Time: Wednesdays, 10:20AM - 1:20PM
Place: SEC building, room 117
Instructor: Richard Martin
Although over 40 years old, the Internet and its related services continue evolving and expanding at a rapid pace. It's beginnings included services such as file transfer, remote terminal, and email. The 1990's saw the rise of hypertext linked documents, and advertising supported search and retrieval. New services continue to evolve, including recent ones centered on social networking, cloud storage and computing, video streaming, and file sharing.
In this course we will explore the use of existing and emerging Internet Services to realize the emerging concept of the digital self. Humanity originated in the physical domain, thus our perceptions, awareness, relationships, and interactions have been shaped by the physical environment. Emerging Internet services, however, create vast new cyber-worlds. Well known examples include social networks, clouds, and digital currencies. Newer, growing services include reputation networks and digital wellness.
The digital self seeks to integrate these seeming disparate services into the construction of a holistic entity representing our logical selves in these new cyber-worlds. Like the physical self, it would process observations to draw conclusions about it's state. For example, many digital wellness projects seek to use sensing and communications to draw conclusions about the health of the user.
Also, as in the physical world, the digital self would interact with other selves to accomplish goals. For example, recent work seeks to build distributed social network services for the purposes of political organization and open-source software collaboration.
In spite of these analogies to the physical self, there remain many unsolved challenges to realizing the digital self. Large volumes of unprocessed data need to be not only collected, but organized, managed, searched and analyzed in meaningful ways. Existing cloud storage approaches lay some groundwork these needs, but additional layers of search, analysis and alerts could be added.
Like the physical self, choosing whom to communicate with, when and how will become more important. While one strength of the Internet is its open communication model, recent system have shown the value of more restricted communications. Spam and trolls are examples of the impacts very open systems. Authentication of the digital self is thus a critical challenge. While existing schemes, such as public keys and certificates, offer building blocks, newer communication models will be needed.
A difficult challenge is the integration of the multiple roles into the digital self. For example, people have different, but overlapping, roles and presentations for work, family, leisure, and civic life. Within each of these spheres, the public and private presentations and communications often differ in type and kind. The ability to re-create the limiting scope and memory of the physical world are thus key challenges towards creating digital selves that can offer similar levels of interaction.
|1||Sept. 2nd||Introduction||none||none||Entrance Exam|
|2||Sept. 9th||Values in Design||1,2||TXT||Form Project Groups|
|3||Sept. 16th||Reliability||3,4,5||TXT||Finalize Partners|
|5||Sept. 30th||Architecture||10,11,12||TXT||Project Submission|
|7||Oct. 7th||System Design||15,16||TXT|
|8||Oct. 14th||Identity||17,18,21||TXT||Position Paper Idea submission|
|10||Oct. 28th||Storage||24,25||TXT||First Draft of Position Paper|
|11||Nov. 4th||Computing||26,27||TXT||Project reviews||12||Nov. 11th||Computing||28,29||TXT||Position Paper review|
|13||Nov. 18th||Digital Currency||30,31||---||Revised Position Papers|
|14||Nov. 25th||No class||---||---||NO CLASS||15||Dec. 2nd||Lifelogging||32,33||---|
|16||Dec. 9th||M-health||36,37||---||Final Projects Due Dec 16th|
2. Nissenbaum, H. "Will Security Enhance Trust Online, or Supplant It?" Trust and Distrust in Organizations: Dilemmas and Approaches. Roderick M. Kramer & Karen S. Cook, Editors Volume VII in the Russell Sage Foundation Series on Trust. Russell Sage Foundation, New York, 2004.
3. A. Avizienis, J.-C. Laprie, B. Randell,
Fundamental concepts in dependability,Proceedings of the Third Information Survivability Workshop,
October 2000. PDF
4. Oppenheimer, et. al. Why do Internet Services Fail, What Can Be Done About It? USENIX USITS 2003, PDF
5. Schroeder, B and Gibson, G.A., A large-scale study of failures in high-performance computing systems, IEEE Transaction on Dependable and Secure Computing, Vol.7, Iss. 4, Feb. 2009. PDF (inside Rutgers) PDF (from Sakai)
7. John Mitchell, Cryptography Overview, PDF, PPT
8. Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster, Dos and Don'ts of Client Authentication on the Web PDF, HTML
9. Thorsten Holz,Moritz Steiner,Frederic Dahl,Ernst Biersack Felix Freiling, Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, Article No. 9 PDF
11. Armbrust, Michael, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee et al. "A view of cloud computing." Communications of the ACM 53, no. 4 (2010): 50-58. PDF
12. Barroso et al. Web Search for a Planet: The Google Cluster Architecture. IEEE Micro, March/April, 2003. PDF
13. Verma, Abhishek, Luis Pedrosa, Madhukar Korupolu, David Oppenheimer, Eric Tune, and John Wilkes. "Large-scale cluster management at Google with Borg." In Proceedings of the Tenth European Conference on Computer Systems, p. 18. ACM, 2015. PDF
14. Nygren et al. The Akamai Network: A Platform for High-Performance Internet Applications. ACM SIGOPS Vol.44, No. 3, July 2010 PDF
16. Richard P. Gabriel,The rise is Worse is Better., 1989 HTML
18. John R. Suler, Identity Management in Cyberspace, Journal of Applied Psychoanalytic Studies, Vol. 4, No. 4, October 2002 HTML
19. Meredith M. Skeels and Jonathan Grudin, When Social Networks Cross Boundaries: A Case Study of Workplace Use of Facebook and LinkedIn,Proceedings of the ACM 2009 international conference on Supporting group work, ACM, 2009
20. Andrew Besmer and Heather Richter Lipford Moving Beyond Untagging: Photo Privacy in a Tagged World
21. Arvind Narayanan and Vitaly Shmatikov, Robust De-anonymization of Large Sparse Datasets, PDF
23. Chang et al. Bigtable: A Distributed Storage System for Structured Data. OSDI 2006. PDF
24. Candia et al. Dynamo: Amazon's Highly Available Key-value Store. SOSP, 2007. PDF
25. Beaver et al. Finding a Needle in Haystack: Facebook's Photo Storage. OSDI, 2010. PDF
27. Zaharia, Matei, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, and Ion Stoica. "Spark: cluster computing with working sets." In Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, vol. 10, p. 10. 2010. PDF
28. Pig Latin: A Not So-Foreign Language for Data Processing. PDF SIGMOD, 2008
29. Barham et al. Xen and the Art of Virtualization. ACM SOSP, 2003. PDF
31. Fergal Reid and Martin Harrigan,An Analysis of Anonymity in the Bitcoin System PDF
33. Sellen, Abigail J., and Steve Whittaker. "Beyond total capture: a constructive critique of lifelogging." Communications of the ACM 53, no. 5 (2010): 70-77.
34. Feasibility of Popular m-Health Technologies for Activity Tracking Among Individuals with Serious Mental Illness
35. Naslund John A., Aschbrenner Kelly A., Barre Laura K., and Bartels Stephen J.. Telemedicine and e-Health. March 2015, 21(3): 213-216. doi:10.1089/tmj.2014.0105.http://online.liebertpub.com/doi/abs/10.1089/tmj.2014.0105
36.Deborah Estrin and Ida Sim, An Engine for Health Care Innovation, Science, Nov. 2010 PDF
37.Tomlinson et. al. mHealth: Where Is the Evidence?, PLOS Medicine, Feb, 2013 PDF
38. Jiaqiu Wang and Zhongjie A Survey on Personal Data The Scientific World Journal, vol. 2014, Article ID 969150, 13 pages, 2014. doi:10.1155/2014/969150 http://www.hindawi.com/journals/tswj/2014/969150/cta
39. Linked Data - The Story So Far Christian Bizer (Freie UniversitBerlin, Germany), Tom Heath (Talis Information Ltd, UK) and Tim Berners-Lee (Massachusetts Institute of Technology, USA)
40. User-Managed Access Control in Web Based Social Networks Lorena Gonzalez-Manzano, Ana I. Gonzalez-Tablas, Jose M. de Fuentes, Arturo Ribagorda. http://link.springer.com/chapter/10.1007/978-3-7091-0894-9_4
41. A Critical Look at Decentralized Personal Data Architectures Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh
Comparison of software and protocols for distributed social networking
Ousterhout. The Role of Distributed State. CMU Computer Science: a 25th Anniversary Commemorative, 1991.
Lamport. Paxos Made Simple. ACM SIGACT News 32(4), 2001.
Burrows. The Chubby Lock Service for Loosely-Coupled Distributed Systems. OSDI, 2006.
Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani Do incentives build robustness in BitTorrent?