Security, Edge Computing
- Background: security assumptions in Chord, not being secure and resilient against denial of service
Data provenance and integrity are more important than ever. Issues with fake data are even more dangerous than fake news: fake data gives rise to fake news (perhaps also vice versa.)
Today, we need to compute in the presence of the adversary. Everything’s vulnerable, especially in the world of Internet of Things. There’s always an adversary.
Modern applications are distributed, ad hoc, and vulnerable. They want to leverage the power of distributed computing in the cloud, fog, and edge, but there’s generally insufficient security.
- Invented in 1956, changing everything
- Ships, trains, trucks, cranes, all handle standardized format containers
- NOTE: need standard protocol! hard to adopt?
- Each container has unique ID
Data Containers (DataCapsule)
- Satandardized metadata container
- Every transaction explicitly sequenced in a hash-chain history
- Blockchain history?
- Git history?
- It’s a secure log of info
- CS162 Operating Systems and Systems Programming, Lecture 25: Security, Edge Computing Quantum Computing
- Global Data Plane