Advertisement

On the Design of Trustworthy Compute Frameworks for Self-organizing Digital Institutions

  • Thomas Hardjono
  • Patrick Deegan
  • John Henry Clippinger
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8531)

Abstract

This paper provides an overview of the Open Mustard Seed (OMS) project that seeks to develop a social interaction platform to facilitate group affiliations based on Reed’s Law [1]. Reed posits that the value of a network soars when users are given the tools for free and responsible association for common purposes. The OMS as tool for common association supports the ability for people to form self-organizing groups following the notion of the data commons put forward by Elinor Ostrom [2]. The data commons in OMS consists of various personal data which the owner has agreed to contribute into what Ostrom calls the common-pool resource, and which is to be managed by the self-organized group or institution. This paper discusses some design considerations of the OMS platform from the perspective of the privacy and security of the personal data that participate in the common-pool resource. The technical core value of the OMS lies in its construction of the Trusted Compute Cells, which are intended to be recombinable and embeddable units of logic, computation and storage.

Keywords

Reed’s Law personal data open data commons social computing virtualization cloud computing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Reed, D.P.: That Sneaky Exponential – Beyond Metcalfe’s Law to the Power of Community Building (1999), http://www.reed.com/dpr/locus/gfn/reedslaw.html
  2. 2.
    Ostrom, E.: Beyond Markets and States: Polycentric Governance of Complex Economic Systems. Nobel Prize Lecture (December 8, 2009), http://www.nobelprize.org
  3. 3.
    Pentland, A.: Reality Mining of Mobile Communications: Toward a New Deal on Data. In: Dutta, S., Mia, I. (eds.) The Global Information Technology Report 2008-2009: Mobility in a Networked World, World Economic Forum 2009, pp. 75–80 (2009), http://hd.media.mit.edu/wef_globalit.pdf
  4. 4.
    World Economic Forum, Personal Data: The Emergence of a New Asset Class (2011), http://www.weforum.org/reports/personal-data-emergence-new-asset-class
  5. 5.
    ID3, Institute for Data Driven Design (2013), http://www.idcubed.org
  6. 6.
    Clippinger, J.: The Next Great Internet Disruption: Authority and Governance. ID3 (2013), http://idcubed.org
  7. 7.
    Clippinger, J.: A Crowd of One: The Future of Individual Identity. Public Affairs/Perseus Group (2007)Google Scholar
  8. 8.
    Pentland, A.: Data Driven Societies (2012), http://media.mit.edu/pentland
  9. 9.
    Mani, A., Ozdaglar, A., Pentland, A.: Stable, Fair Societies as the Natural Product of Local Exchange Networks. In: Proceedings of the 2010 Workshop on Information in Networks  (2010), http://media.mit.edu/pentland
  10. 10.
    Trusted Computing Group, TPM 1.2 Specifications (2011), http://www.trustedcomputinggroup.org
  11. 11.
    The Jericho Forum, “Identity Commandments,” The Open Group (2011), http://www.opengroup.org
  12. 12.
    Hardjono, T., Greenwood, D., Pentland, A.: Towards a trustworthy digital infrastructure for core identities and personal data stores. In: Proceedings of the ID360 Conference on Identity, University of Texas (April 2013)Google Scholar
  13. 13.
    OASIS, “Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0 (March 2005), http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf
  14. 14.
    de Montjoye, Y.A., Shmueli, E., Wang, S., Pentland, A.: openPDS: Regaining ownership and privacy of personal data (2013) (Submitted for publication) Google Scholar
  15. 15.
    Trusted Computing Group, Trusted Computing Group Web Site, http://www.trustedcomputinggroup.org
  16. 16.
    Zic, J., Hardjono, T.: Towards a cloud-based integrity measurement service. In: Journal of Cloud Computing: Advances, Systems and Applications (February 2013)Google Scholar
  17. 17.
    Trusted Computing Group, TCG Interoperability Specifications for Backup and Migration Services (v1.0), Trusted Computing Group, TCG Issued Specification resources (June 2005), http://www.trustedcomputinggroup.org/
  18. 18.
    Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vTPM: Virtualizing the Trusted Platform Module. In: Security 2006: 15th USENIX Security Symposium, Vancouver, Canada (July-August 2006), http://www.usenix.org

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Thomas Hardjono
    • 1
  • Patrick Deegan
    • 2
  • John Henry Clippinger
    • 2
  1. 1.MIT Kerberos & Internet Trust ConsortiumMassachusetts Institute of TechnologyCambridgeUSA
  2. 2.ID3 & MIT Media LabMassachusetts Institute of TechnologyCambridgeUSA

Personalised recommendations