330 likes | 587 Views
Cloud Computing and P2P. A survey of compression techniques, security issues and improvements. Presentation Outline. Introduction and Overview Cloud C omputing and Security Cloud Computing and Compression P2P Security P2P Compression Conclusion. Cloud Computing Overview.
E N D
Cloud Computing and P2P A survey of compression techniques, security issues and improvements
Presentation Outline • Introduction and Overview • Cloud Computing and Security • Cloud Computing and Compression • P2P Security • P2P Compression • Conclusion
Cloud Computing Overview • Computing as a service rather than a product. • Five Layer Model • Client • Application • Platform • Infrastructure • Server
CLOUD COMPUTING SECURITY
Mobile Cloud • Overview/Background • Using phone as cloud • Additional Security concerns • Lost/Stolen phone • Switching carriers, services • How much information gets shared (contact list, photos, etc)
Provider Issues • Authentication Stop data loss/leakage • Must be active 24/7 • How to deal with backup/storage
Where does the responsibility lie for transmission? • DDOS attacks • Must update regularly • Monitor user trends • Location, frequency of use
Customer Issues • Only as secure as your password • Laws are applied to where the data is stored • Must trust company • How to deal with data not being accessible/down times
CLOUD COMPUTING COMPRESSION
Using Cloud Computing to enhance Video Compression • Map & Reduce Algorithm • Split & Merge Algorithm utilizing Cloud computing • CloudComputing vs. Investment in hardware • Cloud: Pay for what you use • Hardware invested in would have a lot of down time
P2P Strengths • Peers provide resources to other peers. • Reduced cost for original distributor. • As demand increases so does the capacity of the system. • There is no single point of failure
P2P Weaknesses • Harmful data can be distributed by malicious peers. • Difficult to moderate the content of the network. • Unpopular files will disappear as peers will not share them.
P2P COMPUTING SECURITY
The Challenges • Geographically distributed peers • Lack of centralized control • Many unknowns • Are the other peers worthy of your trust? • Are there involvements between peers? • Absence of accountability
Challenges in identifying a malicious peer • Dynamism • Peers posing as other peers • Hard to monitor peers
P2P for real life applications • Will users trust P2P systems for real life data sharing applications? • How many people would be willing to trust a peer they have no idea about? • Could the system be able reject un-trust worthy peers. • Users should be free to decide what they want to share, no restrictions from the application.
Mobile Apps and P2P • Current P2P is used for sharing Music and Movies. • Could there be a better use for P2P • Social Networking on P2P • Users should be educated on P2P risks • Let users decide on risks
P2P COMPUTING COMPRESSION
-Multicast would be ideal but implementation is difficult -Run a program that creates Multicast but on the application layer -Common program for phones to do this is Skype, still working on video streaming
Forward Error Correction -Redundancy is not always your enemy -Higher overhead and higher bandwidth needed
Retransmission -More reliable than FEC -More delay than FEC which is undesirable in video streaming -More commonly used than FEC
Everyone is in the cloud network but people can interact one-on-one as well Different technology than traditional. Lokast is actually location based You can talk to people on the Oval that you've never met before