Distributed Systems

Large-scale pervasive systems are likely to be distributed. We study reliability, fault-tolerance, system vulnerability assessment, etc., for large-scale distributed systems. From the application perspective, we work for developing blockchain-assisted systems and utilizing the concepts of blockchain and decentralized web for secured data and asset transfer among multiple consortiums of users. Centralization of control and trust on a single authoratitive entity vastly reduces the trustworthiness of any sytem as a whole. A major focus of our research on distributed systems is to build decentralized systems where the stakeholders maintain control with themselves and the trust basis for any operation is not centralized. We primarily focus on the interoperability aspect of decentralized systems, mainly involving permissioned distribute ledger technologies (DLTs). Our research in distributed systems also focuses on various aspects of cloud and edge computing, like resource allocation, edge-cloud orchestration, containerized application development, deployment, etc. A few of our recent researches are summarized next.

Edge Networking and Resource Management at the Edge

Today's smart environments rely on computation at the edge. We work towards developing an efficient and cost-effective mechanism for edge orchestration and service provisioning at the edge by developing predictive models. Specifically, we explore containerization frameworks like K8S pods, application sandboxing at the edge, geo-distributed application management, serverless platforms, etc. We particularly look into how a pervasive application can take help from distributed processing frameworks for its large-scale execution. Recently, we also started exploring edge accelerators for developing pervasive applications. We have recently started working on provenance tracking of distributed functionalities over serverless platforms to detect various vulnerabilities and policy conflicts.

Decentralized Service Providing Platforms

With the increasing adoption of private blockchain platforms, consortia operating in various sectors such as trade, finance, logistics, etc., are becoming common. Despite having the benefits of a completely decentralized architecture which supports transparency and distributed control, existing private blockchains limit the data, assets, and processes within its closed boundary, which restricts secure and verifiable service provisioning to the end-consumers. Thus, platforms such as e-commerce with multiple sellers or cloud federation with a collection of cloud service providers cannot be decentralized with the existing blockchain platforms. The focus of this work is to develop a decentralized framework whose primary objective is interfacing private blockchain with end-users by leveraging the unique combination of public and private blockchain platforms through interoperation. We have taken up the use case of decentralized cloud federations, we have demonstrated the viability of some of our solutions. We build our prototypes primarily with standard platforms such as Ethereum and Hyperledger Fabric.

Identity Management for Blockchain Networks

The industry is seeing more and more adoption of permissioned blockchain networks for transparent yet secure and trusted coordination between different business entities. However, this has resulted in the formation of isolated blockchain consortiums which have no standard protocol for interoperating with one another. Interoperation for data sharing between permissioned blockchain networks relies on networks' abilities to independently authenticate requests and validate proofs accompanying the data; these typically contain digital signatures. This requires counterparty networks to know the identities and certification chains of each other's members, establishing a common trust basis rooted in identity. In this work we are building an architecture and set of protocols for distributed identity management across permissioned blockchain networks to establish a trust basis for cross-network data sharing. We incorporate self-sovereign decentralized identities (SSI and DIDs) in DLT components through which they obtain privacy-preserving verifiable membership credentials. During interoperation, networks can securely and dynamically discover each others' latest membership lists and members' credentials.

Privacy Preserving Negotiation of Common Trust Basis

Interoperation between permissioned consortium blockchain networks relies on their abilities to discover and validate the identities of each others’ participant organizations. In that aspect, organizations may possess self-sovereign decentralized identities and verifiable credentials issued by well-known certification authorities. However, two mutually untrusting networks of organizations can establish a basis for interoperation only if they have one or more certification authorities in common. Yet, for privacy reasons, neither of them may want to expose a priori their entire lists of authorities, necessitating a negotiation process through which common authorities can be identified. In this work, we analyze this negotiation problem, and are developing protocols through which two mutually untrusting parties can find out a common trust anchor in the form of a verifiable credential issuer without revealing any of their trust anchors which are not common between them to one another.