1 / 10

Droplets:- Condensing the Cloud

Droplets:- Condensing the Cloud. Jon Crowcroft, http://www.cl.cam.ac.uk/~jac22. From the Cloud…. The cloud has its risks…. Centralisation of PII. What if Provider goes broke Lose all your family photos Assets sold to another (unknown) provider In a large organisation,

sadie
Download Presentation

Droplets:- Condensing the Cloud

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Droplets:- Condensing the Cloud Jon Crowcroft, http://www.cl.cam.ac.uk/~jac22

  2. From the Cloud… • The cloud has its risks…

  3. Centralisation of PII • What if • Provider goes broke • Lose all your family photos • Assets sold to another (unknown) provider • In a large organisation, • There will always be someone bad • Who can datamine • Identity theft • And worse

  4. To Droplets • At the other extreme…

  5. A fully decentralised approach… • Can obviate cloud risks • But introduces complexity • Management overhead (p2p/manet/dtn) • Availability/resilience • Total data loss if device stolen • Can we compromise • Between extreme centralisation… • And extreme decentralisation?

  6. Via extraction • Firstly, we need to pull/push data • From/to the cloud…

  7. …and condensation

  8. Replication/Decentralisation are necessary, but not sufficient… • Need to encrypt data • Both in Cloud • And in Mist • The mist is a collection of droplets - • small objects with key/capability • and auditor • What about cloud business models? • Use privacy preserving advertising (MPI) • Use k-anonymity and threshold security • Use differential privacy for market research

  9. Implementation Details

  10. To Conclude… • Use contributed resources are fine • Home hub, phone, etc • But need to unify with cloud • Do so at API level • Have both decentralised and central • Advantages of both • Low latency access to home/pocket • High resilience in cloud • No loss of privacy if bad cloud/pick pocket

More Related