Social cloud computing explained

Social cloud computing, also peer-to-peer social cloud computing, is an area of computer science that generalizes cloud computing to include the sharing, bartering and renting of computing resources across peers whose owners and operators are verified through a social network or reputation system.[1] [2] It expands cloud computing past the confines of formal commercial data centers operated by cloud providers to include anyone interested in participating within the cloud services sharing economy. This in turn leads to more options, greater economies of scale, while bearing additional advantages for hosting data and computing services closer to the edge where they may be needed most.[3] [4]

Research

Peer-to-peer (P2P) computing and networking to enable decentralized cloud computing has been an area of research for sometime.[5] Social cloud computing intersects peer-to-peer cloud computing with social computing to verify peer and peer owner reputation thus providing security and quality of service assurances to users. On demand computing environments may be constructed and altered statically or dynamically across peers on the Internet based on their available resources and verified reputation to provide such assurances.

Applications

Social cloud computing has been highlighted as a potential benefit to large-scale computing, video gaming, and media streaming.[6] The tenets of social cloud computing has been most famously employed in the Berkeley Open Infrastructure for Network Computing (BOINC), making the service the largest computing grid in the world.[7] Another service that uses social cloud computing is Subutai. Subutai allows peer-to-peer sharing of computing resources globally or within a select permissioned network.[8]

Challenges

Many challenges arise when moving from a traditional cloud infrastructure, to a social cloud environment.[9]

Availability of computational resources

In the case of traditional cloud computing, availability on demand is essential for many cloud customers. Social Cloud Computing doesn't provide this availability guarantee because in a P2P environment, peers are mobile devices which may enter or leave the P2P network at any time, or PCs which have a primary purpose that can override the P2P computation at any time. The only relatively successful use cases as of recent years are those which do not require real time results, only computation power for a small subset or module of a larger algorithm or data set.

Trust and security

Unlike large scale data centers and company brand image, people may be less likely to trust peers vs. a large company like Google or Amazon. Running some sort of computation with sensitive information would then need to be encrypted properly and the overhead of that encryption may reduce the usefulness of the P2P offloading. When resources are distributed in small pieces to many peers for computations, inherent trust must be placed in the client, regardless of the encryption that may be promised to the client.

Reliability

Similar to availability, reliability of computations must be consistent and uniform. If computations offloaded to the client are continuously interrupted, some mechanism for detecting this must be in place such that the client may know the computation is tainted or needs to be completely re-run. In P2P social computing, reliable expected computation power is difficult to achieve because the speed of the client calculation may depend on how much the client is using the end device. Some ways of overcoming this may be to only allow computations to occur at night, or during specified times the client resources will not be in use.

See also

Notes and References

  1. Book: Gupta. Minaxi. Judge. Paul. Ammar. Mostafa. Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video . A reputation system for peer-to-peer networks . 1 January 2003. 144–152. 10.1145/776322.776346. ACM. 978-1581136944. 10.1.1.13.5964. 5549841 .
  2. Book: Chard. K.. Caton. S.. Rana. O.. Bubendorfer. K.. 2010 IEEE 3rd International Conference on Cloud Computing . Social Cloud: Cloud Computing in Social Networks . 1 July 2010. 99–106. 10.1109/CLOUD.2010.28. 978-1-4244-8207-8. 10.1.1.225.9508. 8431622 .
  3. Babaoglu. Ozalp. Escape From the Data Center: The Promise of Peer-to-Peer Cloud Computing. IEEE Spectrum. September 22, 2014.
  4. Book: Anderson. David P.. Fedak. Gilles. Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06) . The Computational and Storage Potential of Volunteer Computing . 1 January 2006. 73–80. 10.1109/CCGRID.2006.101. IEEE Computer Society. cs/0602061. 978-0-7695-2585-3. 10.1.1.115.8349. 2564 .
  5. Book: Veiga. Luis. Rodrigues. Rodrigo. Ferreira. Paulo. Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid '07) . GiGi: An Ocean of Gridlets on a "Grid-for-the-Masses" . 1 January 2007. 783–788. 10.1109/CCGRID.2007.54. IEEE Computer Society. 978-0-7695-2833-5. 6677458 .
  6. Book: Babaoglu. Ozalp. Marzolla. Moreno. Tamburini. Michelle. Proceedings of the 27th Annual ACM Symposium on Applied Computing . Design and implementation of a P2P Cloud system . March 2012. 412–417. 10.1145/2245276.2245357. ACM. 9781450308571. 10.1.1.307.6956. 3041583 .
  7. Web site: Largest computing grid . Guinness World Records . 28 March 2017.
  8. Web site: What is Subutai?. Subutai. 28 March 2017.
  9. Web site: Peer-to-Peer Cloud Computing. 28 March 2017.