Nothing Special   »   [go: up one dir, main page]

skip to main content
article

User Centric Community Clouds

Published: 01 May 2011 Publication History

Abstract

With the evolution in cloud technologies, users are becoming acquainted with seamless service provision. Nevertheless, clouds are not a user centric technology, and users become completely dependent on service providers. We propose a novel concept for clouds, where users self-organize to create their clouds. We present such an architecture for user-centric clouds, which relies on self-managed clouds based on doctrine and on identity management concepts.

References

[1]
Farland, A. (2006). eBay Infrastructure--A prototype for the future, the Clipper Group Observer, Technical Report TCG2006097, November 2006.
[2]
Mell, P., & Grance, T. (2009). The NIST definition of cloud computing v15. National Institute of Standards and Technology, Information Technology Laboratory, July 10, 2009.
[3]
Amazon Web Services, Amazon Elastic Compute Cloud. http://aws.amazon.com/ec2/, as in October 2010.
[4]
Wentzlaff, D., Gruenwald, C., III. Beckmann, N., Modzelewski, B., Kevin A., Youseff, L., et al. (2010). An operating system for multicore and clouds: Mechanisms and implementation. In Proceedings of the 1st ACM symposium on cloud computing (SoCC '10). ACM, New York, NY, USA.
[5]
Chen, H., Perich, F., Finin, T., & Joshi, A. (2004). SOUPA: Standard ontology for ubiquitous and pervasive applications. In The first annual international conference on mobile and ubiquitous systems: networking and services, 2004. MOBIQUITOUS 2004 (pp. 258-267). 22-26 Aug. 2004.
[6]
Zhu, J., & Wang, W. (2008). New-knowledge-view based ontology cloud model. In International conference on 2008 international conference on computer science and software engineering, (pp. 1140-1143).
[7]
Elenius, D., Denker, G., Stehr, M.-O., Senanayake, R., Talcott, C., & Wilkins, D. (2007). CoRaL-Policy language and reasoning techniques for spectrum policies. In Eighth IEEE international workshop on policies for distributed systems and networks, 2007. POLICY '07 (pp. 261-265). 13-15 June 2007.
[8]
Moreau, L., Bradshaw, J., Breedy, M., Bunch, L., Hayes, P., Johnson, M., et al. (2005). Behavioural specification of grid services with the KAoS policy language. In IEEE international symposium on cluster computing and the grid, 2005. CCGrid 2005 (Vol. 2, pp. 816-823, 9-12) May 2005.
[9]
Pearlman, L., Welch, V., Foster, I. et al. (2001). A community authorization service for group collaboration. Presented at the IEEE 3rd international workshop on policies for distributed systems and networks, monteray, California, USA.
[10]
Dimitrakos, T., Laria, G., Djordjevic, I. et al. (2005). Towards a grid platform enabling dynamic virtual organizations for business applications, presented at iTrust 2005, Oxford, UK.
[11]
Welch, V., Barton, T., Keahey, K. et al. (2005) Attributes, anonymity, and access: Shibboleth and globus integration to facilitate grid collaboration, presented at 4th annual PKI R&D Workshop.
[12]
Gellman, R. (2009) Privacy in the clouds: Risks to privacy and confidentiality from cloud computing, World Privacy Forum, Technical Report, February 2009.
[13]
Amazon.com Privacy Notice, online: http://www.amazon.com/gp/help/customer/display.html/102- 5642892-3545759?ie=UTF8&nodeId=468496, as in October 2010.
[14]
Identity Federation Framework (ID-FF), Liberty Alliance ID-FF 1.2 Specifications, Liberty Alliance. http://projectliberty.org/resource_center/specifications/liberty_alliance_id_ff_1_2_specifications/, as in October 2010.
[15]
W3C. OASIS SAML V2.0 Specification. http://www.w3.org/2001/sw, as in October 2010.
[16]
Cantor, S., Kemp, J., Philpott, R., & Maler, E. (2005). Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. http://docs.oasis-open.org/security/saml/v2.0/, March 2005.
[17]
eXtensible Access Control Markup Language (XACML) Version 2.0, OASIS standard, February 2005.
[18]
OpenID. http://openid.net.
[19]
Microsoft CardSpace. http://microsoft.com/net/cardspace.aspx.
[20]
OAuth. http://oauth.net/, as in October 2010.
[21]
Hammer-Lahav, E. (ed.) (2010). The OAuth 1.0 Protocol, Informational RFC, RFC 5849, IETF, April 2010.
[22]
Shibboleth platform web site. About Shibboleth. September 12, 2009. http://shibboleth.internet2.edu/.
[23]
IST SWIFT Project. SWIFT Global Objectives, January 8, 2008. Available at: http://www.ist-swift. org/content/view/13/29/.
[24]
FON. http://en.fon.com/, as in October 2010/.
[25]
Efstathiou, E. C., Frangoudis, P. A., & Polyzos, G. C. (2006). Stimulating participation in wireless community networks. In Proceedings of IEEE INFOCOM 2006, Spain.
[26]
Antoniadis, P., Le Grand, B., Satsiou, A., Tassiulas, L., Aguiar, R. L., & Barraca, J. P., et al. (2008). Community Building over Neighborhood Wireless Mesh Networks. Technology and Society Magazine, IEEE, 27(1), 48-56.
[27]
Negroponte, N. (2002). Being wireless. In Wired Magazine, 10(10). http://www.wired.com/wired/ archive/10.10/wireless.html, as in October 2010.
[28]
Microsoft Research. Self-Organizing Neighborhood Wireless Mesh Networks. http://research.microsoft. com/mesh/.
[29]
Anderson, D. P. (2004) BOINC: a system for public-resource computing and storage, 2004. In Proceedings of the fifth IEEE/ACM international workshop on grid computing (pp. 4-10), 8 Nov. 2004.
[30]
DIASPORA: The privacy aware, personally controlled, do-it-all, open source social network, online: http://www.joindiaspora.com/, as in October 2010.
[31]
Kephart, J. O., & Chess, D. M. (2003). The vision of autonomic computing. Computer, 36(1), 41-50.
[32]
Audeh, M. (2004). Metropolitan-scale Wi-Fi mesh networks. IEEE Computer, 37(12), 119-121. ISSN: 0018-9162.
[33]
Walzer, M. On toleration. New Haven: Yale University Press.
[34]
Putnam, R. D. Bowling alone: The collapse and revival of the american community. Simon & Schuster (Eds.), New York: ISBN: 0-7432-0306-6.
[35]
Coleman, J. Foundations of social theory, Belknap Press, ISBN-978-0674312265.
[36]
Fehr, E., & Gachter, S. (2000). Cooperation and punishment. American Economic Review, 90(4), 980-994.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Wireless Personal Communications: An International Journal
Wireless Personal Communications: An International Journal  Volume 58, Issue 1
May 2011
161 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 May 2011

Author Tags

  1. Cloud infrastructure
  2. Identity management
  3. User-centric systems

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Descriptive Literature Review and Classification of Community Cloud Computing ResearchScientific Programming10.1155/2022/81941402022Online publication date: 1-Jan-2022
  • (2021)Factors Affecting the Organizational Adoption of Secure Community Cloud in KSASecurity and Communication Networks10.1155/2021/81347392021Online publication date: 1-Jan-2021
  • (2017)An Energy-Efficient Balancing Scheme in Wireless Sensor NetworksWireless Personal Communications: An International Journal10.1007/s11277-015-3154-z94:1(17-29)Online publication date: 1-May-2017
  • (2016)A Cloud Computing-Based Analysis System for the National R&D Information Concerning with the Data SecurityWireless Personal Communications: An International Journal10.1007/s11277-016-3359-989:3(977-992)Online publication date: 1-Aug-2016
  • (2016)A New Performance Assessment Modeling and Development of a Performance Assessment System for a Cloud ServiceWireless Personal Communications: An International Journal10.1007/s11277-015-3146-z89:3(795-818)Online publication date: 1-Aug-2016
  • (2014)User-controlled resource management in federated cloudsJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-014-0010-83:1(1-18)Online publication date: 1-Dec-2014
  • (2013)An Efficient Gaming User Oriented Load Balancing Scheme for MMORPGsWireless Personal Communications: An International Journal10.1007/s11277-013-1237-273:2(289-297)Online publication date: 1-Nov-2013

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media