the iQonic project