the cloud is not enough saving iot from the cloud
play

The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh - PowerPoint PPT Presentation

The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric Allman, John Wawrzynek, Edward Lee, and John Kubiatowicz University of California, Berkeley Internet of Things with


  1. The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric Allman, John Wawrzynek, Edward Lee, and John Kubiatowicz University of California, Berkeley

  2. Internet of Things with the Cloud Electric Imp: http://www.limetrace.co.uk/electric-imp-platform Samsung SAMI: https://developer.samsungsami.io/sami/sami-documentation/ Ninja Sphere: http://lucept.files.wordpress.com/2012/06/ninja-blocks-capture.jpg

  3. When I enter my home, turn the AC on. • vendor lock-in • latency • privacy Slides borrowed from Brad Campbell Brad Campbell. "Accessing the Swarm". Tutorial, 19, March, 2015.

  4. Cloud VS Gateway ISP Cloud Internet Sensors Backbone Actuators

  5. Web vs. IoT: What is different? Web IoT Privacy & Security Open for access Personal sensitive data Scalability Power law Billlion devices & updates Interaction Model Human Machine Latency Variable Deterministic Bandwidth Downstream Upstream Availability (QoS) No guarantee Requirement Durability Management Cloud controls Users control

  6. Open for access or personal sensitive data? left: https://www.usenix.org/conference/hotcloud15 right: http://www.applehealthkit.com/ Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

  7. Power law vs. billions devices left: https://en.wikipedia.org/wiki/Power_law right: http://theconnectivist-img.s3.amazonaws.com/wp-content/uploads/2014/05/Unknown.png Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

  8. Interaction Model left: http://smallbusiness.chron.com/switch-between-users-macbook-62571.html right: http://humancapitalist.com/how-machine-to-machine-technology-puts-people-first/ Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

  9. Latency and QoS Requirement right: http://news.thomasnet.com/tech-trends/2014/02/25/m2m-communication-is-prelude-to-smart-manufacturing-systems Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

  10. Bandwidth: downstream vs. upstream User User Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

  11. Durability management: who controls? ephemeral extremely durable Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage

  12. Web vs. IoT: What is different? Web IoT Privacy & Security Open for access Personal sensitive data Scalability Power law Billlion devices & updates Interaction Model Human Machine Latency Variable Deterministic Bandwidth Downstream Upstream Availability (QoS) No guarantee Requirement Durability Management Cloud controls Users control

  13. The Cloud is Not Enough

  14. Existing Research Efforts Cisco Fog Computing [2012] CMU Cloudlets [2009] left: http://www.atelier.net/en/trends/articles/cloud-fog-computing-cisco-looks-accelerate-iot-innovation_427193 right: Satyanarayanan, Mahadev, et al. "The case for vm-based cloudlets in mobile computing." Pervasive Computing, IEEE 8.4 (2009): 14-23.

  15. This is happening! Intel NUC Nexus 6 Raspberry Pi cluster

  16. The Missing Piece Infrastructure

  17. Research Question: What is a well-architected system that extends the cloud and provides seamless interplay among the heterogeneous components in the IoT space? Our stand: • Appropriate API abstraction • System with locality, security, mobility, and so on built-in

  18. The Global Data Plane Home Control, Smart Office, Application Follow-me Display, … File System, SQL, CAAPI Key-value, … Global Log Data Plane Connection TCP/IP, UDP/IP, … Ethernet, Wi-Fi, Physical Bluetooth, 802.15.4, AVB

  19. Single-writer Append-only Log MB byte milli-Hz kilo-Hz head tail sensor log

  20. Single-writer Append-only Log • Log as the basic data model abstraction head tail sensor 1 • Flexible (composition for multi-writers) sensor 2 • Easier access control • Authenticity and integrity aggregation • Encryption service • Durability and consistency

  21. Pub/sub — Programming Information Flow sensor sensor actuator actuator storage service sensor sensor 1 service 1 sensor 2 service 2

  22. Distributed in Flat Namespace • Logs should be placed in arbitrary places • Migration should happen on-demand log placement • Flat namespace (like 256-bit name) • Location-independent routing • Peer-to-peer sensor sensor • Direct routing GDP node: log servers or routers could be gateway, cloudlet, fog, cloud

  23. • Latency log • Bandwidth placement • QoS • Durability management Gateway ISP Cloud Internet Sensors Backbone Actuators

  24. Challenges and Mechanisms IoT Properties GDP mechanisms Privacy & Security Personal sensitive data Authentication, encryption Scalability Billlion devices + updates Peer-to-peer, direct link Single-writer append-only, Interaction Model Machine pub/sub Latency Deterministic Log placement + migration Bandwidth Upstream Log Placement + multicast Availability Requirement Log placement + migration Durability Management Users control Log placement + replication

  25. Conclusions • We presented the problems in current IoT development. • To address them, a new layer of abstraction is proposed. • This is still an ongoing piece of work • We have implemented the log interface and a basic routing. • Still working on the security, placement, and replication.

  26. Discussion Web IoT GDP Privacy & Security Open for access Personal sensitive data Authentication, encryption Scalability Power-law Billlion devices + updates Peer-to-peer + direct link Single-writer append-only + Interaction Model Human Machine pub/sub Latency Variable Reactive Log placement + migration Bandwidth Downstream Upstream Placement + multicast Availability None Requirement Log placement + migration Durability Management Cloud controls Users control Log placement + replication

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend