Tussles for Edge Network Caching

Slides:



Advertisements
Similar presentations
Tussle in cyberspace: Defining tomorrow ’ s internet (2002) D.Clark, J. Wroclawski, K. Sollins & R. Braden Presented by: Gergely Biczok (Slides in courtesy.
Advertisements

By: Kathleen Walters CLOUD COMPUTING Definition Cloud computing allows multiple computers to connect to one main network. Instead of installing different.
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Tussles for Edge Network Caching Patrick Poullie.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
Tussel in Cyberspace Based on Slides by I. Stoica.
Cloud Computing.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
Tussle in cyberspace: Defining tomorrow’s internet D.Clark, J.Wroclawski, K.Sollins, R.Braden Presenter: Baoning Wu.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Tussles for Edge Network Caching Patrick Poullie.
Economic Incentives in Information- Centric Networking: Implications for Protocol Design and Public Policy Group Members: Muhammad Kamran Siddique Adel.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Geneva, Switzerland, 11 June 2012 Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic) Martin Waldburger, University of Zurich,
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Post IPv4 “completion” Making IPv6 incrementally deployable by making it backward compatible with IPv4. Alain Durand.
Microsoft Cloud Solution.  What is the cloud?  Windows Azure  What services does it offer?  How does it all work?  How to go about using it  Further.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
A Seminar On. What is Cloud Computing? Distributed computing on internet Or delivery of computing service over the internet. Eg: Yahoo!, GMail, Hotmail-
Lecture 6: Cloud Computing
BUILD SECURE PRODUCTS AND SERVICES
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Chapter 6: Securing the Cloud
Avenues International Inc.
By: Raza Usmani SaaS, PaaS & TaaS By: Raza Usmani
Conflict Resolution & Policy Compliance in Multi-Cloud Distributed System. Presented By:- Adarsh Pillay Deepak Begrajka Rudra gupta.
Go LNG LNG Value Chain for Clean Shipping, Green Ports and Blue Growth in Baltic Sea Region.
Network Cost Services for Network-Aware FI Applications
Content Distribution Networks
Chapter Six Cloud Computing
New Heights by Guiding Them into the Cloud
Renewable energy supply chains
1. Public Network - Each Rackspace Cloud Server has two networks
Hosted on Azure, LoginRadius’ Customer Identity
Nimble Streamer Helps Media Content Providers Create Streaming Networks Cost-Effectively and Easily by Utilizing Azure’s Worldwide Scalability MICROSOFT.
Cloud Computing By P.Mahesh
Veeam Backup Repository
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Introduction to Cloud Computing
Cloud Computing.
Advanced Security Architecture for System Engineers Cisco Dumps Get Full Exam Info From: /cisco-question-answers.html.
NGAGE Intelligence Leverages Microsoft Azure Platform to Provide Essential Analytics for Hybrid SharePoint Server/Office 365 Environments MICROSOFT AZURE.
CNIT131 Internet Basics & Beginning HTML
CLOUD COMPUTING SECURITY
Mobile edge computing Report by Weiqing huang.
Interlake Hybrid Cloud Management Suite
Network Optimizer Optimize Your Business & Cloud Networks
Secure and Private Event-Photo Sharing Made Scalable and Reliable Thanks to Microsoft Azure “With Microsoft we found a good partner we trust, and with.
Built on the Powerful Microsoft Azure Platform, the SiouxApp “Project-Server” Helps to Manage Projects and More with App Enhancement Tools MICROSOFT AZURE.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
MARMIND’s New Service Delivers a Single Centralized Marketing Plan That Connects Teams, Campaigns and Outcomes by Using the Power of the Azure Platform.
Summary of ITU Workshop on “Developments regarding telecommunication network architectures and services” Kampala 2 April 2012.
EnMS Polska Builds energyBIS on Microsoft Azure to Ensure a Scalable and Secure Energy Efficiency Monitoring and Management System MICROSOFT AZURE ISV.
Keep Your Digital Media Assets Safe and Save Time by Choosing ImageVault to be Your Digital Asset Management Solution, Hosted in Microsoft Azure Partner.
One-Stop Shop Manages All Technical Vendor Data and Documentation and is Globally Deployed Using Microsoft Azure to Support Asset Owners/Operators MICROSOFT.
Media365 Portal by Ctrl365 is Powered by Azure and Enables Easy and Seamless Dissemination of Video for Enhanced B2C and B2B Communication MICROSOFT AZURE.
AIMS for BizTalk, Built on the Microsoft Azure Platform, Empowers Enterprises to Automate Insight and Analytics and Boost Value Creation MICROSOFT AZURE.
Emerging technologies-
Guarantee Hyper-V, System Center Performance and Autoscale to Microsoft Azure with Application Performance Control System from VMTurbo MICROSOFT AZURE.
Fundamental Concepts and Models
Session I Cloud Introduction Session I
Dynamic WAN Selection Optimize Your Business & Cloud Networks
EE 122: Lecture 22 (Overlay Networks)
Zendos Tecnologia Utilizes the Powerful, Scalable
Introduction to e-Business Chapter 1
System Center Configuration Manager Cloud Services – Cloud Distribution Point Presented By: Ginu Tausif.
Cloud Computing for Wireless Networks
Presentation transcript:

Tussles for Edge Network Caching ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Tussles for Edge Network Caching Patrick Poullie Jr. Researcher Communication Systems Group University of Zurich, poullie@ifi.uzh.ch

Contents Investigated scenario Tussle Analysis Applied Tussle Analysis Stakeholders and tussles for investigated scenario Evolution of one tussle Conclusions Slide 2 of 10

Investigated Scenario Traditional data delivery Internet Social Networks Edge ISP Home routers User controlled uNaDa home router with custom software and storage Energy efficiency Social content: more complex in terms of caching compared to pure multi-media platform content Goal: traffic reduction and QoS increase End-users Slide 3 of 10

Investigated Scenario Envisioned approach Internet Social Networks Edge ISP Nano data centers End-users Slide 3 of 10

Tussle Analysis Y.3013: Socio-economic Assessment of Future Networks by Tussle Analysis Complementation of future network design and standardization by a socio-economic assessment Analysis goal is to find satisfying outcome for all stakeholders Developed in SG13 – WP3 – Question 16 Environmental and socio-economic sustainability in future networks and early realization of future networks Slide 4 of 10

Tussle Analysis’ Three Steps Step 1: Identify all affected stakeholders Step 2: Identify stakeholders’ interests and conflicts between these and means available to them tussle tussle tussle Step 3: Identify means stakeholders will take according to their interests and resulting interactions 1. All stakeholders of this functionality derive a payoff that is considered fair (and have no means to increase their payoff), wherefore they will not take means to change the outcome (i.e., step 3.c does not need to be applied) and thus the tussle will not evolve further, and; 2. No stakeholder of another technology, who was receiving a fair payoff before, gets an unfair payoff after this tussle equilibrium has been reached (i.e., step 3.c does not need to be applied). No Stakeholder can or wants to change the outcome Tussle cannot be avoided by technology changes Slide 5 of 10

Scenario Stakeholders and Interests Malicious users / data miners Internet Service Providers Reduce network load Sell in-network caching Access to social content Internet ISP Cloud Service Provider (CSP) Reduce NW load particularly at peering points High QoS Privacy energy and bandwidth utilization Content control Data mining Ad placement End- users Slide 6 of 10

Scenario Tussles Content control End-user privacy uNaDa deployment CSPs not want third parties to mine their data End-user privacy End-users not want third parties to access their private info uNaDa deployment End-users require compensation for hosting uNaDa Change in peering traffic uNaDas may serve users in other access networks Increases traffic for ISPs with uNaDas! Distribution of illegal content Slide 7 of 10

Tussle Evolution (1) uNaDas get deployed and store content unencrypted High traffic savings for CSPs and ISPs Low content control for CSPs End-users protest due to privacy loss and demand Thus, uNaDas only store content accessible to owner Comprehensible privacy concept (RFC 7234 not applicable) Decreases caching efficiency CSPs distribute encrypted content to uNaDas and handle keys centralized Regain content control User privacy ensured High caching efficiency Slide 8 of 10

Tussle Evolution (2) Content Control Tussle: End-user Privacy Tussle: uNaDs store encrypted content, keys are provided by servers Content is served by traditional data centers CSP CSPs have sole control over content More control but less caching efficiency Content Control Tussle: All content cached unencrypted 3. Parties can access content without permission Malicious users / data miners End-users feel their privacy is protected End-users End-user Privacy Tussle: uNaDas cache only content that is accessible to its owner End-users feel their privacy is not protected Malicious users / data miners Regulator intervenes Slide 9 of 10

Conclusions CSP need to support uNaDas Otherwise content cannot be cached Access providers need to support uNaDas Else end-users can not be compensated for installing them Open tussle: unwanted peering Promising approach Caching content encrypted and handling keys centralized One set of keys for each user and privacy level Because of TA we know this now Slide 10 of 10

Acknowledgements