ABSTRACT
Cloud providers are embracing edge computing by developing multi-stakeholder clouds (MClouds), in which the infrastructure is shared among cloud providers, hosting site operators, and, sometimes, system integrators. This form of sharing creates a new set of challenges around infrastructure management. Unfortunately, traditional resource management methods based on partitioning and virtualization do not fit well the needs of infrastructure management in a multi-stakeholder scenario. Our paper describes these new set of challenges, and puts forward a new authorization framework based on two-person control (P2C).
- Giles David Arceneaux. Beyond the Rubicon: Command and Control in Regional Nuclear Powers. PhD thesis, Syracuse University, 2019.Google Scholar
- AWS. AWS Outposts Family. https://aws.amazon.com/outposts/, 2023.Google Scholar
- AWS. AWS Outposts rack hardware specs. https://aws.amazon.com/outposts/rack/hardware-specs/, 2023.Google Scholar
- AWS. AWS Wavelength. https://aws.amazon.com/wavelength/, 2023.Google Scholar
- Paul Barham, Boris Dragovic, Keir Fraser, Steve Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. Xen and the Art of Virtualization. In SOSP, 2003.Google ScholarDigital Library
- Muli Ben-Yehuda, Michael D. Day, Zvi Dubitzky, Michael Factor, Nadav Har'El, Abel Gordon, Athony Luiguori, Orit Wasserman, and Ben-Ami Yassour. The Turtles Project: Design and Implementation of Nested Virtualization. In OSDI, 2010.Google ScholarDigital Library
- Matthew Bunn. Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries. Journal of Nuclear Materials Management, 2013.Google Scholar
- Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, and Mark Russinovich. Why Should I Trust Your Code? Communications of the ACM (CACM), 67, 2014.Google Scholar
- Department of Defense. DoD Instruction 5210.65 - Security Standards for Safeguarding DoD Chemical Agents. https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/521065p.pdf, 2020.Google Scholar
- Distributed Management Task Force. Redfish Sessions. https://www.dmtf.org/sites/default/files/Redfish_School-Sessions.pdf, 2018.Google Scholar
- Distributed Management Task Force. Redfish. https://www.dmtf.org/standards/redfish, 2023.Google Scholar
- Yaozu Dong, Xiaowei Yang, Jianhui Li, Guangdeng Liao, Kun Tian, and Haibing Guan. High Performance Network Virtualization with SR-IOV. Journal of Parallel and Distributed Computing, 2012.Google ScholarDigital Library
- Federal Financial Institutions Examination Council. Authentication and Access to Financial Institution Services and Systems. https://www.ffiec.gov/guidance/Authentication-and-Access-to-Financial-Institution-Services-and-Systems.pdf, 2021.Google Scholar
- Google Cloud. Anthos. https://cloud.google.com/anthos, 2023.Google Scholar
- Google Cloud. Bringing partner applications to the edge with Google Clouda. https://cloud.google.com/blog/topics/anthos/anthos-for-telecom-puts-google-cloud-partners-apps-at-the-edge, 2023.Google Scholar
- Hewlett Packard Enterprise. HPE Reference Configuration for hybrid cloud mobility with Google Cloud's Anthos on HPE Nimble Storage dHCI. https://www.hpe.com/psnow/doc/a50001096enw.pdf, 2023.Google Scholar
- Intel. Fostering a Chiplet Ecosystem for the Future of Moore's Law. https://www.intel.com/content/www/us/en/newsroom/opinion/fostering-chiplet-ecosystem-future-moores-law.html, 2022.Google Scholar
- Intel. Introduction to Memory Bandwidth Allocation. intel.com/content/www/us/en/developer/articles/technical/introduction-to-memory-bandwidth-allocation.html, 2022.Google Scholar
- Intel. Network and Edge Reference System Architectures - vRAN Setup with FlexRAN Software Quick Start Guide. https://www.intel.com/content/www/us/en/content-details/737687/network-and-edge-reference-system-architectures-vran-setup-with-flexran-software-quick-start-guide.html, 2023.Google Scholar
- Intel, Hewlett-Packard, NEC, and Dell. Intelligent Platform Management Interface Specification. https://www.intel.la/content/dam/www/public/us/en/documents/specification-updates/ipmi-intelligent-platform-mgt-interface-spec-2nd-gen-v2-0-spec-update.pdf, 2015.Google Scholar
- Panna Kemenes. What is dual control banking & should you use it? https://wise.com/us/blog/dual-control-banking, 2022.Google Scholar
- Ammar Latif, Ash Khamas, Sundeep Goswami, Vara Prasad Talari, and Young Jung. Telco Meets AWS Cloud: Deploying DISH's 5G Network in AWS Cloud. https://aws.amazon.com/blogs/industries/telco-meets-aws-cloud-deploying-dishs-5g-network-in-aws-cloud/, 2020.Google Scholar
- Robert Love. Kernel Korner: CPU Affinity. Linux Journal, 2003.Google Scholar
- Cory Mann. Using Dual Control to Help Prevent Payment Fraud. https://www.fnbo.com/insights/commercial-business/2023/using-dual-control-to-help-prevent-payment-fraud, 2023.Google Scholar
- Microsoft. Azure Operator Nexus. https://azure.microsoft.com/en-us/products/operator-nexus, 2023.Google Scholar
- Microsoft. Azure Stack Edge. https://azure.microsoft.com/en-us/products/azure-stack/edge, 2023.Google Scholar
- Microsoft News Center. AT&T to run its mobility network on Microsoft's Azure for Operators cloud, delivering cost-efficient 5G services at scale. https://news.microsoft.com/2021/06/30/att-to-run-its-mobility-network-on-microsofts-azure-for-operators-cloud-delivering-cost-efficient-5g-services-at-scale/, 2021.Google Scholar
- Vipin Narang. Nuclear Strategy in the Modern Era: Regional Powers and International Conflict. Princeton University Press, 2014.Google Scholar
- Robert D. Pedersen. Two-Person Control - A Brief History and Modern Industry Practices. Technical Report SAND2017-7995, Sandia National Laboratories, 2017.Google Scholar
- Shaya Potter, Steven M. Bellovin, and Jason Nieh. Two-Person Control Administration: Preventing Administration Faults through Duplication. In LISA, 2009.Google Scholar
- Michael Richtberg. Google Cloud Anthos Bare Metal Support from Dell Technologies. https://www.dell.com/en-us/blog/google-cloud-anthos-bare-metal-support-from-dell-technologies/, 2023.Google Scholar
- Shihao Shen, Yicheng Feng, Megwei Xu, Cheng Zhang, Xiaofei Wang, Wenyu Wang, and Victor C. M. Leung. A Holisting QoS View of Crowdsourced Edge Cloud Platform. In IWQoS, 2023.Google Scholar
- US Air Force. Nuclear Surety Tamper Control and Detection Programs. https://irp.fas.org/doddir/usaf/afi91-104.pdf, 2013.Google Scholar
- David West, Chandrakandh Mouleeswaran, Xiaotong Jiang, and Markesha Parker. Reference Architecture for Google Anthos with Lenovo ThinkAgile VX. https://lenovopress.lenovo.com/lp1215.pdf, 2023.Google Scholar
- Andrew Whitaker, Marianne Shaw, and Steven D. Gribble. Scale and Performance in the Denali Isolation Kernel. In OSDI, 2002.Google Scholar
- Wikipedia. Cloud Computing. https://en.wikipedia.org/wiki/Cloud_computing, 2024.Google Scholar
- Wikipedia. Secret Sharing. https://en.wikipedia.org/wiki/Secret_sharing, 2024.Google Scholar
- Ka Kit Wong. Running Google Anthos on VMware Cloud Foundation. https://core.vmware.com/resource/running-google-anthos-vmware-cloud-foundation, 2023.Google Scholar
- Mengwei Xu, Zhe Fu, Xiao Ma, Li Zhang, Yanan Li, Feng Qian, Shangguang Wang, Ke Li, Jingyu Yang, and Xuanzhe Liu. From Cloud to Edge: A First Look at Public Edge Platforms. In IMC, 2021.Google ScholarDigital Library
Index Terms
- Towards Multi-Stakeholder Clouds
Recommendations
Poster: Towards Multi-Stakeholder Clouds
HOTMOBILE '24: Proceedings of the 25th International Workshop on Mobile Computing Systems and ApplicationsCloud providers are embracing edge computing by developing multi-stakeholder clouds (MClouds), in which the infrastructure is shared among cloud providers, hosting site operators, and, sometimes, system integrators (Figure 1). The emergence of the MCloud ...
Towards Automatic Application Migration to Clouds
CLOUD '15: Proceedings of the 2015 IEEE 8th International Conference on Cloud ComputingPorting applications to Clouds is one of the key challenges in software industry. The available approaches to perform this task are basically either services derived from alliances of major software vendors and Cloud providers focusing on their own ...
Monitoring-based auto-scalability across hybrid clouds
SAC '18: Proceedings of the 33rd Annual ACM Symposium on Applied ComputingCloud computing is a relatively new type of Internet-based computing that becomes more and more popular. Using methods like virtualization, adopting architectures based on microservices, automation of building and deployment processes, Cloud could ...
Comments