The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh - - PowerPoint PPT Presentation

the cloud is not enough saving iot from the cloud
SMART_READER_LITE
LIVE PREVIEW

The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh - - PowerPoint PPT Presentation

The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric Allman, John Wawrzynek, Edward Lee, and John Kubiatowicz University of California, Berkeley Internet of Things with


slide-1
SLIDE 1

The Cloud is Not Enough Saving IoT from the Cloud

Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric Allman, John Wawrzynek, Edward Lee, and John Kubiatowicz University of California, Berkeley

slide-2
SLIDE 2

Internet of Things with the Cloud

Electric Imp: http://www.limetrace.co.uk/electric-imp-platform Samsung SAMI: https://developer.samsungsami.io/sami/sami-documentation/ Ninja Sphere: http://lucept.files.wordpress.com/2012/06/ninja-blocks-capture.jpg

slide-3
SLIDE 3

When I enter my home, turn the AC on.

Slides borrowed from Brad Campbell Brad Campbell. "Accessing the Swarm". Tutorial, 19, March, 2015.

  • vendor lock-in
  • latency
  • privacy
slide-4
SLIDE 4

Cloud

ISP Cloud Gateway Sensors Actuators Internet Backbone

VS

slide-5
SLIDE 5

Web vs. IoT: What is different?

Web IoT Privacy & Security Open for access Personal sensitive data Scalability Power law Billlion devices & updates Interaction Model Human Machine Latency Variable Deterministic Bandwidth Downstream Upstream Availability (QoS) No guarantee Requirement Durability Management Cloud controls Users control

slide-6
SLIDE 6

Open for access or personal sensitive data?

Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

left: https://www.usenix.org/conference/hotcloud15 right: http://www.applehealthkit.com/

slide-7
SLIDE 7

Power law vs. billions devices

Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

left: https://en.wikipedia.org/wiki/Power_law right: http://theconnectivist-img.s3.amazonaws.com/wp-content/uploads/2014/05/Unknown.png

slide-8
SLIDE 8

Interaction Model

Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

left: http://smallbusiness.chron.com/switch-between-users-macbook-62571.html right: http://humancapitalist.com/how-machine-to-machine-technology-puts-people-first/

slide-9
SLIDE 9

Latency and QoS Requirement

Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

right: http://news.thomasnet.com/tech-trends/2014/02/25/m2m-communication-is-prelude-to-smart-manufacturing-systems

slide-10
SLIDE 10

Bandwidth: downstream vs. upstream

Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

User User

slide-11
SLIDE 11

Durability management: who controls?

Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

ephemeral extremely durable

slide-12
SLIDE 12

Web vs. IoT: What is different?

Web IoT Privacy & Security Open for access Personal sensitive data Scalability Power law Billlion devices & updates Interaction Model Human Machine Latency Variable Deterministic Bandwidth Downstream Upstream Availability (QoS) No guarantee Requirement Durability Management Cloud controls Users control

slide-13
SLIDE 13

The Cloud is Not Enough

slide-14
SLIDE 14

Existing Research Efforts

Cisco Fog Computing [2012]

left: http://www.atelier.net/en/trends/articles/cloud-fog-computing-cisco-looks-accelerate-iot-innovation_427193 right: Satyanarayanan, Mahadev, et al. "The case for vm-based cloudlets in mobile computing." Pervasive Computing, IEEE 8.4 (2009): 14-23.

CMU Cloudlets [2009]

slide-15
SLIDE 15

This is happening!

Intel NUC Nexus 6 Raspberry Pi cluster

slide-16
SLIDE 16

The Missing Piece

Infrastructure

slide-17
SLIDE 17

Research Question:

What is a well-architected system that extends the cloud and provides seamless interplay among the heterogeneous components in the IoT space?

Our stand:

  • Appropriate API abstraction
  • System with locality, security, mobility, and so on built-in
slide-18
SLIDE 18

The Global Data Plane

Global Data Plane File System, SQL, Key-value, … TCP/IP, UDP/IP, … Home Control, Smart Office, Follow-me Display, … Ethernet, Wi-Fi, Bluetooth, 802.15.4, AVB

Application CAAPI Log Connection Physical

slide-19
SLIDE 19

Single-writer Append-only Log

kilo-Hz milli-Hz byte MB

head tail

sensor log

slide-20
SLIDE 20

head tail

  • Log as the basic data model abstraction
  • Flexible (composition for multi-writers)
  • Easier access control
  • Authenticity and integrity
  • Encryption
  • Durability and consistency

Single-writer Append-only Log

sensor 1 sensor 2 aggregation service

slide-21
SLIDE 21

Pub/sub — Programming Information Flow

sensor actuator sensor actuator storage service sensor service 1 service 2 sensor 1 sensor 2

slide-22
SLIDE 22

Distributed in Flat Namespace

  • Logs should be placed in arbitrary places
  • Migration should happen on-demand
  • Flat namespace (like 256-bit name)
  • Location-independent routing
  • Peer-to-peer
  • Direct routing

sensor sensor log placement

GDP node: log servers or routers could be gateway, cloudlet, fog, cloud

slide-23
SLIDE 23

ISP Cloud Gateway Sensors Actuators Internet Backbone

log placement

  • Latency
  • Bandwidth
  • QoS
  • Durability management
slide-24
SLIDE 24

Challenges and Mechanisms

IoT Properties GDP mechanisms Privacy & Security Personal sensitive data Authentication, encryption Scalability Billlion devices + updates Peer-to-peer, direct link Interaction Model Machine Single-writer append-only, pub/sub Latency Deterministic Log placement + migration Bandwidth Upstream Log Placement + multicast Availability Requirement Log placement + migration Durability Management Users control Log placement + replication

slide-25
SLIDE 25

Conclusions

  • We presented the problems in current IoT development.
  • To address them, a new layer of abstraction is proposed.
  • This is still an ongoing piece of work
  • We have implemented the log interface and a basic routing.
  • Still working on the security, placement, and replication.
slide-26
SLIDE 26

Web IoT GDP Privacy & Security Open for access Personal sensitive data Authentication, encryption Scalability Power-law Billlion devices + updates Peer-to-peer + direct link Interaction Model Human Machine Single-writer append-only + pub/sub Latency Variable Reactive Log placement + migration Bandwidth Downstream Upstream Placement + multicast Availability None Requirement Log placement + migration Durability Management Cloud controls Users control Log placement + replication

Discussion