[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

DIaC: Re-Imagining Decentralized Infrastructure as Code Using Blockchain

Published: 18 October 2023 Publication History

Abstract

With the recent advances in concepts like decentralized “cloud” and blockchain-enabled decentralized computing environments, the legacy modeling and orchestration tools developed to support centrally managed cloud-based ICT infrastructures are challenged by such a new paradigm built on top of decentralization. On the other hand, decentralized “cloud” and computing infrastructures need to support many Dapp use cases. As the complexity of these targeted application scenarios increases, there is an urgent need for developing automation and modeling tools for deploying and managing decentralized infrastructures. Instead of creating such tools from scratch, a natural approach is extending mature infrastructure modeling tools for Dapps and decentralized computing environments. To this end, in this work, we have developed extensions to the TOSCA domain-specific language to support smart contract specification of decentralized computing infrastructures for supporting Dapps, where smart contracts or chain codes manage a decentralized computing environment. The result is blockchain-based orchestration and automation for decentralized “cloud” and computing environments that use existing infrastructure as code tools to deploy and manage decentralized applications.

References

[1]
D. Weerasiri, M. C. Barukh, B. Benatallah, Q. Z. Sheng, and R. Ranjan, “A taxonomy and survey of cloud resource orchestration techniques,” ACM Comput. Surveys, vol. 50, no. 2, pp. 1–41, 2017.
[2]
K. Morris, Infrastructure as Code: Managing Servers in the Cloud, O’Reilly Media, Inc., Sebastopol, CA, USA 2016.
[3]
A. Brogi, J. Soldani, and P. Wang, “Tosca in a nutshell: Promises and perspectives,” in Proc.Eur. Conf. Service-Oriented Cloud Comput., 2014, pp. 171–186.
[4]
A. Luzar, S. Stanovnik, and M. Cankar, “Examination and comparison of tosca orchestration tools,” in Proc. Eur. Conf. Softw. Archit., 2020, pp. 247–259.
[5]
S. Nakamoto (Las Vegas, NV, USA).Bitcoin: A Peer-to-Peer Electronic Cash System. (Dec. 2008). Accessed: Jul. 1, 2015. [Online]. Available: https://bitcoin.org/bitcoin.pdf
[6]
V. Buterin, “Ethereum: A next-generation smart contract and decentralized application platform,” Ethereum, Zug, Switzerland, White Paper, 2014, Accessed: Aug. 22, 2016. [Online]. Available: https://github.com/ethereum/wiki/wiki/White-Paper
[7]
Golem.” 2020. [Online]. Available: https://golem.network/
[8]
Iexec.” Accessed: Nov. 14, 2022. [Online]. Available: https://iex.ec/
[9]
Sonm.” Accessed: Nov. 14, 2022. [Online]. Available: https://sonm.com/
[10]
Uchain.” Accessed: Nov. 14, 2022. [Online]. Available: https://uchain.world/
[11]
B. Yan, P. Chen, X. Li, and Y. Wang, “Nebula: A blockchain based decentralized sharing computing platform,” in Proc. Blockchain Trustworthy Syst., 2020, pp. 715–731.
[12]
T. Hanke, M. Movahedi, and D. Williams, “DFINITY technology overview series, consensus system,” Jan. 2018, arXiv:1805.04548.
[13]
Ocean Protocol: A Decentralized Substrate for AI Data and Services, Ocean Protocol Found., Singapore, 2018.
[14]
Intel software guard extensions.” Intel. Accessed: Nov. 14, 2022. [Online]. Available: https://software.intel.com/sites/default/files/332680-001.pdf
[15]
A. Bergmayret al., “A systematic review of cloud modeling languages,” ACM Comput. Surv., vol. 51, no. 1, pp. 1–38, Feb. 2018. [Online]. Available: https://doi.org/10.1145/3150227
[16]
K. Kritikos, P. Skrzypek, A. Moga, and O. Matei, “Towards the modelling of hybrid cloud applications,” in Proc. IEEE 12th Int. Conf. Cloud Comput. (CLOUD), 2019, pp. 291–295.
[17]
TOSCA simple profile in YAML version 1.3.” Accessed: Nov. 14, 2022. [Online]. Available: https://docs.oasis-open.org/tosca/TOSCA-Simple-ProfileYAML/v1.3/TOSCA-Simple-Profile-YAML-v1.3.html
[18]
J. Benet, “IPFS—Content addressed, versioned, P2P file system,” 2014, arXiv:1407.3561.
[19]
K. Tokunaga, “P2P container image distribution on IPFS with containerd and nerdctl,” in Proc. Free Open Source Softw. Devel.’ Eur. Meeting (FOSDEM), 2022, pp. 4–14.
[20]
A. Kiayias, A. Russell, B. David, and R. Oliynykov, “Ouroboros: A provably secure proof-of-stake blockchain protocol,” in Proc. Adv. Cryptology– CRYPTO, 2017, pp. 357–388.
[21]
M. Castro and B. Liskov, “Practical Byzantine fault tolerance,” in Proc. 3rd Symp. Operating Syst. Design Implement., 1999, pp. 173–186.
[22]
Y. Xiao, N. Zhang, W. Lou, and Y. T. Hou, “A survey of distributed consensus protocols for blockchain networks,” IEEE Commun. Surveys Tuts., vol. 22, no. 2, pp. 1432–1465, 2nd Quart., 2020.
[23]
Harmony white paper. Version 2.0.” Accessed: Jan. 10, 2021. [Online]. Available: https://harmony.one/whitepaper.pdf
[24]
The maker protocol: Makerdao’s multi-collateral Dai (MCD) system,” Maker.com. Accessed: Nov. 14, 2022. [Online]. Available: https://makerdao.com/whitepaper/White%20Paper%20-The%20Maker%20Protocol_%20MakerDAO%E2%80%99s%20Multi-Collateral%20Dai%20(MCD)%20System-FINAL-%20021720.pdf
[25]
H. Adams, N. Zinsmeister, M. Salem, R. Keefer, and D. Robinson, “Uniswap v3 core,” Uniswap, Tech. Uniswap, Brooklyn, NY, USA, Rep., 2021.
[26]
S. Micali, M. Rabin, and S. Vadhan, “Verifiable random functions,” in Proc. 40th Ann. Symp. Found. Comput. Sci (Cat. No.99CB37039), 1999, pp. 120–130.
[27]
AMD SEV-SNP: Strengthening VM isolation with integrity protection and more,” Adv. Micro Devices, Inc., Santa Clara, CA, USA, White Paper, Jan. 2020.
[28]
D. Kaplan, “AMD x86 memory encryption technologies,” in Proc. 25th USENIX Security Symp., Aug. 2016, pp. 9–11.
[29]
D. Kaplan, J. Powell, and T. Woller, “AMD memory encryption,” Adv. Micro Devices, Inc., Santa Clara, CA, USA, White Paper, 2016.
[30]
R. Chenget al., “Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts,” in Proc. IEEE Eur. Sympo. Security Privacy (Euro S&P), 2019, pp. 185–200.
[31]
P. Feldman, “A practical scheme for non-interactive verifiable secret sharing,” in Proc. 28th Ann. Symp. Found. Comput. Sci., 1987, pp. 427–438. [Online]. Available: https://doi.org/10.1109/SFCS.1987.4
[32]
A. Nilsson, P. N. Bideh, and J. Brorsson, “A survey of published attacks on intel SGX,” 2020, arXiv:2006.13598.
[33]
M. Drijverset al., “On the security of two-round multi-signatures,” IACR, Bellevue, WA, USA, Rep. 2018/417, 2018, [Online]. Available: https://ia.cr/2018/417
[34]
E. Androulakiet al., “Hyperledger fabric: A distributed operating system for permissioned blockchains,” in Proc. 13th Euro. Syst. Conf., 2018, pp. 1–15.
[35]
P. Thakkar, S. Nathan, and B. Viswanathan, “Performance benchmarking and optimizing hyperledger fabric blockchain platform,” 2018, arXiv:1805.11390v1.
[36]
C. Gorenflo, S. Lee, L. Golab, and S. Keshav, “Fastfabric: Scaling hyperledger fabric to 20 000 transactions per second,” Int. J. Netw. Manag., vol. 30, no. 5, p. e2099, 2099. [Online]. Available: https://onlinelibrary.wiley.com/doi/abs/10.1002/nem.2099
[37]
A. Rahman, R. Mahdavi-Hezaveh, and L. Williams, “A systematic mapping study of infrastructure as code research,” Inf. Softw. Technol., vol. 108, pp. 65–77, Apr. 2019. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0950584918302507
[38]
W. Hummer, F. Rosenberg, F. Oliveira, and T. Eilam, “Testing idempotence for infrastructure as code,” in Proc. Middleware, 2013, pp. 368–388.
[39]
K. Gai, J. Guo, L. Zhu, and S. Yu, “Blockchain meets cloud computing: A survey,” IEEE Commun. Surveys Tuts., vol. 22, no. 3, pp. 2009–2030, 3rd Quart., 2020.
[40]
M. Artac, T. Borovssak, E. Di Nitto, M. Guerriero, and D. A. Tamburri, “Devops: Introducing infrastructure-as-code,” in Proc. IEEE/ACM 39th Int. Conf. Soft. Eng. (ICSE-C), 2017, pp. 497–498.
[41]
A. Tsagkaropoulos, Y. Verginadis, M. Compastié, D. Apostolou, and G. Mentzas, “Extending tosca for edge and fog deployment support,” Electronics, vol. 10, no. 6, p. 737, 2021. [Online]. Available: https://www.mdpi.com/2079-9292/10/6/737
[42]
M. Kim, T.-X. Do, and Y. Kim, “Tosca-based clustering service for network function virtualization,” in Proc. Int. Conf. Inf. Commun. Technol. Convergence (ICTC), 2016, pp. 1176–1178.
[43]
R. Karanjaiet al., “Decentralized application infrastructures as smart contract codes,” in Proc. IEEE Int. Conf. Blockchain Cryptocurrency (ICBC), 2022, pp. 1–9.
[44]
N. Donsuypae, “Decentralized cross-organizational application deployment using multiple different deployment automation technologies,” M.S. thesis, Inst. Archit. Appl. Syst., Univ. Stuttgart, Stuttgart, Germany, 2021.
[45]
K. Wild, U. Breitenbücher, K. Képes, F. Leymann, and B. Weder, “Decentralized cross-organizational application deployment automation: an approach for generating deployment choreographies based on declarative deployment models,” in Proc. Int. Conf. Adv. Inf. Syst. Eng., 2020, pp. 20–35.
[46]
K. Rabimba, L. Xu, L. Chen, F. Zhang, Z. Gao, and W. Shi, “Lessons learned from blockchain applications of trusted execution environments and implications for future research,” in Proc. 10th Int. Workshop Hardware Archit. Support Security Privacy, 2022, pp. 1–8. [Online]. Available: https://doi.org/10.1145/3505253.3505259
[47]
R. Karanjaiet al., “Decentralized translator of trust: Supporting heterogeneous tee for critical infrastructure protection,” in Proc. 5th ACM Int. Symp. Blockchain Secure Crit. Infra., 2023, pp. 85–94. [Online]. Available: https://doi.org/10.1145/3594556.3594626
[48]
R. Karanjaiet al., “Dhtee: Decentralized infrastructure for heterogeneous tees,” in Proc. IEEE Int. Conf. Blockchain Cryptocurrency (ICBC), 2023, pp. 1–3.
[49]
R. Karanjai, E. Li, L. Xu, and W. Shi, “Who is smarter? an empirical study of ai-based smart contract creation,” 2023, arXiv:2308.02955.
[50]
L. Litty and D. Lie, “Patch auditing in infrastructure as a service clouds,” in Proc. 7th ACM SIGPLAN/SIGOPS Int. Conf. Virtual Execution Environ., 2011, pp. 145–156. [Online]. Available: https://doi.org/10.1145/1952682.1952702
[51]
K. A. Torkura, M. I. H. Sukmana, F. Cheng, and C. Meinel, “Continuous auditing and threat detection in multi-cloud infrastructure,” Comput. Security, vol. 102, Mar. 2021, Art. no.
[52]
A. Rahman, “Characteristics of defective infrastructure as code scripts in devops,” in Proc. 40th Int. Conf. Soft. Eng.: Companion Proc., 2018, pp. 476–479. [Online]. Available: https://doi.org/10.1145/3183440.3183452

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Network and Service Management
IEEE Transactions on Network and Service Management  Volume 21, Issue 2
April 2024
1247 pages

Publisher

IEEE Press

Publication History

Published: 18 October 2023

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media