Social Cloud Computing: A Vision for Socially Motivated Resource Sharing IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 5, NO. 4, OCTOBER- DECEMBER 2012.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Trust Management of Services in Cloud Environments:
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
SLA-Oriented Resource Provisioning for Cloud Computing
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
CLive Cloud-Assisted P2P Live Streaming
High Performance Computing Course Notes Grid Computing.
Lecture 13 Chapter 7 Managing Diverse IT Infrastructures.
CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
OASIS Reference Model for Service Oriented Architecture 1.0
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Fawaz Alsaadi Fahad Alsolmai.  Secure information sharing across different organizations is an emerging issue for collaborative software development,
Efficient agent-based selection of DiffServ SLAs over MPLS networks Thanasis G. Papaioannou a,b, Stelios Sartzetakis a, and George D. Stamoulis a,b presented.
Lecture 13 Chapter 7 Managing Diverse IT Infrastructures.
Cloud computing Tahani aljehani.
Security in Cloud Computing Presented by : Ahmed Alalawi.
Private Cloud: Application Transformation Business Priorities Presentation.
CLOUD COMPUTING. A general term for anything that involves delivering hosted services over the Internet. And Cloud is referred to the hardware and software.
Banking Clouds V International Youth Banking Forum.
CLOUD COMPUTING & COST MANAGEMENT S. Gurubalasubramaniyan, MSc IT, MTech Presented by.
Page  1 SaaS – BUSINESS MODEL Debmalya Khan DEBMALYA KHAN.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Secure Encounter-based Mobile Social Networks: Requirements, Designs, and Tradeoffs.
Cloud Models – Iaas, Paas, SaaS, Chapter- 7 Introduction of cloud computing.
EGI-Engage EGI-Engage Engaging the EGI Community towards an Open Science Commons Project Overview 9/14/2015 EGI-Engage: a project.
A Cloud is a type of parallel and distributed system consisting of a collection of inter- connected and virtualized computers that are dynamically provisioned.
Social Cloud Computing: A Vision for Socially Motivated Resource Sharing 作者 :Kyle Chard, Kris Bubendorfer, Simon Caton, Omer F. Rana 報告者 : 饒展榕.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
Privacy-Preserving Public Auditing for Secure Cloud Storage
Project Presentation Students: Yan Michalevsky Asaf Cidon Supervisors: Alexander Shraer Assoc. Prof. Idit Keidar.
Yongzhi Wang, Jinpeng Wei VIAF: Verification-based Integrity Assurance Framework for MapReduce.
The Market Economy Part 1 (Adam Smith) 1234 The Market Economy Part 2 (Characteristics) Specialization Entrepreneurs
Improving Network I/O Virtualization for Cloud Computing.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY License4Grid: Adopting DRM for Licensed.
Protecting Sensitive Labels in Social Network Data Anonymization.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
A semi autonomic infrastructure to manage non functional properties of a service Pierre de Leusse Panos Periorellis Paul Watson Theo Dimitrakos UK e-Science.
 Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over a network (typically the Internet). 
Objectives Functionalities and services Architecture and software technologies Potential Applications –Link to research problems.
This document is an OASIS SAF TC Working Draft. It does not reflect the views of the OASIS SAF TC or of OASIS Cloud Management Challenge Human experts.
1 NETE4631 Course Wrap-up and Benefits, Challenges, Risks Lecture Notes #15.
Introduction The network is the computer By Waseem Anwar Chaudhri.
Manager ethics Responsible Management and the Responsible Business Enterprise Slovak University of Technology Faculty of Material Science and Technology.
Job scheduling algorithm based on Berger model in cloud environment Advances in Engineering Software (2011) Baomin Xu,Chunyan Zhao,Enzhao Hua,Bin Hu 2013/1/251.
Legitimate Vulnerability Markets By: Jeff Wheeler.
1 NETE4631 Network Information Systems : Introduction to Cloud Computing Lecture Notes #2.
RESERVOIR RESERVOIR Resources and Services Virtualization without Barriers Philippe Massonet (CETIC)
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
E-Commerce Systems Chapter 8 Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
June 12, 2016CITALA'121 Cloud Computing Technology For Large Scale and Efficient Arabic Handwriting Recognition System HAMDI Hassen, KHEMAKHEM Maher
INTRODUCTION TO GRID & CLOUD COMPUTING U. Jhashuva 1 Asst. Professor Dept. of CSE.
Chapter 7 Managing Diverse IT Infrastructures
Chapter 6: Securing the Cloud
Understanding The Cloud
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
Internet Interconnection
Cloud computing mechanisms
Multithreaded Programming
Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware Kriti shreshtha.
Presentation transcript:

Social Cloud Computing: A Vision for Socially Motivated Resource Sharing IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 5, NO. 4, OCTOBER- DECEMBER 2012 Kyle Chard, Member, IEEE, Kris Bubendorfer, Member, IEEE, Simon Caton, Member, IEEE, and Omer F. Rana, Member, IEEE 2013/2/1

outline Introduction Social Cloud Computing Application Scenarios The Social Storage Cloud Evaluation Conclusion Vision And Future Work

Introduction relationships in social networks are often based on real world relationships This paper defines Social Cloud computing, outlining various aspects of Social Clouds, and demonstrates the approach using a social storage cloud implementation in Facebook

Social Cloud Computing Social Cloud overlay in a social network. Three different Social Clouds are illustrated to highlight the use of relationships when establishing Social Clouds Facebook has recently recognized the need for the creation of such groups and allows users to differentiate between, for example, close friends and colleagues

Trust and Risk At present, none of the major social networks are able to provide guarantees about the realworld identity associated with a user profile Social correction through incentives encourages good behavior without external enforcement A Social Cloud must leverage social incentives to create ad hoc clouds without incurring the overhead of complex enforcement processes The level of risk must also be considered within a Social Cloud

Resource Trading A resource could therefore encompass people, information, computing capacity, or software licenses—hence, a resource provides a particular capability that is of use to other members of a group or community To participate in a Social Cloud, each user must allocate a certain amount of their resources to be used by others. The sharing is controlled (or regulated) by a socially oriented market place which adapts common allocation protocols to a social context

Resource Trading Motivation for Contribution -Extrinsic motivation : by an external reward (e.g., money) -Intrinsic motivation : Satisfaction obtained from the task itself rather than the rewards or benefits Compensation and Fairness Social Capital: investment in social relationships with expected returns

Social Market Metaphors and Protocols The Social Marketplace is at the core of the Social Cloud and is used to regulate sharing within a group Capability sharing in a Social Cloud. Users contribute resources or capabilities in exchange for asymmetric resources contributed by “friends”

Social Market Metaphors and Protocols The marketplace is tasked with allocating resources between peers according to predefined economic or noneconomic protocols A Social Marketplace contains a set of market protocols tasked with determining the most appropriate allocation given to a particular user request

Examples of common protocols include: Volunteer Trophy Reciprocation Reputation Posted price Auction/tender Spot price

Provision of the Trading Infrastructure The host infrastructure for a Social Cloud could be provisioned in multiple ways -for example, it could be provided externally (i.e., outsourced to an external vendor) or internally by the members themselves A co-op is a business owned and operated by a community for the mutual benefit of the community -(e.g., community managed grocery stores and credit unions) Social Cloud co-op alleviates the expense involved in outsourcing the infrastructure and it can also scale with the size of the community as all members contribute infrastructure to the cloud

Provision of the Trading Infrastructure The limitation with a co-op is the potential for malicious behavior In a competitive economy with considerable resources available these incentives may not guarantee the behavior of the market and its participants There are various ways to establish trust in a particular market service operating in an untrusted environment for example: using reputation, encryption, or threshold trust One of the best techniques is the use of secure economic protocols which, through encryption and distribution are able to provide guarantees over market execution and economic privacy

Application Scenarios A social computation cloud A social storage cloud A social collaborative cloud A Social Cloud for public science An enterprise Social Cloud

The Social Storage Cloud a web service-based social storage cloud has been developed and deployed as a Facebook application In the social storage cloud, two economic markets have been created -posted price market -reverse auction Social Cloud architecture. Users register shared services, their friends are then able to provision and use these resources through the social storage cloud application. Allocation is conducted by the underlying market infrastructure(s)

Registration Registration in a Social Cloud. For brevity, the diagram assumes the user has been authenticated

Social Marketplace: Posted Price Posted Price marketplace in a Social Cloud. For brevity, the diagram assumes the user has been authenticated

Social Marketplace: Auctions Auction marketplace in a Social Cloud. For brevity, the diagram assumes the user has been authenticated and also excludes the actions taken to find the users’ ID, retrieve the users’ friends, instantiate the cloud service, and transfer credits

Evaluation The following experiments focus on the scalability and performance of the two social marketplaces and the feasibility of the proposed co-op infrastructure it is assumed an average Facebook user has 130 friends The market-based experiments are run on a single server running Windows Vista with a 2.2 GHz Dual Core processor and 2 GB memory Bidders are hosted in a virtualized environment containing 5, 3.0 GHz Core 2 Duo machines each with 4 GB RAM

Evaluation Time taken to retrieve service metadata from MDS with different amounts of container memory Time to select a subset of the registered service metadata from MDS with increasing number of total registrations

Evaluation Auction throughput. Number of auctions completed per minute for an increasing number of bidders

Reflective Analysis In practice the use of SLAs or “contracts” between participants involved in resource sharing within a social context may not be necessary In practice the use of SLAs or “contracts” between participants involved in resource sharing within a social context may not be necessary This is primarily due to the existing level of trust that already exists between participants within a social network, However, if a social network involves sharing between participants with varying degrees of trust, an SLA would be a useful capability to support

Reflective Analysis Supplying infrastructure to a Social Cloud is seen as one of the major hurdles for the creation of a stable Social Cloud due to the reliance on the goodwill of the participants However, a co-op market model can overcome this limitation due to the minimal overhead of the individual allocation services—even when hosting a complex auction process Moreover, a co-op does not necessarily rely entirely on social incentives as trustworthy protocols can be used to provide fairness guarantees

Conclusion This paper has presented the vision of Social Cloud computing, an amalgamation of cloud computing and social networking A Facebook-based social storage cloud has been developed and deployed The social storage cloud supports storage trading through a two protocol social marketplace A credit-based trading approach has been adopted to discourage free loading the overhead of the Social Cloud services was shown to be small under realistic load conditions, thereby verifying the assertion that a co-op model can be employed to enable a scalable self-contained Social Cloud

Vision And Future Work Social Cloud ought to have low barriers for participation—and therefore vastly increase public access to computing, storage, and services A Social Cloud should allow overlapping groups—with members belonging to multiple groups and thereby (to a limited extent) permit the osmosis of resources across groups based on the social relationships and standing of other members However, the most critical characteristic is that a Social Cloud uses social relationships to ensure desirable behavior within the system

Vision And Future Work One major area of future work is adapting the market protocols to a social context and also looking at other ways to define and exploit social incentives (and disincentives) in a resource sharing scenario Use in adapted scenarios In particular, we aim to explore system performance and user interactions on a much larger scale

The end