SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
Data Decentralisation
Efficiency, Privacy and Fair Monetisation
Angelo Corsaro, PhD


Chief Technology Officer


ADLINK Technologies Inc.
The Cloud or The Internet?
Cloud computing had made it easy to
provide a large class of “Internet Services”,
yet we should not confuse a speci
fi
c
architectural style with the service itself


This essential difference is important as the
value is provided by the Service not by the
underpinning architecture (i.e. the cloud).
Example:


Cloud Storage is just a way of implementing an “Internet
Storage Service”
Cloud Computing Challenges
The privacy abuses revealed by
Snowden have been heavily
covered by the press


What is not so much known, is
that today the vast majority of
servers powering clouds suffer
from MDS and are as a
consequence inherently insecure.
[Security and Privacy]
Cloud Computing Challenges
As a consequence of centralisation Cloud vendors
have the lion share on data monetisation
opportunities.


This leads to an extremely biased market in which a
few control too much


If individuals have full ownership and control over
their digital footprint they have higher chance to
monetise it — if desired.
[Monetisation]
Example:


Your browsing history, your electrical consumption, your
running data, etc., is (often) owned, controlled and
monetised by third parties.
Cloud Computing Challenges
Cloud computing poses major
energetic challenges not simply
because of data-center but more
importantly for the traf
fi
c it generates.
All data gets in and out of a remote
data center — that consumes energy
[Energy Consumption]
The Austerity Dilemma
Whilst there there a growing
community advocating data austerity,
the solution is not simply is being
conscious on our use of precious
resources — such energie — but we
need to realise that the current
architectures, infrastructures and
technologies where not designed for
addressing the data age
The solution relies combining innovation to improve the
ef
fi
ciency of data distribution technologies with the
sensibilisation of European on the value of parsimony
[Energy Consumption]
Challenges Cloud Computing in Europe
© H-CLOUD Consortium 2020-2022 Page 8 of 93
processing, ensuring, for example, compliance with GDPR, is a central element to enable data
spaces as envisioned in EUSD.
Key challenges for edge computing:
S-E Challenge 1: Concern about stranded edge investments. Investing in the wrong
emerging technology is a risk. The supply side should facilitate edge adoption and deployment
by mitigating the risk of lock-in.
H-CLOUD analysis highlights that this challenge should be supported by: strategies helping edge
technology maturation and skills development (S-E Recommendation 2), creation of an
ecosystem of interoperable and/or federated public edge infrastructure offering (S-E
Recommendation 3), investing on automation and openness edge solutions (S-E
Recommendation 4), and promoting development of common edge standards across the
different industries (S-E Recommendation 5).
S-E Challenge 2: Edge is complex and expensive for SMEs. Help smaller organisations to
improve their readiness and maturity, and reduce the complexity of edge computing adoption,
while making it affordable.
This challenge should be supported by strategies helping edge technology maturation and skills
development (S-E Recommendation 2) and investing on automation and openness of edge
solutions (S-E Recommendation 4).
S-E Challenge 3: Uncertain return on edge investments. Facilitate the widespread use of
edge technology, so it reaches critical mass as a public edge capability.
This could create an opportunity for Tier 2 providers, notably those associated with mobile
networks, to take a more prominent role in edge infrastructure build out, leveraging their existing
footprint of distributed facilities. Research and Innovation initiatives should investigate solutions,
for example leveraging federation and multi-edge approaches, to allow the creation of
widespread edge infrastructure across different providers (S-E Recommendation 3).
S-E Challenge 4: Ensure scalability and affordability of edge computing solutions and
deployments to cope with the demands of the foreseen usage scenarios, also by small players.
Research should continue to explore automation of cloud continuum from infrastructure layer up
to the final application, taking into account different scenario-specific demands and contributing
to open source initiatives (S-E Recommendation 4).
S-E Challenge 5: Concerns about edge interoperability. Edge computing research and
innovation solutions are coming from the telecommunications sector as well as multiple Industry
4.0 initiatives, but their approaches are diverging. This will create interoperability issues and
increase the complexity of adoption and management.
The analysis highlights the relevance of promoting development of common edge standards
across the different industries and sustaining them by including them as requirements in public
tenders (S-E Recommendation 5).
S-E Challenge 6: Limited investment on trusted data access solutions for the edge. As of
today, most of the solutions available for trusted access to data rely on specific hardware facilities
- software based solutions are still lacking. This limits a lot the flexibility and potential adoption
of public edge infrastructure offering where guarantees about trusted access to data are
required.
Research should explore open reference solutions for trusted computing at the edge supporting
multi tenants in isolation and compatible with the different EU privacy and security regulations
(S-E Recommendation 6).
Back to Distributed Systems
Cloud architectures have introduced a major element
of centralisation and have promoted an ecosystem of
technologies that
fi
ts and supports this model


The only way to overcome the limitations posed by this
model is to innovate by providing distributed
internet services to power the Digital Society.


We can’t continue relying and promoting architectural
styles and technologies that make data travel around
half globe when the source and the interested party
are in close proximity. Neither we continue promoting
technologies that have inherently security and privacy
implications and far from optimal energy use
Technology Stack
We have established the
Edge Native Working
Group in Eclipse to incubate
technologies to address the
aforementioned problems


Two key projects in this
context are zenoh which
implements a data plane for
the edge and fogOS which
de
fi
nes the control and
management plane
[Open Infrastructure]
Going Forward, Going Distributed
The way for Europe to innovate
and disrupt the market is not to
try to compete with the GAFAM,
but to make them obsolete

For EU economic interest, digital
sovereignty and sustainability
we should Go Distributed
References
• https://mdsattacks.com


• https://zombieloadattack.com


• https://theshiftproject.org/


• https://www.aceee.org/
fi
les/proceedings/2012/data/papers/0193-000409.pdf


• https://fortune.com/2019/09/18/internet-cloud-server-data-center-energy-
consumption-renewable-coal/


• https://edgenative.eclipse.org


• http://zenoh.io


• http://fog05.io

Contenu connexe

Tendances

Micro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part IMicro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part IAngelo Corsaro
 
DDS in Action -- Part I
DDS in Action -- Part IDDS in Action -- Part I
DDS in Action -- Part IAngelo Corsaro
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolAngelo Corsaro
 
The Data Distribution Service: The Communication Middleware Fabric for Scala...
The Data Distribution Service: The Communication  Middleware Fabric for Scala...The Data Distribution Service: The Communication  Middleware Fabric for Scala...
The Data Distribution Service: The Communication Middleware Fabric for Scala...Angelo Corsaro
 
The Data Distribution Service Tutorial
The Data Distribution Service TutorialThe Data Distribution Service Tutorial
The Data Distribution Service TutorialAngelo Corsaro
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data FabricAngelo Corsaro
 
Fluid IoT Architectures
Fluid IoT ArchitecturesFluid IoT Architectures
Fluid IoT ArchitecturesAngelo Corsaro
 
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveXReactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveXAngelo Corsaro
 
Distributed Algorithms with DDS
Distributed Algorithms with DDSDistributed Algorithms with DDS
Distributed Algorithms with DDSAngelo Corsaro
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing PlatformAngelo Corsaro
 
Vortex Tutorial -- Part I
Vortex Tutorial -- Part IVortex Tutorial -- Part I
Vortex Tutorial -- Part IAngelo Corsaro
 
IoT Protocols Integration with Vortex Gateway
IoT Protocols Integration with Vortex GatewayIoT Protocols Integration with Vortex Gateway
IoT Protocols Integration with Vortex GatewayAngelo Corsaro
 
Vortex 2.0 -- The Industrial Internet of Things Platform
Vortex 2.0 -- The Industrial Internet of Things PlatformVortex 2.0 -- The Industrial Internet of Things Platform
Vortex 2.0 -- The Industrial Internet of Things PlatformAngelo Corsaro
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA ExplainedAngelo Corsaro
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardAngelo Corsaro
 
High Performance Distributed Computing with DDS and Scala
High Performance Distributed Computing with DDS and ScalaHigh Performance Distributed Computing with DDS and Scala
High Performance Distributed Computing with DDS and ScalaAngelo Corsaro
 
Reactive Data Centric Architectures with DDS
Reactive Data Centric Architectures with DDSReactive Data Centric Architectures with DDS
Reactive Data Centric Architectures with DDSAngelo Corsaro
 
The Data Distribution Service Tutorial
The Data Distribution Service TutorialThe Data Distribution Service Tutorial
The Data Distribution Service TutorialAngelo Corsaro
 

Tendances (20)

Micro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part IMicro services Architecture with Vortex -- Part I
Micro services Architecture with Vortex -- Part I
 
DDS in Action -- Part I
DDS in Action -- Part IDDS in Action -- Part I
DDS in Action -- Part I
 
zenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocolzenoh -- the ZEro Network OverHead protocol
zenoh -- the ZEro Network OverHead protocol
 
The Data Distribution Service: The Communication Middleware Fabric for Scala...
The Data Distribution Service: The Communication  Middleware Fabric for Scala...The Data Distribution Service: The Communication  Middleware Fabric for Scala...
The Data Distribution Service: The Communication Middleware Fabric for Scala...
 
The Data Distribution Service Tutorial
The Data Distribution Service TutorialThe Data Distribution Service Tutorial
The Data Distribution Service Tutorial
 
zenoh: The Edge Data Fabric
zenoh: The Edge Data Fabriczenoh: The Edge Data Fabric
zenoh: The Edge Data Fabric
 
Fluid IoT Architectures
Fluid IoT ArchitecturesFluid IoT Architectures
Fluid IoT Architectures
 
DDS Everywhere
DDS EverywhereDDS Everywhere
DDS Everywhere
 
Fog Computing Defined
Fog Computing DefinedFog Computing Defined
Fog Computing Defined
 
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveXReactive Data Centric Architectures with Vortex, Spark and ReactiveX
Reactive Data Centric Architectures with Vortex, Spark and ReactiveX
 
Distributed Algorithms with DDS
Distributed Algorithms with DDSDistributed Algorithms with DDS
Distributed Algorithms with DDS
 
fog05: The Fog Computing Platform
fog05: The Fog Computing Platformfog05: The Fog Computing Platform
fog05: The Fog Computing Platform
 
Vortex Tutorial -- Part I
Vortex Tutorial -- Part IVortex Tutorial -- Part I
Vortex Tutorial -- Part I
 
IoT Protocols Integration with Vortex Gateway
IoT Protocols Integration with Vortex GatewayIoT Protocols Integration with Vortex Gateway
IoT Protocols Integration with Vortex Gateway
 
Vortex 2.0 -- The Industrial Internet of Things Platform
Vortex 2.0 -- The Industrial Internet of Things PlatformVortex 2.0 -- The Industrial Internet of Things Platform
Vortex 2.0 -- The Industrial Internet of Things Platform
 
DDS and OPC UA Explained
DDS and OPC UA ExplainedDDS and OPC UA Explained
DDS and OPC UA Explained
 
DDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing StandardDDS: The IoT Data Sharing Standard
DDS: The IoT Data Sharing Standard
 
High Performance Distributed Computing with DDS and Scala
High Performance Distributed Computing with DDS and ScalaHigh Performance Distributed Computing with DDS and Scala
High Performance Distributed Computing with DDS and Scala
 
Reactive Data Centric Architectures with DDS
Reactive Data Centric Architectures with DDSReactive Data Centric Architectures with DDS
Reactive Data Centric Architectures with DDS
 
The Data Distribution Service Tutorial
The Data Distribution Service TutorialThe Data Distribution Service Tutorial
The Data Distribution Service Tutorial
 

Similaire à Data Decentralisation: Efficiency, Privacy and Fair Monetisation

Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...DESMOND YUEN
 
Fog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and AnalyticsFog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and AnalyticsHarshitParkar6677
 
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Jiang Zhu
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...csandit
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingFinding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingHarshitParkar6677
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
 
Cloud computing in Thailand
Cloud computing in ThailandCloud computing in Thailand
Cloud computing in ThailandValiente Veera
 
OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323Les Williams
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresMohammed Saqib
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...IJECEIAES
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfadeyimikaipaye
 
IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing ApplicationIRJET Journal
 
Cloud Computing Proposal for an European Strategic Research Agenda
Cloud Computing Proposal for an European Strategic Research AgendaCloud Computing Proposal for an European Strategic Research Agenda
Cloud Computing Proposal for an European Strategic Research AgendaFrancesco Ruffino
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingTahmin Aysha Murshed
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
 

Similaire à Data Decentralisation: Efficiency, Privacy and Fair Monetisation (20)

Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...Edge computing from standard to actual infrastructure deployment and software...
Edge computing from standard to actual infrastructure deployment and software...
 
Fog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and AnalyticsFog Computing: A Platform for Internet of Things and Analytics
Fog Computing: A Platform for Internet of Things and Analytics
 
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
Big Data and Internet of Things: A Roadmap For Smart Environments, Fog Comput...
 
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
THE IMPACT OF EXISTING SOUTH AFRICAN ICT POLICIES AND REGULATORY LAWS ON CLOU...
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingFinding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Introduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud InfrastructureIntroduction to Cloud Computing and Cloud Infrastructure
Introduction to Cloud Computing and Cloud Infrastructure
 
Cloud computing in Thailand
Cloud computing in ThailandCloud computing in Thailand
Cloud computing in Thailand
 
OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323OCC-Executive-Summary-20150323
OCC-Executive-Summary-20150323
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 
Outsourcing control
Outsourcing controlOutsourcing control
Outsourcing control
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
 
Machine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdfMachine Learning 5G Federated Learning.pdf
Machine Learning 5G Federated Learning.pdf
 
IRJET - Cloud Computing Application
IRJET -  	  Cloud Computing ApplicationIRJET -  	  Cloud Computing Application
IRJET - Cloud Computing Application
 
Cloud Computing Proposal for an European Strategic Research Agenda
Cloud Computing Proposal for an European Strategic Research AgendaCloud Computing Proposal for an European Strategic Research Agenda
Cloud Computing Proposal for an European Strategic Research Agenda
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
Design of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud RoboticsDesign of an IT Capstone Subject - Cloud Robotics
Design of an IT Capstone Subject - Cloud Robotics
 
A brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutionsA brief review: security issues in cloud computing and their solutions
A brief review: security issues in cloud computing and their solutions
 

Plus de Angelo Corsaro

zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computeAngelo Corsaro
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing InfrastructureAngelo Corsaro
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture FourAngelo Corsaro
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture ThreeAngelo Corsaro
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture TwoAngelo Corsaro
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture OneAngelo Corsaro
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security StandardAngelo Corsaro
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsAngelo Corsaro
 
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...Angelo Corsaro
 
Microservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part IIMicroservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part IIAngelo Corsaro
 

Plus de Angelo Corsaro (15)

Zenoh: The Genesis
Zenoh: The GenesisZenoh: The Genesis
Zenoh: The Genesis
 
Zenoh Tutorial
Zenoh TutorialZenoh Tutorial
Zenoh Tutorial
 
zenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query computezenoh: zero overhead pub/sub store/query compute
zenoh: zero overhead pub/sub store/query compute
 
Eastern Sicily
Eastern SicilyEastern Sicily
Eastern Sicily
 
fog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructurefog05: The Fog Computing Infrastructure
fog05: The Fog Computing Infrastructure
 
Programming in Scala - Lecture Four
Programming in Scala - Lecture FourProgramming in Scala - Lecture Four
Programming in Scala - Lecture Four
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Programming in Scala - Lecture Two
Programming in Scala - Lecture TwoProgramming in Scala - Lecture Two
Programming in Scala - Lecture Two
 
Programming in Scala - Lecture One
Programming in Scala - Lecture OneProgramming in Scala - Lecture One
Programming in Scala - Lecture One
 
The DDS Security Standard
The DDS Security StandardThe DDS Security Standard
The DDS Security Standard
 
RUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming RuminationsRUSTing -- Partially Ordered Rust Programming Ruminations
RUSTing -- Partially Ordered Rust Programming Ruminations
 
DDS In Action Part II
DDS In Action Part IIDDS In Action Part II
DDS In Action Part II
 
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...The Cloudy, Foggy and Misty Internet of Things --  Toward Fluid IoT Architect...
The Cloudy, Foggy and Misty Internet of Things -- Toward Fluid IoT Architect...
 
Microservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part IIMicroservices Architecture with Vortex — Part II
Microservices Architecture with Vortex — Part II
 
Happy 2016!
Happy 2016!Happy 2016!
Happy 2016!
 

Dernier

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Data Decentralisation: Efficiency, Privacy and Fair Monetisation

  • 1. Data Decentralisation Efficiency, Privacy and Fair Monetisation Angelo Corsaro, PhD Chief Technology Officer ADLINK Technologies Inc.
  • 2. The Cloud or The Internet? Cloud computing had made it easy to provide a large class of “Internet Services”, yet we should not confuse a speci fi c architectural style with the service itself This essential difference is important as the value is provided by the Service not by the underpinning architecture (i.e. the cloud). Example: Cloud Storage is just a way of implementing an “Internet Storage Service”
  • 3. Cloud Computing Challenges The privacy abuses revealed by Snowden have been heavily covered by the press What is not so much known, is that today the vast majority of servers powering clouds suffer from MDS and are as a consequence inherently insecure. [Security and Privacy]
  • 4. Cloud Computing Challenges As a consequence of centralisation Cloud vendors have the lion share on data monetisation opportunities. This leads to an extremely biased market in which a few control too much If individuals have full ownership and control over their digital footprint they have higher chance to monetise it — if desired. [Monetisation] Example: Your browsing history, your electrical consumption, your running data, etc., is (often) owned, controlled and monetised by third parties.
  • 5. Cloud Computing Challenges Cloud computing poses major energetic challenges not simply because of data-center but more importantly for the traf fi c it generates. All data gets in and out of a remote data center — that consumes energy [Energy Consumption]
  • 6. The Austerity Dilemma Whilst there there a growing community advocating data austerity, the solution is not simply is being conscious on our use of precious resources — such energie — but we need to realise that the current architectures, infrastructures and technologies where not designed for addressing the data age The solution relies combining innovation to improve the ef fi ciency of data distribution technologies with the sensibilisation of European on the value of parsimony [Energy Consumption]
  • 7. Challenges Cloud Computing in Europe © H-CLOUD Consortium 2020-2022 Page 8 of 93 processing, ensuring, for example, compliance with GDPR, is a central element to enable data spaces as envisioned in EUSD. Key challenges for edge computing: S-E Challenge 1: Concern about stranded edge investments. Investing in the wrong emerging technology is a risk. The supply side should facilitate edge adoption and deployment by mitigating the risk of lock-in. H-CLOUD analysis highlights that this challenge should be supported by: strategies helping edge technology maturation and skills development (S-E Recommendation 2), creation of an ecosystem of interoperable and/or federated public edge infrastructure offering (S-E Recommendation 3), investing on automation and openness edge solutions (S-E Recommendation 4), and promoting development of common edge standards across the different industries (S-E Recommendation 5). S-E Challenge 2: Edge is complex and expensive for SMEs. Help smaller organisations to improve their readiness and maturity, and reduce the complexity of edge computing adoption, while making it affordable. This challenge should be supported by strategies helping edge technology maturation and skills development (S-E Recommendation 2) and investing on automation and openness of edge solutions (S-E Recommendation 4). S-E Challenge 3: Uncertain return on edge investments. Facilitate the widespread use of edge technology, so it reaches critical mass as a public edge capability. This could create an opportunity for Tier 2 providers, notably those associated with mobile networks, to take a more prominent role in edge infrastructure build out, leveraging their existing footprint of distributed facilities. Research and Innovation initiatives should investigate solutions, for example leveraging federation and multi-edge approaches, to allow the creation of widespread edge infrastructure across different providers (S-E Recommendation 3). S-E Challenge 4: Ensure scalability and affordability of edge computing solutions and deployments to cope with the demands of the foreseen usage scenarios, also by small players. Research should continue to explore automation of cloud continuum from infrastructure layer up to the final application, taking into account different scenario-specific demands and contributing to open source initiatives (S-E Recommendation 4). S-E Challenge 5: Concerns about edge interoperability. Edge computing research and innovation solutions are coming from the telecommunications sector as well as multiple Industry 4.0 initiatives, but their approaches are diverging. This will create interoperability issues and increase the complexity of adoption and management. The analysis highlights the relevance of promoting development of common edge standards across the different industries and sustaining them by including them as requirements in public tenders (S-E Recommendation 5). S-E Challenge 6: Limited investment on trusted data access solutions for the edge. As of today, most of the solutions available for trusted access to data rely on specific hardware facilities - software based solutions are still lacking. This limits a lot the flexibility and potential adoption of public edge infrastructure offering where guarantees about trusted access to data are required. Research should explore open reference solutions for trusted computing at the edge supporting multi tenants in isolation and compatible with the different EU privacy and security regulations (S-E Recommendation 6).
  • 8. Back to Distributed Systems Cloud architectures have introduced a major element of centralisation and have promoted an ecosystem of technologies that fi ts and supports this model The only way to overcome the limitations posed by this model is to innovate by providing distributed internet services to power the Digital Society. We can’t continue relying and promoting architectural styles and technologies that make data travel around half globe when the source and the interested party are in close proximity. Neither we continue promoting technologies that have inherently security and privacy implications and far from optimal energy use
  • 9. Technology Stack We have established the Edge Native Working Group in Eclipse to incubate technologies to address the aforementioned problems Two key projects in this context are zenoh which implements a data plane for the edge and fogOS which de fi nes the control and management plane [Open Infrastructure]
  • 10. Going Forward, Going Distributed The way for Europe to innovate and disrupt the market is not to try to compete with the GAFAM, but to make them obsolete For EU economic interest, digital sovereignty and sustainability we should Go Distributed
  • 11. References • https://mdsattacks.com • https://zombieloadattack.com • https://theshiftproject.org/ • https://www.aceee.org/ fi les/proceedings/2012/data/papers/0193-000409.pdf • https://fortune.com/2019/09/18/internet-cloud-server-data-center-energy- consumption-renewable-coal/ • https://edgenative.eclipse.org • http://zenoh.io • http://fog05.io