Trustworthy Opportunistic Access to the Internet of Services
Nowadays web services pervade the network experience of the users. Indeed, most of our activities over the internet consist in accessing remote services and interact with them. Clearly, this can happen only when two elements are available: (i) a compatible device and (ii) a suitable network connection. The recent improvement of the computational capabilities of mobile devices, e.g., tablets and smartphones, seriously mitigated the first aspect. Instead, the inappropriateness, or even the absence, of connectivity is still a major issue.
Although mobile, third generation (3G) networks can provide basic connectivity, complex interactions with web services often require different levels of Quality of Service (QoS). Also, 3G connectivity is only available in certain areas, e.g., user’s country, and purchasing temporary connection abroad can be very costly. These costs weigh down on the original service price, seriously impacting the web service business model.
In this paper we describe the problems arising when considering the orchestration of service-oriented opportunistic networks and we present the assumptions that we want to consider in our context. We claim that our model is realistic mainly for two reasons: (i) we consider state-of-the-art technology and technical trends and (ii) we refer to a concrete problem for service providers.
- 1.Armando, A., Costa, G., Merlo, A.: Formal modeling and reasoning about the Android security framework. In: Proc. of 7th International Symposium on Trustworthy Global Computing (2012) (to appear)Google Scholar
- 2.Baier, C., Katoen, J.-P.: Principles of Model Checking (Representation and Mind Series). The MIT Press (2008)Google Scholar
- 3.Bartoletti, M., Degano, P., Ferrari, G., Zunino, R.: Local policies for resource usage analysis. ACM Transactions on Programming Languages and Systems, TOPLAS 31(6), 23 (2009)Google Scholar
- 6.Boyd, S., Ghosh, A., Prabhakar, B., Shah, D.: Gossip algorithms: Design, analysis and applications. In: Proceedings of IEEE INFOCOM, pp. 1653–1664 (2005)Google Scholar
- 7.Clarke Jr., E.M., Grumberg, O., Peled, D.A.: Model checking. MIT Press, Cambridge (1999)Google Scholar
- 9.Pfaff, B., et al.: OpenFlow Switch Specification. OpenFlow (February 2011), http://www.openflow.org/documents/openflow-spec-v1.1.0.pdf
- 10.Gasti, P., Merlo, A., Ciaccio, G., Chiola, G.: On the integrity of network coding-based anonymous p2p file sharing networks. In: Proceedings of the 2010 Ninth IEEE International Symposium on Network Computing and Applications, NCA 2010, pp. 192–197. IEEE Computer Society, Washington, DC (2010)Google Scholar
- 15.Tootoonchian, A., Ganjali, Y.: Hyperflow: a distributed control plane for openflow. In: Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking, pp. 3–9. USENIX Association, Berkeley (2010)Google Scholar