302 research outputs found
Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments
Decentralized systems are a subset of distributed systems where multiple
authorities control different components and no authority is fully trusted by
all. This implies that any component in a decentralized system is potentially
adversarial. We revise fifteen years of research on decentralization and
privacy, and provide an overview of key systems, as well as key insights for
designers of future systems. We show that decentralized designs can enhance
privacy, integrity, and availability but also require careful trade-offs in
terms of system complexity, properties provided, and degree of
decentralization. These trade-offs need to be understood and navigated by
designers. We argue that a combination of insights from cryptography,
distributed systems, and mechanism design, aligned with the development of
adequate incentives, are necessary to build scalable and successful
privacy-preserving decentralized systems
SocialCloud: Using Social Networks for Building Distributed Computing Services
In this paper we investigate a new computing paradigm, called SocialCloud, in
which computing nodes are governed by social ties driven from a bootstrapping
trust-possessing social graph. We investigate how this paradigm differs from
existing computing paradigms, such as grid computing and the conventional cloud
computing paradigms. We show that incentives to adopt this paradigm are
intuitive and natural, and security and trust guarantees provided by it are
solid. We propose metrics for measuring the utility and advantage of this
computing paradigm, and using real-world social graphs and structures of social
traces; we investigate the potential of this paradigm for ordinary users. We
study several design options and trade-offs, such as scheduling algorithms,
centralization, and straggler handling, and show how they affect the utility of
the paradigm. Interestingly, we conclude that whereas graphs known in the
literature for high trust properties do not serve distributed trusted computing
algorithms, such as Sybil defenses---for their weak algorithmic properties,
such graphs are good candidates for our paradigm for their self-load-balancing
features.Comment: 15 pages, 8 figures, 2 table
- …