ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Tussles for Edge Network Caching Patrick Poullie.

Slides:



Advertisements
Similar presentations
Security Challenges for Future Internet Design Cybertrust PI Meeting Breakout.
Advertisements

Socioeconomics knowledge cafe Wrap-up. Agreed the list of socioeconomic themes/issues that have dependencies with RWI research priorities Standardization.
Workshop on Telecommunications for Disaster Relief, February 2003, Geneva Dag Nielsen & Catherine Mulligan Ericsson Response WLAN in Disaster and.
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
1 Jin Li Microsoft Research. Outline The Upcoming Video Tidal Wave Internet Infrastructure: Data Center/CDN/P2P P2P in Microsoft Locality aware P2P Conclusions.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
The Case for Enterprise Ready Virtual Private Clouds Timothy Wood, Alexandre Gerber *, K.K. Ramakrishnan *, Jacobus van der Merwe *, and Prashant Shenoy.
1 Content Delivery Networks iBAND2 May 24, 1999 Dave Farber CTO Sandpiper Networks, Inc.
Tussle in cyberspace: Defining tomorrow ’ s internet (2002) D.Clark, J. Wroclawski, K. Sollins & R. Braden Presented by: Gergely Biczok (Slides in courtesy.
Dagstuhl Seminar, Germany, January, 2015
Confidentiality using Symmetric Encryption traditionally symmetric encryption is used to provide message confidentiality consider typical scenario –workstations.
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
1 Simultaneous Distribution Control and Privacy Protection for Proxy based Media Distribution George Mason University Songqing Chen (George Mason University)
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
Future Research Directions Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
1© Copyright 2015 EMC Corporation. All rights reserved. SDN INTELLIGENT NETWORKING IMPLICATIONS FOR END-TO-END INTERNETWORKING Simone Mangiante Senior.
Research on Key Technology in Grid Delivery Network Zhihui Lv Network & Information Engineer Center of Fudan university, ShangHai, China
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Content Delivery Networks. History Early 1990s sees 100% growth in internet traffic per year 1994 o Netscape forms and releases their first browser.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Geneva, Switzerland, 2 June 2014 Analysis of Caller ID delivery in China Hexian Huang CATR, China ITU Workshop on “Caller ID Spoofing”
Content Distribution March 8, : Application Layer1.
1/36. 2/36 Towards Sustained Scalability of Communication Networks Mike P. Wittie
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
UDgateway WAN Optimization. 1. Why UDgateway? All-in-one solution Value added services – Networking project requirements Optimize IP traffic on constrained.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
ICN Considerations for ISP’s Existing Networks Lichun Li, Xin Xu, Jun Wang, Zhenwu Hao {xu.xin18, wang.jun17,
Tussel in Cyberspace Based on Slides by I. Stoica.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
A Survey on Secure Cloud Data Storage ZENG, Xi CAI, Peng
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
© 2014 The SmartenIT Consortium 1 Commercial in Confidence Panel on “Cloud Federations and SDN/NFV: the highways towards improved QoE, Cost, and Energy.
AppFlux: EdgeBox-based Services for Apps Delivery and Distribution Ada Gavrilovska Georgia Institute of Technology 08/10/2015.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Beyond Data Security: how to build trust through.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 The Open and Trustworthy ICT Platform Prof. Dr.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Tussles for Edge Network Caching Patrick Poullie.
Crowds: Anonymity for Web Transactions Michael K. Reiter Aviel D. Rubin Jan 31, 2006Presented by – Munawar Hafiz.
Economic Incentives in Information- Centric Networking: Implications for Protocol Design and Public Policy Group Members: Muhammad Kamran Siddique Adel.
Distributed Authentication in Wireless Mesh Networks Through Kerberos Tickets draft-moustafa-krb-wg-mesh-nw-00.txt Hassnaa Moustafa
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Geneva, Switzerland, 17 October 2011 Summary of Session 4: SDP standardization status and requirements Huilan Lu, Ph.D. SG 13 Vice Chairman ITU Workshop.
PlanetLab Policies: Learning on the Job Larry Peterson Princeton University.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Integrating security in a quality aware multimedia delivery platform Paul Koster 21 november 2001.
Geneva, Switzerland, 11 June 2012 Socio-Economic Aware Design of Future Network Technology (Y.FNsocioeconomic) Martin Waldburger, University of Zurich,
Guidance for Running Multiple IPv6 Prefixes (draft-liu-v6ops-running-multiple-prefixes-02) Bing Liu, Sheng Jiang (Speaker), Yang Bo IETF91
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Application Architecture Internet Architecture David D. Clark MIT CSAIL September 2005.
ASSIGNMENT, DISTRIBUTION AND QOS PROVISIONING IN COMMUNICATION NETWORKS.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
3/12/2013Computer Engg, IIT(BHU)1 CLOUD COMPUTING-1.
1 Issues affecting the evaluation of the beneficial effect of new technologies and ways to solve these issues. Prof. Dr. Viliam Sarian, NAN RA Acad., Vice-Chairman.
Content Delivery Networks: Status and Trends Speaker: Shao-Fen Chou Advisor: Dr. Ho-Ting Wu 5/8/
Picturex Secures and Scales Event-Photo Sharing for Enterprise and Private Customers by Relying on the Powerful, Scalable Microsoft Azure Platform MICROSOFT.
Zentera Guardia Fabric ™ Securely Connects Client-Server Apps between Microsoft Azure, Enterprise Datacenters & Other Public Clouds MICROSOFT AZURE ISV.
Hosting Wide-Area Network Testbeds: Policy Considerations Larry Peterson Princeton University.
Resource Provisioning EGI_DS WP3 consolidation workshop, CERN Fotis Karayannis, GRNET.
1 ITM 5.1 Facility Juggling: Managing Load Balancing, Edge Locations, and Networks Shawn Mills.
Work Packages: 1. Technologies (combination of CSP and desalting technologies) 2. Water and Solar Energy Resources 3. Demand Side Scenario 4. CSP Market.
Private KEEP OFF! Private KEEP OFF! Open! What is a cloud? Cloud computing is a model for enabling convenient, on-demand network access to a shared.
Content Distribution Networks
Dan Bieler, Principal Analyst
1. Public Network - Each Rackspace Cloud Server has two networks
Tussles for Edge Network Caching
Bitcoin: A Peer-to-Peer Electronic Cash System
Moderator Mohamed M. K. Elhaj
EE 122: Lecture 22 (Overlay Networks)
Presentation transcript:

ITU Workshop on "Future Trust and Knowledge Infrastructure", Phase 1 Geneva, Switzerland, 24 April 2015 Tussles for Edge Network Caching Patrick Poullie Jr. Researcher Communication Systems Group University of Zurich,

© 2015 UZH, Contents  Investigated scenario  Tussle Analysis  Applied Tussle Analysis –Stakeholders and tussles for investigated scenario –Evolution of one tussle  Conclusions Slide 2 of 10

© 2015 UZH, Home routers Investigated Scenario Edge ISP End-users Internet Social Networks Slide 3 of 10 Traditional data delivery

© 2015 UZH, Nano data Centers (uNaDA) Investigated Scenario Edge ISP End-users Internet Social Networks Slide 3 of 10 Envisioned approach

© 2015 UZH, Tussle Analysis  Y.3013: Socio-economic Assessment of Future Networks by Tussle Analysis  Complementation of future network design and standardization by a socio-economic assessment –Analysis goal is to find satisfying outcome for all stakeholders  Developed in SG13 – WP3 – Question 16 –Environmental and socio-economic sustainability in future networks and early realization of future networks Slide 4 of 10

© 2015 UZH, Tussle Analysis’ Three Steps Step 1: Identify all affected stakeholders Step 3: Identify means stakeholders will take according to their interests and resulting interactions Step 2: Identify stakeholders’ interests and conflicts between these and means available to them tussle Tussle cannot be avoided by technology changes No Stakeholder can or wants to change the outcome Slide 5 of 10 Apply tussle analysis again for the changed ecosystem

© 2015 UZH, Scenario Stakeholders and Interests Internet –High QoS –Privacy –Energy and bandwidth compensation Internet Service Providers (ISP) –Reduce network load –Sell in-network caching ISP Cloud Service Providers (CSP) –Content control –Data mining –Ad placement Malicious users / data miners –Access to social content Slide 6 of 10 End- users

© 2015 UZH, Scenario Tussles  Content control –CSPs not want third parties to mine their data  End-user privacy –End-users not want third parties to access their private info  uNaDa deployment –End-users require compensation for hosting uNaDa  Change in peering traffic –uNaDas may serve users in other access networks –Increases traffic for ISPs with uNaDas!  Distribution of illegal content Slide 7 of 10

© 2015 UZH, Tussle Evolution Tussle: Content Control uNaDas cache only content that is accessible to its owner Tussle: End-user Privacy CSPs have sole control over content Content is served by traditional data centers End-users feel their privacy is protected 3. Parties can access content without permission End-users All content cached unencrypted CSP Malicious users / data miners uNaDs store encrypted content, keys are provided by servers End-users feel their privacy is not protected Less caching efficiency Slide 8 of 10

© 2015 UZH, Nano data Centers (uNaDA) Content Control and Privacy Solution Edge ISP Internet Social Networks Slide 9 of 10

© 2015 UZH, Conclusions  CSP needs to support uNaDa caching –Otherwise content is encrypted and cannot be cached  Open tussle: unwanted peering –Traffic may be reduced in general –At the cost of edge-ISP who “hosts” uNaDas  End-user compensation –By ISP or CSP  Promising approach –Caching content encrypted and handling keys centralized Slide 10 of 10

© 2015 UZH, Acknowledgements