Unclouded Vision

  • Jon Crowcroft
  • Anil Madhavapeddy
  • Malte Schwarzkopf
  • Theodore Hong
  • Richard Mortier
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6522)

Abstract

Current opinion and debate surrounding the capabilities and use of the Cloud is particularly strident. By contrast, the academic community has long pursued completely decentralised approaches to service provision. In this paper we contrast these two extremes, and propose an architecture, Droplets, that enables a controlled trade-off between the costs and benefits of each. We also provide indications of implementation technologies and three simple sample applications that substantially benefit by exploiting these trade-offs.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I., Warfield, A.: Live migration of virtual machines. In: USENIX Symposium on Networked Systems Design & Implementation (NSDI), pp. 273–286. USENIX Association, Berkeley (2005)Google Scholar
  2. 2.
    Cuevas, R., Kryczka, M., Cuevas, A., Kaune, S., Guerrero, C., Rejaie, R.: Is content publishing in BitTorrent altruistic or profit-driven (July 2010), http://arxiv.org/abs/1007.2327
  3. 3.
    Cully, B., Lefebvre, G., Meyer, D.T., Karollil, A., Feeley, M.J., Hutchinson, N.C., Warfield, A.: Remus: High availability via asynchronous virtual machine replication. In: USENIX Symposium on Networked Systems Design & Implementation (NSDI). USENIX Association, Berkeley (April 2008)Google Scholar
  4. 4.
    Doctorow, C.: The Things that Make Me Weak and Strange Get Engineered Away. Tor.com (August 2008), http://www.tor.com/stories/2008/08/weak-and-strange
  5. 5.
    Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Fisher, R., Patton, B.M., Ury, W.L.: Getting to Yes: Negotiating Agreement Without Giving In. Houghton Mifflin (April 1992), http://www.amazon.com/exec/obidos/redirect?tag=citeulike07-20&path=ASIN/0395631246
  7. 7.
    Geambasu, R., Kohno, T., Levy, A., Levy, H.M.: Vanish: Increasing data privacy with self-destructing data. In: Proceedings of the USENIX Security Symposium (August 2009)Google Scholar
  8. 8.
    Guha, S., Reznichenko, A., Tang, K., Haddadi, H., Francis, P.: Serving Ads from localhost for Performance, Privacy, and Profit. In: Proceedings of Hot Topics in Networking (HotNets), New York, NY (October 2009)Google Scholar
  9. 9.
    Haddadi, H., Hui, P., Brown, I.: MobiAd: Private and scalable mobile advertising. In: Proceedings of MobiArch (to appear, 2010)Google Scholar
  10. 10.
    Leavitt, N.: Will nosql databases live up to their promise? Computer 43(2), 12–14 (2010), http://dx.doi.org/10.1109/MC.2010.58
  11. 11.
    Madhavapeddy, A., Mortier, R., Sohan, R., Gazagnaire, T., Hand, S., Deegan, T., McAuley, D., Crowcroft, J.: Turning down the LAMP: software specialisation for the cloud. In: HotCloud 2010: Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, p. 11. USENIX Association, Berkeley (2010)Google Scholar
  12. 12.
    Mortier, R.: et al.: The Personal Container, or Your Lif. In Bit. In: Proceedings of Digital Futures (October 2010)Google Scholar
  13. 13.
    Mortier, R., Madhavapeddy, A., Hong, T., Murray, D., Schwarzkopf, M.: Using Dust Clouds to enhance anonymous communication. In: Proceedings of the Eighteenth International Workshop on Security Protocols, IWSP (April 2010)Google Scholar
  14. 14.
    Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual network computing. IEEE Internet Computing 2(1), 33–38 (1998)CrossRefGoogle Scholar
  15. 15.
    Schwarzkopf, M., Hand, S.: Nimbus: Intelligent Personal Storage. Poster at the Microsoft Research Summer School 2010, Cambridge, UK (2010)Google Scholar
  16. 16.
    Shikfa, A., Önen, M., Molva, R.: Privacy in content-based opportunistic networks. In: AINA Workshops, pp. 832–837 (2009)Google Scholar
  17. 17.
    Su, J., Scott, J., Hui, P., Crowcroft, J., De Lara, E., Diot, C., Goel, A., Lim, M.H., Upton, E.: Haggle: Seamless networking for mobile applications. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol. 4717, pp. 391–408. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  18. 18.
    Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 10(5), 557–570 (2002)MathSciNetCrossRefMATHGoogle Scholar
  19. 19.
    Wolchok, S., Hofmann, O., Heninger, N., Felten, E., Halderman, J., Rossbach, C., Waters, B., Witchel, E.: Defeating vanish with low-cost sybil attacks against large DHTs. In: Proceedings of the 17th Network and Distributed System Security Symposium (NDSS), pp. 37–51 (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Jon Crowcroft
    • 1
  • Anil Madhavapeddy
    • 1
  • Malte Schwarzkopf
    • 1
  • Theodore Hong
    • 1
  • Richard Mortier
    • 2
  1. 1.Computer LaboratoryCambridge UniversityCambridgeUK
  2. 2.Horizon Digital Economy ResearchUniversity of NottinghamNottinghamUK

Personalised recommendations