1 / 29

Cloud Computing and P2P

Cloud Computing and P2P. A survey of compression techniques, security issues and improvements. Presentation Outline. Introduction and Overview Cloud C omputing and Security Cloud Computing and Compression P2P Security P2P Compression Conclusion. Cloud Computing Overview.

errin
Télécharger la présentation

Cloud Computing and P2P

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cloud Computing and P2P A survey of compression techniques, security issues and improvements

  2. Presentation Outline • Introduction and Overview • Cloud Computing and Security • Cloud Computing and Compression • P2P Security • P2P Compression • Conclusion

  3. Cloud Computing Overview • Computing as a service rather than a product. • Five Layer Model • Client • Application • Platform • Infrastructure • Server

  4. CLOUD COMPUTING SECURITY

  5. Mobile Cloud • Overview/Background • Using phone as cloud • Additional Security concerns • Lost/Stolen phone • Switching carriers, services • How much information gets shared (contact list, photos, etc)

  6. Provider Issues • Authentication Stop data loss/leakage • Must be active 24/7 • How to deal with backup/storage

  7. Where does the responsibility lie for transmission? • DDOS attacks • Must update regularly • Monitor user trends • Location, frequency of use

  8. Customer Issues • Only as secure as your password • Laws are applied to where the data is stored • Must trust company • How to deal with data not being accessible/down times

  9. CLOUD COMPUTING COMPRESSION

  10. Using Cloud Computing to enhance Video Compression • Map & Reduce Algorithm • Split & Merge Algorithm utilizing Cloud computing • CloudComputing vs. Investment in hardware • Cloud: Pay for what you use • Hardware invested in would have a lot of down time

  11. Content Provider uploads video

  12. Compression Occurs

  13. P2P Strengths • Peers provide resources to other peers. • Reduced cost for original distributor. • As demand increases so does the capacity of the system. • There is no single point of failure

  14. P2P Weaknesses • Harmful data can be distributed by malicious peers. • Difficult to moderate the content of the network. • Unpopular files will disappear as peers will not share them.

  15. P2P COMPUTING SECURITY

  16. What We Have

  17. The Challenges • Geographically distributed peers • Lack of centralized control • Many unknowns • Are the other peers worthy of your trust? • Are there involvements between peers? • Absence of accountability

  18. Challenges in identifying a malicious peer • Dynamism • Peers posing as other peers • Hard to monitor peers

  19. P2P for real life applications • Will users trust P2P systems for real life data sharing applications? • How many people would be willing to trust a peer they have no idea about? • Could the system be able reject un-trust worthy peers. • Users should be free to decide what they want to share, no restrictions from the application.

  20. Mobile Apps and P2P • Current P2P is used for sharing Music and Movies. • Could there be a better use for P2P • Social Networking on P2P • Users should be educated on P2P risks • Let users decide on risks

  21. P2P COMPUTING COMPRESSION

  22. -Multicast would be ideal but implementation is difficult -Run a program that creates Multicast but on the application layer -Common program for phones to do this is Skype, still working on video streaming

  23. Forward Error Correction -Redundancy is not always your enemy -Higher overhead and higher bandwidth needed

  24. Retransmission -More reliable than FEC -More delay than FEC which is undesirable in video streaming -More commonly used than FEC

  25. A new form of social interaction and file sharing

  26. Everyone is in the cloud network but people can interact one-on-one as well Different technology than traditional. Lokast is actually location based You can talk to people on the Oval that you've never met before

  27. Questions?

More Related