SlideShare a Scribd company logo
1 of 26
Social Cloud Computing :Social Cloud Computing :
Resource sharing inResource sharing in
virtualized social motivatedvirtualized social motivated
networknetwork
ContentContent
 Introduction
 Key Terms
– Social cloud
– Social Networking
– Cloud Computing
 Social Cloud Architecture
 Facebook Applications
 Pros and cons
 Future Application
 Conclusion
 References
Introduction
 Social networking has become a primary means of communication
between friends, family, and coworkers.
 For Ex. Facebook has over 500 million active users in which 50%
log on every day.
 The structure of a Social Network is a dynamic virtual organization
with inherent trust relationships between friends for resource sharing
in a Social Cloud.
 A large number of commercial Cloud providers are available like
Google App Engine, Amazon Web Services, Citrix, Eucalyptus,
Rackspace, SAP and VMware.
 A cloud-based usage model is used to enable virtualized resource
sharing through service-based interfaces
Social Cloud
 Social cloud is a pool of virtualized computer resources.
 Resource provisioning, change request, reimaging, workload,
rebalancing, monitoring.
 Used in different workloads, interactive and user interfacing
applications.
 Virtual machine – support redundant, self-recovery, high scalable
programming models to recover H/W and S/W failures
Social Networking
 Social Networking is a popular way to connect socially or
professionally similar people
 Most of the Social network on the Web are public and accessing
privileges can be changed
 Social networking provides a two people on planet could meet
through a single environment.
Cloud Computing
 Internet based technology
 Dynamism, Abstraction & Resource sharing
 Platform- Collection or group of integrated and Networked
hardware, software and internet infrastructure
 H/w, S/w, N/w services to Clients.
 Hides complexity infrastructure from user and provide application
by very simple GUI and API.
 Demand services that are always ON, Anywhere, anytime and any
place.
 Used in Google Apps, Mozilla, Amazon Web services(AWS).
Social Cloud Computing
 Unique nature of the Social Cloud is regulating sharing.
 A dynamic “Social Network” is formed from the pre-established trust
through friend relationships within a Social network.
 Combining trust relationships with suitable incentive mechanisms
(through financial payments) may provide much more sustainable
resource sharing.
 Creating a Social Storage Cloud, looking possible market mechanisms
to create a dynamic Cloud infrastructure in a Social network
environment like Facebook is also applicable.
Social Cloud Architecture(1)
 Individual as Social networking is based on the degree of knowledge
 A “friend” - family, a work colleague, a college affiliate, a member
of the same sports club, etc.
 Facebook has recently recognized the need for the creation of such
groups and allows users to differentiate between, for example, close
friends and colleagues.
 For example, a user could limit sharing with close friends only,
friends in the same country, network or group, all friends, or even
friends of friends.
Social Cloud Architecture(2)
Facebook Application
 Facebook exposes access to their social graph through the API,
interface applications can access friends, events, groups, profile
information and photos.
 Multi-Party Online Communication
 Status Update
 Photo Sharing & Voice chat
 File- sharing
 Blogging
 Forums
 Group Discussion
 Applications
Facebook application hosting
environment
The Social Cloud web application generates page content which is
parsed by Facebook to create the page delivered to the user.
The application creates a page based on the request and returns
it to Facebook.
Contd: Facebook application hosting
environment
 At this point the page is parsed and Facebook specific content
is added according to the FBML page instructions.
 The final page is then returned to the user.
 Design consideration for a Social Cloud as access to the cloud
services would be expensive if routed through the Facebook
server and the callback application server to get data from the
actual cloud service.
 To reduce this effect, FBJS can be used to request data
asynchronously from the specified service in a transparent
manner without routing through the application server.
Storage as a Service
 The interface needs to provide a mechanism to create a instance for
a reservation.
 Social storage cloud advertises capacity that is periodically
refreshed and stored in a Monitoring and Discovery System (MDS).
 The social storage cloud is based on a generic Web Services
Resource Framework (WSRF) storage service
 The resource keeps track of service levels as outlined in the
agreement such as the data storage limit.
 The service has interfaces to list storage contents, retrieve the
amount of storage used/available, upload, download, preview, and
delete files.
Registration
 Joining the cloud users first need to register themselves, and then specify
the cloud services they are willing to trade.
 As users are pre authenticated through Facebook, user instances can be
transparently created in the banking service using the user’s Facebook ID.
Social Marketplace
 The social storage cloud implementation includes two concurrent
economic markets, posted price and reverses auctions.
Posted Price
 A user can select any advertised service and define specific
requirements (storage amount, duration, availability, and
penalties) of the provision.
 When the user selects a service they also specify their required
service levels, an SLA is created using the SLA creation component.
 The result of this query is used to populate the posted price offer list
that describes availability and pricing information.
Posted Price marketplace in a Social Cloud
Auction
 Specify their storage requirements, submit an auction request to the
social storage cloud.
 The user’s friends then bid to provide the requested storage. It also
means that “antisocial” behavior such as counter speculation is
fruitless.
 Cloud services compete (bid) for the right to host the user’s task.
 The auctioneer uses the list of Facebook friends to locate a group of
suitable storage services based on user specified requirements; these
are termed the bidders in the auction.
Auction marketplace in a Social Cloud
Auction Contd.
 Each bidder then computes a bid based on the requirements
expressed by the consumer.
 The auctioneer determines the auction winner and creates an SLA
between the auction initiator and the winning bidder.
 As in the posted price mechanism, the agreement is sent to the
specified service for Instantiation and the bank for credit transfer.
 In DRIVE, an Auction Manager (AM) is responsible for creating the
auction, soliciting bids, and determining a winner.
Evaluation
 Outlines measurements obtained from the deployed social storage
cloud.
 The experiments focus on the scalability and performance of the
two social marketplaces and the feasibility of the proposed co-op
infrastructure.
 It is assumed an average Facebook user has 130 friends. The
market-based experiments are run on a single server running
Windows Vista with a 2.2 GHz Dual Core processor and 2 GB
memory.
 This can used to evaluate Posted Price Allocation, Auction
Allocation, Service Overhead, CPU Usage and Memory Usage.
Pros and Cons(1)
 Data security standards are likely to be higher in your provider’s
environment than in your business, especially if the cloud provider
is accredited with ISO and other key industry standards.
 Your cloud provider is likely to be better resourced physically and
financially, to cope with data security threats to its infrastructure
than you.
 Your data will still be available, even if you lose a laptop.
Pros and Cons(2)
 Your data will be stored outside the business network, and possibly
even abroad, which may contravene local data protection laws and
regulations.
 If your internet connection is unstable there may be problems
accessing your services.
 Sites like Facebook and Twitter are highly prone to attack.
 Automatic data back-up and high levels of security are not
guaranteed – due care must be undertaken.
Conclusion
 A Social Cloud is unique in that it builds upon the social incentives
and external real-world relationships inherent in social networks to
provide heterogeneous resource trading.
 In our system Facebook users can discover and trade storage
services contributed by their friends, taking advantage of pre-
existing trust relationships.
 If under load, our system can perform multiple concurrent auctions
that would satisfy the requirements for a moderately sized social
network.
 Our future work aims to generalize our approach so that we can
capture additional marketplaces.
 Construct a social computation cloud that permits trading of virtual
machine images, build a Social Cloud for public scientific
computing (volunteer)
 Scientific collaboration without Incentives
 Social accounting that will be incurred as groups grow in size and
role.
 Business models and social storage cloud to provide a platform for
further experimentation.
 Explore system performance and user interactions on a much larger
scale.
 Used to examine storage and replication algorithms and reduce
security flaws.
Future Work
References
[1] I. Foster, C. Kesselman, and S. Tuecke, “The Anatomy of the Grid:
Enabling Scalable Virtual Organizations,” Int’l J. High Performance
Computing Applications, vol. 15, pp. 200-222, Aug. 2001.
[2] L. Cutillo, R. Molva, and T. Strufe, “Safebook: A Privacy-
Preserving Online Social Network Leveraging on Real-Life Trust,”
IEEE Comm. Magazine, vol. 47, no. 12, pp. 94-101, Dec. 2009.
[3] O. Nov, M. Naaman, and C. Ye, “Analysis of Participation in an
Online Photo-Sharing Community: A Multidimensional
Perspective,” J. Am. Soc. for Information Science and Technology,
vol. 61, no. 3, pp. 555-566, 2010.
Thank you…Thank you…

More Related Content

What's hot

Service-Finder presentation at ESTC2008
Service-Finder presentation at ESTC2008Service-Finder presentation at ESTC2008
Service-Finder presentation at ESTC2008
servicefinder
 
Iaetsd scalable mobile presence cloud with
Iaetsd scalable mobile presence cloud withIaetsd scalable mobile presence cloud with
Iaetsd scalable mobile presence cloud with
Iaetsd Iaetsd
 
Microsoft Windows Azure - Adslot Media & Entertainment Saves Costs Case Study
Microsoft Windows Azure - Adslot Media & Entertainment Saves Costs Case StudyMicrosoft Windows Azure - Adslot Media & Entertainment Saves Costs Case Study
Microsoft Windows Azure - Adslot Media & Entertainment Saves Costs Case Study
Microsoft Private Cloud
 
Chapter 7 web 2.0
Chapter 7   web 2.0Chapter 7   web 2.0
Chapter 7 web 2.0
ash-89
 
EffectiveCrowdSourcingForProductFeatureIdeation v18
EffectiveCrowdSourcingForProductFeatureIdeation v18EffectiveCrowdSourcingForProductFeatureIdeation v18
EffectiveCrowdSourcingForProductFeatureIdeation v18
Karthikeyan Rajasekharan
 

What's hot (18)

Service-Finder presentation at ESTC2008
Service-Finder presentation at ESTC2008Service-Finder presentation at ESTC2008
Service-Finder presentation at ESTC2008
 
Iaetsd scalable mobile presence cloud with
Iaetsd scalable mobile presence cloud withIaetsd scalable mobile presence cloud with
Iaetsd scalable mobile presence cloud with
 
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic WebMulti-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
Multi-Source Provenance-Aware User Interest Profiling on the Social Semantic Web
 
Microsoft Windows Azure - Adslot Media & Entertainment Saves Costs Case Study
Microsoft Windows Azure - Adslot Media & Entertainment Saves Costs Case StudyMicrosoft Windows Azure - Adslot Media & Entertainment Saves Costs Case Study
Microsoft Windows Azure - Adslot Media & Entertainment Saves Costs Case Study
 
Semantic user profiling and Personalised filtering of the Twitter stream
Semantic user profiling and Personalised filtering of the Twitter streamSemantic user profiling and Personalised filtering of the Twitter stream
Semantic user profiling and Personalised filtering of the Twitter stream
 
Social Cloud: Cloud Computing in Social Networks
Social Cloud: Cloud Computing in Social NetworksSocial Cloud: Cloud Computing in Social Networks
Social Cloud: Cloud Computing in Social Networks
 
Web Chat using React Framework
Web Chat using React FrameworkWeb Chat using React Framework
Web Chat using React Framework
 
Chapter 7 web 2.0
Chapter 7   web 2.0Chapter 7   web 2.0
Chapter 7 web 2.0
 
ICONICLOUD Investor Pitch Deck (September 2013)
ICONICLOUD Investor Pitch Deck (September 2013) ICONICLOUD Investor Pitch Deck (September 2013)
ICONICLOUD Investor Pitch Deck (September 2013)
 
Concept of Web 2.0 for business
Concept of Web 2.0 for business Concept of Web 2.0 for business
Concept of Web 2.0 for business
 
Praveenkumar
PraveenkumarPraveenkumar
Praveenkumar
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
First Review(Ppt)
First Review(Ppt)First Review(Ppt)
First Review(Ppt)
 
EffectiveCrowdSourcingForProductFeatureIdeation v18
EffectiveCrowdSourcingForProductFeatureIdeation v18EffectiveCrowdSourcingForProductFeatureIdeation v18
EffectiveCrowdSourcingForProductFeatureIdeation v18
 
The Semantic Web
The Semantic WebThe Semantic Web
The Semantic Web
 
Cs 607-final-report
Cs 607-final-reportCs 607-final-report
Cs 607-final-report
 
Web Community
Web CommunityWeb Community
Web Community
 
Social media marketing campaigns chp 1
Social media marketing campaigns chp 1Social media marketing campaigns chp 1
Social media marketing campaigns chp 1
 

Similar to Social cloud

For this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docxFor this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docx
sleeperharwell
 
For this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docxFor this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docx
lmelaine
 
Sup (Semantic User Profiling)
Sup (Semantic User Profiling)Sup (Semantic User Profiling)
Sup (Semantic User Profiling)
Emanuela Boroș
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
Mervat Bamiah
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
cloudresearcher
 

Similar to Social cloud (20)

Connecting social media to e commerce
Connecting social media to e commerceConnecting social media to e commerce
Connecting social media to e commerce
 
For this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docxFor this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docx
 
For this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docxFor this assignment, select one social institution from the list b.docx
For this assignment, select one social institution from the list b.docx
 
Compositional AI: Fusion of AI/ML Services
Compositional AI: Fusion of AI/ML ServicesCompositional AI: Fusion of AI/ML Services
Compositional AI: Fusion of AI/ML Services
 
introduction to cloudsim
introduction to cloudsimintroduction to cloudsim
introduction to cloudsim
 
Sup (Semantic User Profiling)
Sup (Semantic User Profiling)Sup (Semantic User Profiling)
Sup (Semantic User Profiling)
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using Cloud
 
Cc unit 3 updated version
Cc unit 3 updated versionCc unit 3 updated version
Cc unit 3 updated version
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
BADEL WEB APPLICATION- An Online Web Portal for Donation and Exchangeable Res...
BADEL WEB APPLICATION- An Online Web Portal for Donation and Exchangeable Res...BADEL WEB APPLICATION- An Online Web Portal for Donation and Exchangeable Res...
BADEL WEB APPLICATION- An Online Web Portal for Donation and Exchangeable Res...
 
Privacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal SectorPrivacy Issues of Cloud Computing in the Federal Sector
Privacy Issues of Cloud Computing in the Federal Sector
 
Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)Exploring the cloud deployment and service delivery models (2)
Exploring the cloud deployment and service delivery models (2)
 
Exploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery modelsExploring the cloud deployment and service delivery models
Exploring the cloud deployment and service delivery models
 
Unit 1.3 types of cloud
Unit 1.3 types of cloudUnit 1.3 types of cloud
Unit 1.3 types of cloud
 
About clouds
About cloudsAbout clouds
About clouds
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 
"Badel Web Application"-An online portal for donation and exchangeable resources
"Badel Web Application"-An online portal for donation and exchangeable resources"Badel Web Application"-An online portal for donation and exchangeable resources
"Badel Web Application"-An online portal for donation and exchangeable resources
 
Above theclouds
Above thecloudsAbove theclouds
Above theclouds
 
Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...Identical Users in Different Social Media Provides Uniform Network Structure ...
Identical Users in Different Social Media Provides Uniform Network Structure ...
 

Recently uploaded

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 

Recently uploaded (20)

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 

Social cloud

  • 1. Social Cloud Computing :Social Cloud Computing : Resource sharing inResource sharing in virtualized social motivatedvirtualized social motivated networknetwork
  • 2. ContentContent  Introduction  Key Terms – Social cloud – Social Networking – Cloud Computing  Social Cloud Architecture  Facebook Applications  Pros and cons  Future Application  Conclusion  References
  • 3. Introduction  Social networking has become a primary means of communication between friends, family, and coworkers.  For Ex. Facebook has over 500 million active users in which 50% log on every day.  The structure of a Social Network is a dynamic virtual organization with inherent trust relationships between friends for resource sharing in a Social Cloud.  A large number of commercial Cloud providers are available like Google App Engine, Amazon Web Services, Citrix, Eucalyptus, Rackspace, SAP and VMware.  A cloud-based usage model is used to enable virtualized resource sharing through service-based interfaces
  • 4. Social Cloud  Social cloud is a pool of virtualized computer resources.  Resource provisioning, change request, reimaging, workload, rebalancing, monitoring.  Used in different workloads, interactive and user interfacing applications.  Virtual machine – support redundant, self-recovery, high scalable programming models to recover H/W and S/W failures
  • 5. Social Networking  Social Networking is a popular way to connect socially or professionally similar people  Most of the Social network on the Web are public and accessing privileges can be changed  Social networking provides a two people on planet could meet through a single environment.
  • 6. Cloud Computing  Internet based technology  Dynamism, Abstraction & Resource sharing  Platform- Collection or group of integrated and Networked hardware, software and internet infrastructure  H/w, S/w, N/w services to Clients.  Hides complexity infrastructure from user and provide application by very simple GUI and API.  Demand services that are always ON, Anywhere, anytime and any place.  Used in Google Apps, Mozilla, Amazon Web services(AWS).
  • 7. Social Cloud Computing  Unique nature of the Social Cloud is regulating sharing.  A dynamic “Social Network” is formed from the pre-established trust through friend relationships within a Social network.  Combining trust relationships with suitable incentive mechanisms (through financial payments) may provide much more sustainable resource sharing.  Creating a Social Storage Cloud, looking possible market mechanisms to create a dynamic Cloud infrastructure in a Social network environment like Facebook is also applicable.
  • 8. Social Cloud Architecture(1)  Individual as Social networking is based on the degree of knowledge  A “friend” - family, a work colleague, a college affiliate, a member of the same sports club, etc.  Facebook has recently recognized the need for the creation of such groups and allows users to differentiate between, for example, close friends and colleagues.  For example, a user could limit sharing with close friends only, friends in the same country, network or group, all friends, or even friends of friends.
  • 10. Facebook Application  Facebook exposes access to their social graph through the API, interface applications can access friends, events, groups, profile information and photos.  Multi-Party Online Communication  Status Update  Photo Sharing & Voice chat  File- sharing  Blogging  Forums  Group Discussion  Applications
  • 11. Facebook application hosting environment The Social Cloud web application generates page content which is parsed by Facebook to create the page delivered to the user. The application creates a page based on the request and returns it to Facebook.
  • 12. Contd: Facebook application hosting environment  At this point the page is parsed and Facebook specific content is added according to the FBML page instructions.  The final page is then returned to the user.  Design consideration for a Social Cloud as access to the cloud services would be expensive if routed through the Facebook server and the callback application server to get data from the actual cloud service.  To reduce this effect, FBJS can be used to request data asynchronously from the specified service in a transparent manner without routing through the application server.
  • 13. Storage as a Service  The interface needs to provide a mechanism to create a instance for a reservation.  Social storage cloud advertises capacity that is periodically refreshed and stored in a Monitoring and Discovery System (MDS).  The social storage cloud is based on a generic Web Services Resource Framework (WSRF) storage service  The resource keeps track of service levels as outlined in the agreement such as the data storage limit.  The service has interfaces to list storage contents, retrieve the amount of storage used/available, upload, download, preview, and delete files.
  • 14. Registration  Joining the cloud users first need to register themselves, and then specify the cloud services they are willing to trade.  As users are pre authenticated through Facebook, user instances can be transparently created in the banking service using the user’s Facebook ID.
  • 15. Social Marketplace  The social storage cloud implementation includes two concurrent economic markets, posted price and reverses auctions. Posted Price  A user can select any advertised service and define specific requirements (storage amount, duration, availability, and penalties) of the provision.  When the user selects a service they also specify their required service levels, an SLA is created using the SLA creation component.  The result of this query is used to populate the posted price offer list that describes availability and pricing information.
  • 16. Posted Price marketplace in a Social Cloud
  • 17. Auction  Specify their storage requirements, submit an auction request to the social storage cloud.  The user’s friends then bid to provide the requested storage. It also means that “antisocial” behavior such as counter speculation is fruitless.  Cloud services compete (bid) for the right to host the user’s task.  The auctioneer uses the list of Facebook friends to locate a group of suitable storage services based on user specified requirements; these are termed the bidders in the auction.
  • 18. Auction marketplace in a Social Cloud
  • 19. Auction Contd.  Each bidder then computes a bid based on the requirements expressed by the consumer.  The auctioneer determines the auction winner and creates an SLA between the auction initiator and the winning bidder.  As in the posted price mechanism, the agreement is sent to the specified service for Instantiation and the bank for credit transfer.  In DRIVE, an Auction Manager (AM) is responsible for creating the auction, soliciting bids, and determining a winner.
  • 20. Evaluation  Outlines measurements obtained from the deployed social storage cloud.  The experiments focus on the scalability and performance of the two social marketplaces and the feasibility of the proposed co-op infrastructure.  It is assumed an average Facebook user has 130 friends. The market-based experiments are run on a single server running Windows Vista with a 2.2 GHz Dual Core processor and 2 GB memory.  This can used to evaluate Posted Price Allocation, Auction Allocation, Service Overhead, CPU Usage and Memory Usage.
  • 21. Pros and Cons(1)  Data security standards are likely to be higher in your provider’s environment than in your business, especially if the cloud provider is accredited with ISO and other key industry standards.  Your cloud provider is likely to be better resourced physically and financially, to cope with data security threats to its infrastructure than you.  Your data will still be available, even if you lose a laptop.
  • 22. Pros and Cons(2)  Your data will be stored outside the business network, and possibly even abroad, which may contravene local data protection laws and regulations.  If your internet connection is unstable there may be problems accessing your services.  Sites like Facebook and Twitter are highly prone to attack.  Automatic data back-up and high levels of security are not guaranteed – due care must be undertaken.
  • 23. Conclusion  A Social Cloud is unique in that it builds upon the social incentives and external real-world relationships inherent in social networks to provide heterogeneous resource trading.  In our system Facebook users can discover and trade storage services contributed by their friends, taking advantage of pre- existing trust relationships.  If under load, our system can perform multiple concurrent auctions that would satisfy the requirements for a moderately sized social network.  Our future work aims to generalize our approach so that we can capture additional marketplaces.
  • 24.  Construct a social computation cloud that permits trading of virtual machine images, build a Social Cloud for public scientific computing (volunteer)  Scientific collaboration without Incentives  Social accounting that will be incurred as groups grow in size and role.  Business models and social storage cloud to provide a platform for further experimentation.  Explore system performance and user interactions on a much larger scale.  Used to examine storage and replication algorithms and reduce security flaws. Future Work
  • 25. References [1] I. Foster, C. Kesselman, and S. Tuecke, “The Anatomy of the Grid: Enabling Scalable Virtual Organizations,” Int’l J. High Performance Computing Applications, vol. 15, pp. 200-222, Aug. 2001. [2] L. Cutillo, R. Molva, and T. Strufe, “Safebook: A Privacy- Preserving Online Social Network Leveraging on Real-Life Trust,” IEEE Comm. Magazine, vol. 47, no. 12, pp. 94-101, Dec. 2009. [3] O. Nov, M. Naaman, and C. Ye, “Analysis of Participation in an Online Photo-Sharing Community: A Multidimensional Perspective,” J. Am. Soc. for Information Science and Technology, vol. 61, no. 3, pp. 555-566, 2010.