Anonymous Cloud Computing

Saturday, July 30, 2011

Requirements - first cut

  • Only accessible from a TOR-like relay network
  • Runs VMs capable of hosting any size service
  • VM processing, memory, and disk should be distributable
  • Host parameterizes how much disk / cpu / memory / bandwidth he will share
  • You earn credit by providing memory, cpu, disk, bandwidth, and exit relays
  • You can consume what you have credit for
  • Credit can be traded (for example for currency such as bitcoin)
  • VM images move from machine to machine when one shuts down
  • The owner of an image does not know where his image is hosted
  • The host of an image does not know what he is hosting
  • Image can be set to migrate randomly or to better performing hosts
  • Cost of hosting goes up with redundancy and failover speed
  • you can donate resources to projects anonymously
  • All processing, storage, and communication encrypted
  • Everyone hosts at least an infrastructure VM
  • Infrastructure VMs are organized in such a way that they cannot be compromised
  • Uses XRI-like technology for resolution of resources
  • All infrastructure is redundant, fault tolerant, and compartmentalized

Labels: , ,

0 Comments:

Post a Comment

Subscribe to Post Comments [Atom]

<< Home