Welcome!

Open Source Cloud Authors: Elizabeth White, Yeshim Deniz, Pat Romanski, Liz McMillan, Zakia Bouachraoui

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Open Source Cloud, Containers Expo Blog, Agile Computing

@CloudExpo: Article

How to Put the Cloud on Your Device

What are dynamically provisioned Cloud instances on remote devices actually good for?

ZapThink is always on the lookout for innovative, iconoclastic approaches to Agile Architecture, which is why we were excited to discuss IT innovation at the US Coast Guard (USCG) in a ZapFlash last year. So when USCG Chief Information Officer Rear Admiral Robert Day discussed a novel approach to securing their enterprise email, we knew we had another story to tell. He said, “I’m not going to make this device an endpoint on my network. There’s just no way. What we’ve done is create a secure sandbox inside of the device that can be managed, fixed and certified to operate our enterprise email capability.”

At first blush this solution is a straightforward example of application virtualization. What caught our eye, however, was the conclusion that running email on a secure sandbox on a mobile device was an alternative to treating the device as an endpoint on their network. So, if mobile devices aren’t network endpoints, then what are they? And what other problems might we be able to solve if we no longer consider mobile devices as endpoints?

Playing in the Sandbox
We asked these questions before in our ZapFlash on Cloud-Oriented Architecture and the Internet of Things. In that article we pointed out that under certain circumstances, mobile devices can host little pieces of the Cloud, instead of simply being client endpoints. As a result, the Internet of Things doesn’t simply have to consist of hypermedia-linked devices, but can actually be part of the Cloud itself.

Fascinating perspective to be sure, but we’re the first to admit that the COA article left us wanting more. Thanks to the USCG, it’s time to put more meat on the bones of COA, beginning with the application virtualization that Admiral Day referred to. With application virtualization, the application (in this case, an email client) runs in a virtual machine (VM) on a server, as shown in the figure below.

The mobile device then runs a secure virtual partition we call a sandbox, and in the sandbox is a special app that accesses the server-based email client remotely. Once the user has properly authenticated themselves to the sandbox, their experience interacting with their email client is the same (or almost the same) as if the client were resident on their device, except that it remains on the server. The result is that the device itself may be untrusted (since it’s on the Internet and could also be stolen), but the email remains secure.

Except for one problem: that’s not really how sandboxes work. The central notion of a sandbox is that it protects untrusted activity inside the sandbox from compromising the host device, instead of the other way around. In the case of application virtualization, we have what some people are starting to call a reverse sandbox, as illustrated below.

For example, browsers provide sandboxes for Java applets. Since a Java applet might contain malware that could potentially damage or comandeer the host computer, the sandbox is supposed to isolate the applet and protect the host system. But in the case of application virtualization, we’re assuming the device is the risky environment and we want to protect the app in the sandbox. Another application of a reverse sandbox would be to protect a Web session from keylogger malware, for example.

The Lesson of Desktop Virtualization
There are two main problems with application virtualization: first, the server and host must run the same operating system (which in practice usually means Windows), and second, a flaky network connection hoses the entire interaction. An approach to desktop virtualization called remote synchronized virtual desktop addresses these issues. With remote synchronized virtual desktop, the client device fetches a copy of a VM instance of the user’s desktop from the server and runs it locally. (Sometimes the instance is generic while other times it’s specific to the user, but that distinction isn’t relevant to our discussion). See the figure below:

With a remote synchronized virtual desktop a sandbox separate from the local VM is optional, since the desktop hypervisor that hosts the VM typically provides the security of a sandbox. Furthermore, since the entire remote desktop environment is running in the local VM, continuous connectivity isn’t essential. You need sufficient connectivity to synchronize the local and server VMs, but an occasional dead spot or plane flight won’t crash your virtual desktop.

Of course, remote desktops have their limitations as well. The VM image file size tends to be quite large, so downloading it over a slow connection would be painful, and it likely won’t fit on a smartphone (at least for now). The virtual desktop may also expect a standard keyboard and mouse, so a phone or iPad client may be impractical (although the Windows 8 touch interface is bound to improve this situation to some extent).

Desktop virtualization is an important technology, to be sure, but there’s more to this story. The current marketplace for such products is stuck in a “horseless carriage” scenario. We have sandbox technology (regular as well as reverse), and we can also put virtual environments on mobile devices. Combine those with the existing state of Cloud Computing and what do you get? Hint: desktop virtualization is only the tip of the iceberg.

Leveraging Desktop Virtualization Technologies for Cloud-Oriented Architecture
The core realization behind Cloud-Oriented Architecture (COA) is that everything is potentially part of the Cloud. There’s nothing in the NIST definition of Cloud Computing that requires Cloud resources to live in data centers, after all. We don’t mean to say that mobile devices are inherently part of the Cloud, however. To qualify as Cloud resources, it must be possible to provision and deprovision them automatically, with minimal management effort or service provider interaction.

Now we’re getting somewhere. We have the technology to dynamically provision and deprovision VM instances on mobile devices, since that’s what remote virtual desktops are all about. We simply need to expand the approach, as shown in the figure below.

Instead of porting desktops in VMs to remote devices, we can use a similar approach to automatically provision any VM instance into a reverse sandbox on any device, since reverse sandboxes can run on anything, including smartphones, iPads, laptops, or even embedded systems like the computer in your car or proverbial fridge. From the perspective of the Cloud provider, remote environments are simply an extension of their data centers that they can automatically manage and provision. From the user’s perspective, they can have any Cloud capability they desire running locally, within the physical constraints of the remote environment.

Such constraints, including bandwidth, reliable connectivity, memory, storage space, and UI limitations, present both challenges and opportunities. Yes, smartphones have less physical resources than servers to be sure, but the resources they have are each riding their own Moore’s Law curve into the stratosphere. Think your phone is too slow or small to run part of the Cloud? Wait a week or two.

The ZapThink Take
So, what are dynamically provisioned Cloud instances on remote devices actually good for? Security is the obvious answer, but only the starting point. The reverse sandbox protects the VM instance on the device from outside attacks, and gives the Cloud provider centralized control over the instance.

COA also resolves the problem of remote wiping. IT managers are concerned about devices falling into the wrong hands, and often require the ability to fully erase such devices remotely. For employees bringing their own devices (BYOD) to work, such draconian measures are understandably unacceptable. But if all the sensitive corporate data and application access resided in a VM instance on the device, separated from the rest of the device by a secure sandbox, then the remote wipe would simply mean deprovisioning this instance. The device would remain fully functional, except for the secure capabilities in the sandbox.

Those security examples, however, are only the price of admission. The potential for COA is limited only by your imagination, as the limitations of bandwidth, memory, and storage get Moore’s Law-ed into irrelevance. For example, what kind of massively multiplayer game could you build that ran entirely on mobile Cloud instances? Or perhaps COA will enable Facebook’s Next Big Thing, keeping them from being an immense one trick pony? And remember the Search for Extraterrestrial Intelligence (SETI) screensaver from the 1990s? It processed chunks raw data on individual PCs while they were idle. If we could look for aliens with 1990s technology, what Big Data mysteries do you think we can solve this decade?

More Stories By Jason Bloomberg

Jason Bloomberg is a leading IT industry analyst, Forbes contributor, keynote speaker, and globally recognized expert on multiple disruptive trends in enterprise technology and digital transformation. He is ranked #5 on Onalytica’s list of top Digital Transformation influencers for 2018 and #15 on Jax’s list of top DevOps influencers for 2017, the only person to appear on both lists.

As founder and president of Agile Digital Transformation analyst firm Intellyx, he advises, writes, and speaks on a diverse set of topics, including digital transformation, artificial intelligence, cloud computing, devops, big data/analytics, cybersecurity, blockchain/bitcoin/cryptocurrency, no-code/low-code platforms and tools, organizational transformation, internet of things, enterprise architecture, SD-WAN/SDX, mainframes, hybrid IT, and legacy transformation, among other topics.

Mr. Bloomberg’s articles in Forbes are often viewed by more than 100,000 readers. During his career, he has published over 1,200 articles (over 200 for Forbes alone), spoken at over 400 conferences and webinars, and he has been quoted in the press and blogosphere over 2,000 times.

Mr. Bloomberg is the author or coauthor of four books: The Agile Architecture Revolution (Wiley, 2013), Service Orient or Be Doomed! How Service Orientation Will Change Your Business (Wiley, 2006), XML and Web Services Unleashed (SAMS Publishing, 2002), and Web Page Scripting Techniques (Hayden Books, 1996). His next book, Agile Digital Transformation, is due within the next year.

At SOA-focused industry analyst firm ZapThink from 2001 to 2013, Mr. Bloomberg created and delivered the Licensed ZapThink Architect (LZA) Service-Oriented Architecture (SOA) course and associated credential, certifying over 1,700 professionals worldwide. He is one of the original Managing Partners of ZapThink LLC, which was acquired by Dovel Technologies in 2011.

Prior to ZapThink, Mr. Bloomberg built a diverse background in eBusiness technology management and industry analysis, including serving as a senior analyst in IDC’s eBusiness Advisory group, as well as holding eBusiness management positions at USWeb/CKS (later marchFIRST) and WaveBend Solutions (now Hitachi Consulting), and several software and web development positions.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...