skip to main content
10.1145/3210240.3226062acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
extended-abstract

Decentralised Edge-Computing and IoT through Distributed Trust

Published:10 June 2018Publication History

ABSTRACT

The emerging Internet of Things needs edge-computing - this is an established fact. In turn, edge computing needs infrastructure decentralisation. What is not necessarily established yet is that infrastructure decentralisation needs a distributed model of Internet governance and decentralised trust schemes. We discuss the features of a decentralised IoT and edge-computing ecosystem and list the components that need to be designed, as well the challenges that need to be addressed.

References

  1. {n. d.}. Blockstack: The New Decentralised Internet. ({n. d.}). https://blockstack.org/Google ScholarGoogle Scholar
  2. {n. d.}. Golem Network. ({n. d.}). https://golem.network/Google ScholarGoogle Scholar
  3. {n. d.}. iExec Network: Blockchain-Based Decentralized Cloud Computing. ({n.d.}). https://iex.ec/Google ScholarGoogle Scholar
  4. {n. d.}. IPFS: Interplanetary File System. ({n. d.}). https://ipfs.ioGoogle ScholarGoogle Scholar
  5. {n. d.}. MaidSafe Network. ({n. d.}). https://maidsafe.net/Google ScholarGoogle Scholar
  6. {n. d.}. SONM: Decentralized Fog Computing Platform. ({n. d.}). https://sonm.com/Google ScholarGoogle Scholar
  7. {n.d.}. StorJ: Distributed Cloud Storage. ({n. d.}). https://storj.ioGoogle ScholarGoogle Scholar
  8. Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, and George Danezis. 2018. Chainspace: A Sharded Smart Contracts Platform. In In Proceedings of the Network and Distributed System Security Symposium (NDSS).Google ScholarGoogle Scholar
  9. Mustafa Al-Bassam, Alberto Sonnino, Michal Król, and Ioannis Psaras. 2018. Airtnt: Fair Exchange Payment for Outsourced Secure Enclave Computations. (2018).Google ScholarGoogle Scholar
  10. O. Ascigil, T. K. Phan, A. G. Tasiopoulos, V. Sourlas, I. Psaras, and G. Pavlou. 2017. On Uncoordinated Service Placement in Edge-Clouds. In 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). 41--48.Google ScholarGoogle Scholar
  11. E. Bastug, M. Bennis, and M. Debbah. 2014. Living on the edge: The role of proactive caching in 5G wireless networks. IEEE Communications Magazine 52, 8 (Aug 2014), 82--89.Google ScholarGoogle ScholarCross RefCross Ref
  12. Amir Chaudhry, Jon Crowcroft, Heidi Howard, Anil Madhavapeddy, Richard Mortier, Hamed Haddadi, and Derek McAuley. 2015. Personal Data: Thinking Inside the Box. In Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives (AA '15). Aarhus University Press, 29--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Sarah Clinch et al. 2012. How close is close enough? Understanding the role of cloudlets in supporting display appropriation by mobile users. In PerCom. IEEE.Google ScholarGoogle Scholar
  14. Patricia Takako Endo et al. 2011. Resource allocation for distributed cloud: concepts and research challenges. IEEE Network 25, 4 (2011).Google ScholarGoogle Scholar
  15. Scott Hendrickson, Stephen Sturdevant, Tyler Harter, Venkateshwaran Venkataramani, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. 2016. Serverless Computation with openLambda. In Proceedings of the 8th USENIX Conference on Hot Topics in Cloud Computing (HotCloud'16). USENIX Association, Berkeley, CA, USA, 33--39. http://dl.acm.org/citation.cfm?id=3027041.3027047 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A-Long Jin et al. 2016. Auction mechanisms toward efficient resource sharing for cloudlets in mobile cloud computing. Transactions on Services Computing (2016).Google ScholarGoogle Scholar
  17. Michal Krol and Ioannis Psaras. 2017. NFaaS: Named Function as a Service. In ACM ICN'17. ACM, 1--11. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Michal Krol and I. Psaras. 2018. Secure Payments for Outsourced Computations. In 2018 NDSS Workshop on Decentralised IoT Security and Standards.Google ScholarGoogle Scholar
  19. D. Kutscher and et al. {n. d.}. RFC 7927: Information-Centric Networking (ICN) Research Challenges. ({n. d.}). https://tools.ietf.org/html/rfc7927Google ScholarGoogle Scholar
  20. Joshua Lind, Ittay Eyal, Peter R. Pietzuch, and Emin Gün Sirer. 2016. Teechan: Payment Channels Using Trusted Execution Environments. CoRR abs/1612.07766 (2016). arXiv:1612.07766 http://arxiv.org/abs/1612.07766Google ScholarGoogle Scholar
  21. Anil Madhavapeddy, Thomas Leonard, Magnus Skjegstad, Thomas Gazagnaire, David Sheets, et al. {n. d.}. Jitsu: Just-In-Time Summoning of Unikernels.. In NSDI, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Anil Madhavapeddy and David J. Scott. 2013. Unikernels: Rise of the Virtual Library Operating System. Queue 11, 11 (2013). Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Ioannis Psaras, Onur Ascigil, Sergi Rene, George Pavlou, Alex Afanasyev, and Lixia Zhang. 2018. Mobile Data Repositories at the Edge. In Proceedings of the 1st USENIX Workshop on Hot Topics in Edge Computing (HotEdge'18).Google ScholarGoogle Scholar
  24. I. Psaras, W. K. Chai, and G. Pavlou. 2014. In-Network Cache Management and Resource Allocation for Information-Centric Networks. IEEE Transactions on Parallel and Distributed Systems 25, 11 (Nov 2014), 2920--2931.Google ScholarGoogle ScholarCross RefCross Ref
  25. C. A. Sarros, S. Diamantopoulos, S. Rene, I. Psaras, A. Lertsinsrubtavee, C. Molina-Jimenez, P. Mendes, R. Sofia, A. Sathiaseelan, G. Pavlou, J. Crowcroft, and V. Tsaoussidis. 2018. Connecting the Edges: A Universal, Mobile-Centric, and Opportunistic Communications Architecture. IEEE Communications Magazine 56, 2 (Feb 2018), 136--143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Mahadev Satyanarayanan et al. 2009. The case for VM-based cloudlets in mobile computing. Pervasive Computing (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. E. M. Schooler, D. Zage, J. Sedayao, H. Moustafa, A. Brown, and M. Ambrosin. 2017. An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS). 1717--1728.Google ScholarGoogle Scholar
  28. Manolis Sifalakis, Basil Kohler, Christopher Scherb, and Christian Tschudin. 2014. An information centric network for computing the distribution of computations. In ACM ICN'14. 137--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Jake Swearingen. 2018. http://nymag.com/selectall/2018/03/when-amazon-web-services-goes-down-so-does-a-lot-of-the-web.html. (2018).Google ScholarGoogle Scholar
  30. Argyrios G. Tasiopoulos, Onur Ascigil, Ioannis Psaras, and George Pavlou. 2018. Edge-MAP: Auction Markets for Edge Resource Provisioning. In WoWMoM'18. IEEE.Google ScholarGoogle Scholar
  31. Tim Verbelen et al. 2012. Cloudlets: Bringing the cloud to the mobile user. In Mobile cloud computing and services workshop. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Wikipedia. {n. d.}. Distributed Autonomous Organisations. ({n. d.}). https://en.wikipedia.org/wiki/Decentralized_autonomous_organizationGoogle ScholarGoogle Scholar
  33. G. Xylomenos, C. N. Ververidis, V. A. Siris, N. Fotiou, C. Tsilopoulos, X. Vasilakos, K. V. Katsaros, and G. C. Polyzos. 2014. A Survey of Information-Centric Networking Research. IEEE Communications Surveys Tutorials 16, 2 (Second 2014), 1024--1049.Google ScholarGoogle ScholarCross RefCross Ref
  34. Lixia Zhang, Alexander Afanasyev, Jeffrey Burke, Van Jacobson, kc claffy, Patrick Crowley, Christos Papadopoulos, Lan Wang, and Beichuan Zhang. 2014. Named Data Networking. SIGCOMM Comput. Commun. Rev. 44, 3 (July 2014), 66--73.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. M. Zhang, H. Luo, and H. Zhang. 2015. A Survey of Caching Mechanisms in Information-Centric Networking. IEEE Communications Surveys Tutorials 17, 3 (thirdquarter 2015), 1473--1499.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Decentralised Edge-Computing and IoT through Distributed Trust

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              MobiSys '18: Proceedings of the 16th Annual International Conference on Mobile Systems, Applications, and Services
              June 2018
              560 pages
              ISBN:9781450357203
              DOI:10.1145/3210240

              Copyright © 2018 Owner/Author

              Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 10 June 2018

              Check for updates

              Qualifiers

              • extended-abstract
              • Research
              • Refereed limited

              Acceptance Rates

              Overall Acceptance Rate274of1,679submissions,16%

              Upcoming Conference

              MOBISYS '24

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader