Computer Science CS 553 Internet Services

Fall 2015

Time: Wednesdays, 10:20AM - 1:20PM
Place: SEC building, room 117
Instructor: Richard Martin

Position Paper

The Position Paper assignment can be found here Due: Friday, Decemeber 18th - check the Sakai assignments section


Although over 40 years old, the Internet and its related services continue evolving and expanding at a rapid pace. It's beginnings included services such as file transfer, remote terminal, and email. The 1990's saw the rise of hypertext linked documents, and advertising supported search and retrieval. New services continue to evolve, including recent ones centered on social networking, cloud storage and computing, video streaming, and file sharing.

In this course we will explore the use of existing and emerging Internet Services to realize the emerging concept of the digital self. Humanity originated in the physical domain, thus our perceptions, awareness, relationships, and interactions have been shaped by the physical environment. Emerging Internet services, however, create vast new cyber-worlds. Well known examples include social networks, clouds, and digital currencies. Newer, growing services include reputation networks and digital wellness.

The digital self seeks to integrate these seeming disparate services into the construction of a holistic entity representing our logical selves in these new cyber-worlds. Like the physical self, it would process observations to draw conclusions about it's state. For example, many digital wellness projects seek to use sensing and communications to draw conclusions about the health of the user.

Also, as in the physical world, the digital self would interact with other selves to accomplish goals. For example, recent work seeks to build distributed social network services for the purposes of political organization and open-source software collaboration.

In spite of these analogies to the physical self, there remain many unsolved challenges to realizing the digital self. Large volumes of unprocessed data need to be not only collected, but organized, managed, searched and analyzed in meaningful ways. Existing cloud storage approaches lay some groundwork these needs, but additional layers of search, analysis and alerts could be added.

Like the physical self, choosing whom to communicate with, when and how will become more important. While one strength of the Internet is its open communication model, recent system have shown the value of more restricted communications. Spam and trolls are examples of the impacts very open systems. Authentication of the digital self is thus a critical challenge. While existing schemes, such as public keys and certificates, offer building blocks, newer communication models will be needed.

A difficult challenge is the integration of the multiple roles into the digital self. For example, people have different, but overlapping, roles and presentations for work, family, leisure, and civic life. Within each of these spheres, the public and private presentations and communications often differ in type and kind. The ability to re-create the limiting scope and memory of the physical world are thus key challenges towards creating digital selves that can offer similar levels of interaction.


  1. Overview
  2. Values in Design
  3. Reliability
  4. Storage
  5. Cloud Processing
  6. Data Security
  7. Authentication
  8. Digital Currency
  9. Wearables and Mobile Applications
  10. Lifelogs
  11. Lifestreams
  12. M-health
  13. Decentralized Social Networks

Schedule: qu
Week Date Topics Readings Questions Due
1 Sept. 2nd Introduction none none Entrance Exam
2 Sept. 9th Values in Design 1,2 TXT Form Project Groups
3 Sept. 16th Reliability 3,4,5 TXT Finalize Partners
4 Sept. 23rd Security 5,6,7,8,9 TXT
5 Sept. 30th Architecture 10,11,12 TXT Project Submission
6 Sept. 30th Architecture 13,14 TXT
7 Oct. 7th System Design 15,16 TXT
8 Oct. 14th Identity 17,18,21 TXT Position Paper Idea submission
9 Oct. 21st Storage 22,23 TXT
10 Oct. 28th Storage 24,25 TXT First Draft of Position Paper
11 Nov. 4th Computing 26,27 TXT Project reviews
12 Nov. 11th Computing 28,29 TXT Position Paper review
13 Nov. 18th Digital Currency 30,31 --- Revised Position Papers
14 Nov. 25th No class --- --- NO CLASS
15 Dec. 2nd Lifelogging 32,33 ---
16 Dec. 9th M-health 36,37 --- Final Projects Due Dec 16th


Values in Design

1. Friedman, B., and Kahn, P. H., Jr. (2003). Human values, ethics, and design. In J. A. Jacko and A. Sears (Eds.), The human-computer interaction handbook, 1177-1201. Mahwah, NJ: Lawrence Erlbaum Associates. [Revised second edition, 2008, pp. 1241-1266.] PDF

2. Nissenbaum, H. "Will Security Enhance Trust Online, or Supplant It?" Trust and Distrust in Organizations: Dilemmas and Approaches. Roderick M. Kramer & Karen S. Cook, Editors Volume VII in the Russell Sage Foundation Series on Trust. Russell Sage Foundation, New York, 2004.


3. A. Avizienis, J.-C. Laprie, B. Randell, Fundamental concepts in dependability,Proceedings of the Third Information Survivability Workshop, October 2000. PDF

4. Oppenheimer, et. al. Why do Internet Services Fail, What Can Be Done About It? USENIX USITS 2003, PDF

5. Schroeder, B and Gibson, G.A., A large-scale study of failures in high-performance computing systems, IEEE Transaction on Dependable and Secure Computing, Vol.7, Iss. 4, Feb. 2009. PDF (inside Rutgers) PDF (from Sakai)


6. Panky, Crypto Primer: Understanding encryption, public/private key, signatures and certificates, HTML

7. John Mitchell, Cryptography Overview, PDF, PPT

8. Kevin Fu, Emil Sit, Kendra Smith, Nick Feamster, Dos and Don'ts of Client Authentication on the Web PDF, HTML

9. Thorsten Holz,Moritz Steiner,Frederic Dahl,Ernst Biersack Felix Freiling, Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, Article No. 9 PDF

Service Architecture

10. Brewer. Lessons from Giant-Scale Services.  IEEE Internet Computing, July/August, 2001. PDF

11. Armbrust, Michael, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee et al. "A view of cloud computing." Communications of the ACM 53, no. 4 (2010): 50-58. PDF

12. Barroso et al. Web Search for a Planet: The Google Cluster Architecture.  IEEE Micro, March/April, 2003. PDF

13. Verma, Abhishek, Luis Pedrosa, Madhukar Korupolu, David Oppenheimer, Eric Tune, and John Wilkes. "Large-scale cluster management at Google with Borg." In Proceedings of the Tenth European Conference on Computer Systems, p. 18. ACM, 2015. PDF

14. Nygren et al. The Akamai Network: A Platform for High-Performance Internet Applications. ACM SIGOPS Vol.44, No. 3, July 2010 PDF

System Design

15. Butler W. Lampson, Hints for Computer System Design,July 1983. PDF

16. Richard P. Gabriel,The rise is Worse is Better., 1989 HTML

Identity Management

17. A Conceptual Model of Multiple Dimensions of Identity Susan R. Jones Marylu K. McEwen PDF

18. John R. Suler, Identity Management in Cyberspace, Journal of Applied Psychoanalytic Studies, Vol. 4, No. 4, October 2002 HTML

19. Meredith M. Skeels and Jonathan Grudin, When Social Networks Cross Boundaries: A Case Study of Workplace Use of Facebook and LinkedIn,Proceedings of the ACM 2009 international conference on Supporting group work, ACM, 2009

20. Andrew Besmer and Heather Richter Lipford Moving Beyond Untagging: Photo Privacy in a Tagged World

21. Arvind Narayanan and Vitaly Shmatikov, Robust De-anonymization of Large Sparse Datasets, PDF

Large-Scale Cloud Storage

22. Ghemawat et al. The Google File System. SOSP, 2003. PDF

23. Chang et al. Bigtable: A Distributed Storage System for Structured Data. OSDI 2006. PDF

24. Candia et al. Dynamo: Amazon's Highly Available Key-value Store.  SOSP, 2007. PDF

25. Beaver et al. Finding a Needle in Haystack: Facebook's Photo Storage. OSDI, 2010. PDF

Compute Models

26. Dean and Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. OSDI, 2004. PDF

27. Zaharia, Matei, Mosharaf Chowdhury, Michael J. Franklin, Scott Shenker, and Ion Stoica. "Spark: cluster computing with working sets." In Proceedings of the 2nd USENIX conference on Hot topics in cloud computing, vol. 10, p. 10. 2010. PDF

28. Pig Latin: A Not So-Foreign Language for Data Processing. PDF SIGMOD, 2008

29. Barham et al. Xen and the Art of Virtualization. ACM SOSP, 2003. PDF

Digital Currencies

30. Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." Consulted 1.2012 (2008): 28.

31. Fergal Reid and Martin Harrigan,An Analysis of Anonymity in the Bitcoin System PDF

Lifelogging and LifeStreams

32. Cathal Gurrin, Alan F. Smeaton, Aiden R. Doherty LifeLogging: Personal Big Data

33. Sellen, Abigail J., and Steve Whittaker. "Beyond total capture: a constructive critique of lifelogging." Communications of the ACM 53, no. 5 (2010): 70-77.

Mobile Health

34. Feasibility of Popular m-Health Technologies for Activity Tracking Among Individuals with Serious Mental Illness

35. Naslund John A., Aschbrenner Kelly A., Barre Laura K., and Bartels Stephen J.. Telemedicine and e-Health. March 2015, 21(3): 213-216. doi:10.1089/tmj.2014.0105.

36.Deborah Estrin and Ida Sim, An Engine for Health Care Innovation, Science, Nov. 2010 PDF

37.Tomlinson et. al. mHealth: Where Is the Evidence?, PLOS Medicine, Feb, 2013 PDF

Personal Storage

32. Mun, Min, et al. "Personal data vaults: a locus of control for personal data streams." Proceedings of the 6th International Conference. ACM, 2010.

38. Jiaqiu Wang and Zhongjie A Survey on Personal Data The Scientific World Journal, vol. 2014, Article ID 969150, 13 pages, 2014. doi:10.1155/2014/969150

39. Linked Data - The Story So Far Christian Bizer (Freie UniversitBerlin, Germany), Tom Heath (Talis Information Ltd, UK) and Tim Berners-Lee (Massachusetts Institute of Technology, USA)

40. User-Managed Access Control in Web Based Social Networks Lorena Gonzalez-Manzano, Ana I. Gonzalez-Tablas, Jose M. de Fuentes, Arturo Ribagorda.

41. A Critical Look at Decentralized Personal Data Architectures Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh

Comparison of software and protocols for distributed social networking

Distributed Systems

Lamport.  Time, Clocks and the Ordering of Events in a Distributed Systems. CACM 21(7), 1978.

Ousterhout.  The Role of Distributed State. CMU Computer Science: a 25th Anniversary Commemorative, 1991.

Lamport.  Paxos Made Simple. ACM SIGACT News 32(4), 2001.

Burrows.  The Chubby Lock Service for Loosely-Coupled Distributed Systems.  OSDI, 2006.

Michael Piatek, Tomas Isdal, Thomas Anderson, Arvind Krishnamurthy, Arun Venkataramani Do incentives build robustness in BitTorrent?