Fig 3 - uploaded by Rafael Brundo Uriarte
Content may be subject to copyright.
General Architectures of Golem, iExec and SONM. 

General Architectures of Golem, iExec and SONM. 

Source publication
Article
Full-text available
Smart contracts and blockchain have the potential to change the current shape of cloud markets by enabling the development of completely decentralised cloud/fog solutions, which lower costs and enforce predictable results without requiring any intermediary. In this paper, we survey three of these solutions, namely Golem, iExec and SONM, compare the...

Contexts in source publication

Context 1
... [6] is the most recent project among the three project and its ICO raised over $40 million in June 2017. Many aspects of the architecture and aims described in the original white paper have been reconsidered 7 . The project now focuses on IaaS and it is planned to support PaaS. It is claimed that SONM could be used to provide infrastructure for the platform and application layer of other projects like iExec and Golem. The architecture of SONM is illustrated in Figure ...
Context 2
... architecture is presented in Figure 3. The P2P network maintains the connection between nodes using end- to-end encryption elliptic-curve. Providers offer one or more nodes, and services are executed directly on the node or in sandboxed environments. In this case, Dockers and Virtual Machines (VMs) are supported; data are shared and stored in the distributed storage module, which is based on IPFS 5 , a hypermedia distribution protocol for P2P systems. Developers can create specific applications, using a developer kit, and templates in the task definition framework, to make their applications available in the application registry of the Golem Network. The template contains the computation logic, the code to be executed, the specification of how to split services into tasks and how to merge and verify results. If consumers want to run custom applications, they should define them using the task definition ...
Context 3
... iExec platform [5] is the result of several research projects in the area of distributed systems at INRIA and CNRS. It collected over $12 million of investments in April 2017. The architecture of the platform is shown in Figure ...
Context 4
... [6] is the most recent project among the three project and its ICO raised over $40 million in June 2017. Many aspects of the architecture and aims described in the original white paper have been reconsidered 7 . The project now focuses on IaaS and it is planned to support PaaS. It is claimed that SONM could be used to provide infrastructure for the platform and application layer of other projects like iExec and Golem. The architecture of SONM is illustrated in Figure ...
Context 5
... architecture is presented in Figure 3. The P2P network maintains the connection between nodes using end- to-end encryption elliptic-curve. Providers offer one or more nodes, and services are executed directly on the node or in sandboxed environments. In this case, Dockers and Virtual Machines (VMs) are supported; data are shared and stored in the distributed storage module, which is based on IPFS 5 , a hypermedia distribution protocol for P2P systems. Developers can create specific applications, using a developer kit, and templates in the task definition framework, to make their applications available in the application registry of the Golem Network. The template contains the computation logic, the code to be executed, the specification of how to split services into tasks and how to merge and verify results. If consumers want to run custom applications, they should define them using the task definition ...
Context 6
... iExec platform [5] is the result of several research projects in the area of distributed systems at INRIA and CNRS. It collected over $12 million of investments in April 2017. The architecture of the platform is shown in Figure ...
Context 7
... architecture is presented in Figure 3. The P2P network maintains the connection between nodes using end- to-end encryption elliptic-curve. Providers offer one or more nodes, and services are executed directly on the node or in sandboxed environments. In this case, Dockers and Virtual Machines (VMs) are supported; data are shared and stored in the distributed storage module, which is based on IPFS 5 , a hypermedia distribution protocol for P2P systems. Developers can create specific applications, using a developer kit, and templates in the task definition framework, to make their applications available in the application registry of the Golem Network. The template contains the computation logic, the code to be executed, the specification of how to split services into tasks and how to merge and verify results. If consumers want to run custom applications, they should define them using the task definition ...
Context 8
... [6] is the most recent project among the three project and its ICO raised over $40 million in June 2017. Many aspects of the architecture and aims described in the original white paper have been reconsidered 7 . The project now focuses on IaaS and it is planned to support PaaS. It is claimed that SONM could be used to provide infrastructure for the platform and application layer of other projects like iExec and Golem. The architecture of SONM is illustrated in Figure ...
Context 9
... iExec platform [5] is the result of several research projects in the area of distributed systems at INRIA and CNRS. It collected over $12 million of investments in April 2017. The architecture of the platform is shown in Figure ...

Similar publications

Article
Full-text available
The Internet of Drones (IoD) is a layered network control architecture, which is having a revolutionary impact on the monitoring and preservationvof the environment. Large-scale drone-assisted environmental monitoring can provide a better perspective and high-quality data by monitoring the operation of critical components of smart cities. However,...

Citations

... Blockchains are decentralized, globally distributed, strongly consistent replicated systems that run across networks of mutually untrusted nodes. Since the emergence of the decentralized Bitcoin protocol [1], permissionless blockchains have demonstrated their ability to run arbitrary distributed applications [2] with the promise of supporting entire decentralized economies [3], business ecosystems across industries [4], decentralized service infrastructures [5] and have even the ambition of decentralizing the entire Web [6]. Achieving the latter use cases requires efficient and performant blockchain solutions. ...
Preprint
Most of today's online services (e.g., social networks, search engines, market places) are centralized, which is recognized as unsatisfactory by a majority of users for various reasons (e.g., centralized governance, censorship, loss of control over personal data). Blockchain technologies promise a new Web revolution (Web 3.0) through the decentralization of online services. However, one of the key limitations for this revolution to happen at a planetary scale is the poor performance of today's blockchains. We propose in this paper ALDER, a solution for unlocking the performance of off-the-shelf leader-based blockchains by multiplexing their consensus protocol. Our solution leverages the existence of multiple potential leaders to alleviate the bottleneck that exists at different levels of consensus protocols. To illustrate the benefits it brings to Blockchain performance, we apply ALDER to three representative blockchains, namely Algorand (Proof-of-Stake), RapidChain (Sharding-based) and Bitcoin (Proof-of-Work). Our evaluation, involving up to 10,000 nodes deployed on 100 physical machines, shows that using ALDER can provide up to a 300% improvement in both throughput and latency reduction.
... R. Brundo et al. [56] mainly focused on the potential adoption of blockchain technology in the existing cloud and fog based systems to make them more transparent and decentralized systems without any involvement of less trusted intermediary systems. The authors carried out extensive study of three main projects based on the said domain and finally evaluated varied observations as mentioned: Golem based crowd funding project's motive is based on decentralized supercomputer using blockchain technology, iExec blockchain based decentralized cloud and SONM http:// journal.uob.edu.bh ...
Article
Full-text available
Internet of Things (IoT) has become a widespread ubiquitous technology connecting seamlessly the physical world with the internet. The security, trust, and privacy issues are still serious challenges in IoT, as less work has been done on the security aspect. Blockchain technology seems to be the viable solution to maintain security, transparency, auditability, immutability, and privacy in a decentralized manner without any third party intermediary. The main objective of this paper is based on comparative analysis in the existing literature comprising of consensus mechanisms, smart contracts, architectures, service platforms, and application use cases in blockchain-based IoT (BIoT). This paper presents a comprehensive review and the flow of information starting from: vast IoT applications and the main challenges in its adoption, integration of blockchain with IoT and applications. Finally, some important challenges were discussed in order to have a novel network of IoT nodes having security, privacy, transparency throughout the communication medium.
... Two surveys complement our work. The survey presented in [30] inspects three Blockchain-based Cloud platforms. It provides an abstraction based on the three architectures and presents standards that can be used to ease the integration between Cloud Components. ...
Article
Full-text available
This article surveys the literature in search of systems and components that use Blockchain or Smart Contracts to manage computational resources, store data, and execute services using the Cloud paradigm. This paradigm has extended from warehouse-scale data centres to the edge of the network and in between, giving rise to the domains of Edge and Fog Computing. The Cloud Continuum encompasses the three fields and focuses on the management of applications composed of connected services that span from one end to the other of the computational spectrum. Several components that are commanded by Smart Contracts are identified and compared concerning their functionality. Two important research directions are the experimental evaluation of the identified platforms and the identification of standards that can accelerate the adoption of Blockchain-based Fog platforms.
... In order to avoid reliance on a particular provider, the usage of blockchain technologies for task offloading has previously been discussed [23]. In such approaches (e.g., Golem or iExec-see Section 2), the blockchain is a service broker, which brings together consumers and providers, and often delivers further functionalities, e.g., automated settlement after the offloading task has been carried out. ...
... Previous studies are aware of this issue and discuss solutions based on, e.g., redundant computing, reprocessing fractions of a task locally, or reputation-based systems in order to ensure correct results [3,6,20]. While these approaches may reduce the risk of receiving wrong results, they cannot proof that a result is correct [23]. In other, non-blockchain solutions, the user needs to trust a third party which provides functionalities ensuring trust in the offloading results, e.g., [17]. ...
... To the best of our knowledge, the field of blockchain-based, verifiable task offloading is still a novel research area, and not too many approaches have been presented so far. Golem [20], iExec [6], and SONM [21] are three commercial solutions, aiming at decentralizing offloading to the cloud [23]. Their respective primary goal is to provide solutions to decrease market entry barriers, by allowing arbitrary providers to offer computational resources on a blockchain, and arbitrary consumers to use these resources. ...
Chapter
Offloading of computation, e.g., to the cloud, is today a major task in distributed systems. Usually, consumers which apply offloading have to trust that a particular functionality offered by a service provider is delivering correct results. While redundancy (i.e., offloading a task to more than one service provider) or (partial) reprocessing help to identify correct results, they also lead to significantly higher cost.
... The author's focus was on economic factors and not on the technical aspects to understand the risks, advantages, and expectations when cryptocurrency replaces the national currencies. Uriarte and Nicola [79] surveyed three BC-based projects, namely iExec, Golem and SONM, compare them, and identify some of the unsolved issues. The authors reviewed the existing standards for developing interoperable decentralized Cloud solutions that could compete with large providers while also preventing vendor lock-in. ...
... Pokrovskaia [78] Compare cryptocurrency and national currencies Economy and politics Uriarte and Nicola [79] Compare Golem, iExec, and SONM projects FC-BC Sharma and Joshi [80] Study the impact of BC on health care systems Health care system-BC George and Sankaranarayanan [81] Cryptographic assessment IoT-FC-BC Farhadi et al. [82] IoT applications' security IoT-FC-BC Yang et al. [57] Integration assessment overview Edge-BC Tariq et al. [21] Security and privacy IoT-FC-BC Fernández-Caramés and Fraga-Lamas [83] BC integration in smart universities' campuses Education-BC Iqbal et al. [84] Trust model: factors, issues, solutions SIoV Bouras et al. [85] Identity management overview eHealth-BC Alli and Fahadi [86] BC general concepts and consensus algorithms IoT-FC-BC Bhattacharya et al. [87] BC integration with MEC MEC-BC Iqbal et al. [88], Lakhan et al. [89] Reputation management for task offloading MVF-BC Ferrag et al. [51] Agriculture application integration with BC Agriculture-BC Baniata and Kertesz [9] State-of-the-art integration assessment FC-BC Khan and Chishti [37] State-of-the-art of FC security issues FC-BC This survey ...
Article
The emergent of Fog computing as an extension of Cloud computing, from the center of the internet architecture to the IoT end user’s devices, aims to enhance the processing power of the resource-constraint IoT devices and deliver them other services since it locates close to these devices. This extension was also suggested to boost the standard of IoT system implementations thus decreasing energy consumption and latency for those applications that need fast responses. However, as stated in recent literature, Fog computing may have some important security and privacy challenges. On the other hand, Blockchain, which was generated and used in crypto-currencies, has been applied in a wider range of applications due to the security, privacy, distributed trust management, and reliability features provided. Among the applications, which have recently been attractive about blockchain is Fog computing. Blockchain in Fog computing may achieve a distributed and trusted, identity management, secure data, reputation, and payment systems. This survey discusses the state-of-the-art impact of the blockchain on the security and privacy of Fog computing. The findings elucidate the vision of blockchain in Fog computing-security and privacy-based enhancement and draw attention to open challenges and future research directions.
... In order to avoid reliance on a particular provider, the usage of blockchain technologies for task offloading has previously been discussed [23]. In such approaches (e.g., Golem or iExec-see Section 2), the blockchain is a service broker, which brings together consumers and providers, and often delivers further functionalities, e.g., automated settlement after the offloading task has been carried out. ...
... Previous studies are aware of this issue and discuss solutions based on, e.g., redundant computing, reprocessing fractions of a task locally, or reputation-based systems in order to ensure correct results [3,6,20]. While these approaches may reduce the risk of receiving wrong results, they cannot proof that a result is correct [23]. In other, non-blockchain solutions, the user needs to trust a third party which provides functionalities ensuring trust in the offloading results, e.g., [17]. ...
... To the best of our knowledge, the field of blockchain-based, verifiable task offloading is still a novel research area, and not too many approaches have been presented so far. Golem [20], iExec [6], and SONM [21] are three commercial solutions, aiming at decentralizing offloading to the cloud [23]. Their respective primary goal is to provide solutions to decrease market entry barriers, by allowing arbitrary providers to offer computational resources on a blockchain, and arbitrary consumers to use these resources. ...
Preprint
Offloading of computation, e.g., to the cloud, is today a major task in distributed systems. Usually, consumers which apply offloading have to trust that a particular functionality offered by a service provider is delivering correct results. While redundancy (i.e., offloading a task to more than one service provider) or (partial) reprocessing help to identify correct results, they also lead to significantly higher cost. Hence, within this paper, we present an approach to verify the results of offchain computations via the blockchain. For this, we apply zero-knowledge proofs to provide evidence that results are correct. Using our approach, it is possible to establish trust between a service consumer and arbitrary service providers. We evaluate our approach using a very well-known example task, i.e., the Traveling Salesman Problem.
... While [20] has given a survey of blockchain in cloud computing and its security solutions for cloudbased applications. An introduction of blockchain for cloud platforms with associated challenges opportunities was made in [21] and a systematic survey of the combination of blockchain and edge computing [22]. ...
Chapter
All organizations desire to adopt blockchain for their structure due to the degree of security it provides and due to the success it had in the economic industry when it introduces the Bitcoin and after Ethereum. It’s crystal clear that the blockchain technology is a robust technology against many of the attack attempts but still has some gray area for discussion and challenges. In this chapter, the Ethereum blockchain description will be provided in the first place, and then we will be going around the types of blockchain and which one to adapt for each case. The third section will be about the integration of cloud and blockchain where we are going to detail the benefits and vulnerabilities of the integration and present an example for Azure blockchain. In the end, we will be presenting a simulation of the 51% attack.
... Therefore, data integrity must be preserved in order to ensure correctness and efficiency of the system. The smart contracts allow for set of rules, programs, and algorithms to be written and implemented 60,69,70,79 to provide the required security safeguards against actions that could affect the confidentiality, integrity, or availability of the system. Therefore, for the role blockchain will play in the solution, we will instead write the algorithms in a smart contract which will carry out integrity tests on incoming data and deny faulty values entry through the system by correcting the input data based on standard operating conditions and log the faulty inputs with timestamp for review and provenance. ...
Article
Full-text available
Internet of Things (IoT) platforms are responsible for overall data processing in the IoT System. This ranges from analytics and big data processing to gathering all sensor data over time to analyze and produce long‐term trends. However, this comes with prohibitively high demand for resources such as memory, computing power and bandwidth, which the highly resource constrained IoT devices lack to send data to the platforms to achieve efficient operations. This results in poor availability and risk of data loss due to single point of failure should the cloud platforms suffer attacks. The integrity of the data can also be compromised by an insider, such as a malicious system administrator, without leaving traces of their actions. To address these issues, we propose in this work an edge‐based blockchain enabled anomaly detection technique to prevent insider attacks in IoT. The technique first employs the power of edge computing to reduce the latency and bandwidth requirements by taking processing closer to the IoT nodes, hence improving availability, and avoiding single point of failure. It then leverages some aspect of sequence‐based anomaly detection, while integrating distributed edge with blockchain that offers smart contracts to perform detection and correction of abnormalities in incoming sensor data. Evaluation of our technique using real IoT system datasets showed that the technique remarkably achieved the intended purpose, while ensuring integrity and availability of the data which is critical to IoT success.
... Third, KMMR adds and revokes efficient secure nodes. ECC is an ondemand routing network protocol which is specially design for wireless sensor network and ad hoc [15,16]. ...
Article
Full-text available
The emergence of IoT applications has risen the security issues of the big data sent by the IoT devices. The design of lightweight cryptographic algorithms becomes a necessity. Moreover, elliptic curve cryptography (ECC) is a promising cryptographic technology that has been used in IoT. However, connected objects are resource-constrained devices, with limited computing power and energy power. Driven by these motivations, we propose and develop a secure cryptographic protocol called CoopECC which leverages the organization of IoT nodes into cluster to distribute the load of cluster head (CH) among its cluster members. This technique proves that it optimizes the resource consumption of the IoT nodes including computation and energy consumption. Performance evaluation, done with TOSSIM simulator, shows that the proposed protocol CoopECC outperforms the original ECC algorithm, in terms of computation time, consumed energy, and the network’s lifespan.
... 1) Combined with cloud and edge computing. The current states of blockchain for the cloud market, which is dominated by a few providers currently, is investigated in [25]. The authors provide some solutions based on blockchain and smart contracts, and then discuss the pending problems for applications in the cloud market. ...
... The physical layer and application layer are converged into a single networking layer called the blockchain network layer (BNL), which incorporates encryption, storage, traffic balance, token control, and consensus to ensure secure data transfer with low latency. In addition, several research works have considered how to combine blockchian with existing frameworks, Combined with cloud and edge computing [25] Compare three solutions based on blockchain in cloud computing, with emphasis of cloud market standards. [26] Summarize the current research on the integration of blockchain technologies and edge computing. ...
Preprint
The paths leading to future networks are pointing towards a data-driven paradigm to better cater to the explosive growth of mobile services as well as the increasing heterogeneity of mobile devices, many of which generate and consume large volumes and variety of data. These paths are also hampered by significant challenges in terms of security, privacy, services provisioning, and network management. Blockchain, which is a technology for building distributed ledgers that provide an immutable log of transactions recorded in a distributed network, has become prominent recently as the underlying technology of cryptocurrencies and is revolutionizing data storage and processing in computer network systems. For future data-driven networks (DDNs), blockchain is considered as a promising solution to enable the secure storage, sharing, and analytics of data, privacy protection for users, robust, trustworthy network control, and decentralized routing and resource managements. However, many important challenges and open issues remain to be addressed before blockchain can be deployed widely to enable future DDNs. In this article, we present a survey on the existing research works on the application of blockchain technologies in computer networks, and identify challenges and potential solutions in the applications of blockchains in future DDNs. We identify application scenarios in which future blockchain-empowered DDNs could improve the efficiency and security, and generally the effectiveness of network services.