the cloud is not enough saving iot from the cloud · the cloud is not enough saving iot from the...
TRANSCRIPT
![Page 1: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/1.jpg)
The Cloud is Not Enough Saving IoT from the Cloud
Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric Allman, John Wawrzynek, Edward Lee, and John Kubiatowicz
University of California, Berkeley
![Page 2: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/2.jpg)
Internet of Things with the Cloud
Electric Imp: http://www.limetrace.co.uk/electric-imp-platform Samsung SAMI: https://developer.samsungsami.io/sami/sami-documentation/ Ninja Sphere: http://lucept.files.wordpress.com/2012/06/ninja-blocks-capture.jpg
![Page 3: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/3.jpg)
When I enter my home, turn the AC on.
Slides borrowed from Brad Campbell Brad Campbell. "Accessing the Swarm". Tutorial, 19, March, 2015.
• vendor lock-in • latency • privacy
![Page 4: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/4.jpg)
Cloud
ISP
Cloud
Gateway
Sensors Actuators
Internet Backbone
VS
![Page 5: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/5.jpg)
Web vs. IoT: What is different?Web IoT
Privacy & Security Open for access Personal sensitive data
Scalability Power law Billlion devices & updates
Interaction Model Human Machine
Latency Variable Deterministic
Bandwidth Downstream Upstream
Availability (QoS) No guarantee Requirement
Durability Management Cloud controls Users control
![Page 6: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/6.jpg)
Open for access or personal sensitive data?
Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage
left: https://www.usenix.org/conference/hotcloud15 right: http://www.applehealthkit.com/
![Page 7: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/7.jpg)
Power law vs. billions devices
Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage
left: https://en.wikipedia.org/wiki/Power_law right: http://theconnectivist-img.s3.amazonaws.com/wp-content/uploads/2014/05/Unknown.png
![Page 8: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/8.jpg)
Interaction Model
Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage
left: http://smallbusiness.chron.com/switch-between-users-macbook-62571.html right: http://humancapitalist.com/how-machine-to-machine-technology-puts-people-first/
![Page 9: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/9.jpg)
Latency and QoS Requirement
Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage
right: http://news.thomasnet.com/tech-trends/2014/02/25/m2m-communication-is-prelude-to-smart-manufacturing-systems
![Page 10: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/10.jpg)
Bandwidth: downstream vs. upstream
Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage
User User
![Page 11: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/11.jpg)
Durability management: who controls?
Security & Privacy Scalability Interaction Model Latency Bandwidth Availability Durability Manage
ephemeral extremely durable
![Page 12: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/12.jpg)
Web vs. IoT: What is different?Web IoT
Privacy & Security Open for access Personal sensitive data
Scalability Power law Billlion devices & updates
Interaction Model Human Machine
Latency Variable Deterministic
Bandwidth Downstream Upstream
Availability (QoS) No guarantee Requirement
Durability Management Cloud controls Users control
![Page 13: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/13.jpg)
The Cloud is Not Enough
![Page 14: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/14.jpg)
Existing Research Efforts
Cisco Fog Computing [2012]
left: http://www.atelier.net/en/trends/articles/cloud-fog-computing-cisco-looks-accelerate-iot-innovation_427193 right: Satyanarayanan, Mahadev, et al. "The case for vm-based cloudlets in mobile computing." Pervasive Computing, IEEE 8.4 (2009): 14-23.
CMU Cloudlets [2009]
![Page 15: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/15.jpg)
This is happening!
Intel NUC Nexus 6 Raspberry Pi cluster
![Page 16: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/16.jpg)
The Missing Piece
Infrastructure
![Page 17: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/17.jpg)
Research Question:
What is a well-architected system that extends the cloud and provides seamless interplay
among the heterogeneous components in the IoT space?
Our stand: • Appropriate API abstraction • System with locality, security, mobility, and so on built-in
![Page 18: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/18.jpg)
The Global Data Plane
Global Data Plane
File System, SQL, Key-value, …
TCP/IP, UDP/IP, …
Home Control, Smart Office, Follow-me Display, …
Ethernet, Wi-Fi, Bluetooth, 802.15.4, AVB
Application
CAAPI
Log
Connection
Physical
![Page 19: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/19.jpg)
Single-writer Append-only Log
kilo-Hzmilli-Hz
byte
MB
head tail
sensor log
![Page 20: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/20.jpg)
head tail • Log as the basic data model abstraction
• Flexible (composition for multi-writers)
• Easier access control
• Authenticity and integrity
• Encryption
• Durability and consistency
Single-writer Append-only Log
sensor 1
sensor 2
aggregation service
![Page 21: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/21.jpg)
Pub/sub — Programming Information Flow
sensor
actuator
sensoractuator
storage service
sensor
service 1
service 2
sensor 1
sensor 2
![Page 22: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/22.jpg)
Distributed in Flat Namespace• Logs should be placed in arbitrary places
• Migration should happen on-demand
• Flat namespace (like 256-bit name)
• Location-independent routing
• Peer-to-peer
• Direct routingsensor sensor
log placement
GDP node: log servers or routers could be gateway, cloudlet, fog, cloud
![Page 23: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/23.jpg)
ISP
Cloud
Gateway
Sensors Actuators
Internet Backbone
log placement
• Latency • Bandwidth • QoS • Durability management
![Page 24: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/24.jpg)
Challenges and MechanismsIoT Properties GDP mechanisms
Privacy & Security Personal sensitive data Authentication, encryption
Scalability Billlion devices + updates Peer-to-peer, direct link
Interaction Model Machine Single-writer append-only, pub/sub
Latency Deterministic Log placement + migration
Bandwidth Upstream Log Placement + multicast
Availability Requirement Log placement + migration
Durability Management Users control Log placement + replication
![Page 25: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/25.jpg)
Conclusions• We presented the problems in current IoT development.
• To address them, a new layer of abstraction is proposed.
• This is still an ongoing piece of work
• We have implemented the log interface and a basic routing.
• Still working on the security, placement, and replication.
![Page 26: The Cloud is Not Enough Saving IoT from the Cloud · The Cloud is Not Enough Saving IoT from the Cloud Ben Zhang, Nitesh Mor, John Kolb, Douglas S. Chan, Nikhil Goyal Ken Lutz, Eric](https://reader035.vdocument.in/reader035/viewer/2022062919/5edf5eabad6a402d666ab848/html5/thumbnails/26.jpg)
Web IoT GDP
Privacy & Security Open for access Personal sensitive data Authentication, encryption
Scalability Power-law Billlion devices + updates Peer-to-peer + direct link
Interaction Model Human Machine Single-writer append-only + pub/sub
Latency Variable Reactive Log placement + migration
Bandwidth Downstream Upstream Placement + multicast
Availability None Requirement Log placement + migration
Durability Management Cloud controls Users control Log placement + replication
Discussion