Blockchain-based decentralized cloud/fog solutions: Challenges, opportunities, and standards

被引:52
作者
Brundo R. [1 ]
De Nicola R. [1 ]
机构
[1] IMT School for Advanced Studies, Lucca
来源
IEEE Communications Standards Magazine | 2018年 / 2卷 / 03期
关键词
Blockchain;
D O I
10.1109/MCOMSTD.2018.1800020
中图分类号
TP392 [各种专用数据库];
学科分类号
摘要
Smart contracts and blockchain have the potential to change the current shape of cloud markets by enabling the development of completely decentralized cloud/fog solutions, which lower costs and enforce predictable results without requiring any intermediary. In this article, we survey three of these solutions, namely Golem, iExec, and SONM, compare them, and identify some of the problems they leave unsolved. Moreover, we consider existing standards for the development of interoperable decentralized cloud solutions that would allow such systems to compete with large providers and would prevent vendor lock-in. We believe that our study contributes to the evolution of cloud systems not only by pointing out incompatibilities among projects and possible solutions for research problems in the area, but also by reviewing the existing standards and suggesting new standardization opportunities. © 2017 IEEE.
引用
收藏
页码:22 / 28
页数:6
相关论文
共 15 条
[1]  
Group S.R., Et al., Big Four Still Dominate in Q1 as Cloud Market Growth Exceeds 50%, (2016)
[2]  
Szabo N., Smart contracts: Building blocks for digital markets, EXTROPY: The Journal of Transhumanist Thought, (1996)
[3]  
Nakamoto S., Bitcoin: A Peer-to-Peer Electronic Cash System, (2008)
[4]  
The Golem Project Crowdfunding Whitepaper, (2016)
[5]  
IExec Blockchain-Based Decentralized Cloud Computing V3.0, (2018)
[6]  
SONM Supercomputer Organized by Network Mining, (2017)
[7]  
Cerin C., Fedak G., Desktop Grid Computing, (2012)
[8]  
Douceur J.R., The sybil attack, Int'l. Wksp. Peer-to-Peer Systems, pp. 251-260, (2002)
[9]  
Canetti R., Riva B., Rothblum G.N., Practical delegation of computation using multiple servers, Proc. 18th ACM Conf. Comp. and Commun. Security, pp. 445-454, (2011)
[10]  
Setty S.T., Et al., Making argument systems for outsourced computation practical (sometimes), Proc. NDSS, 1, 9, (2012)