JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2023, Vol. 58 ›› Issue (9): 1-15.doi: 10.6040/j.issn.1671-9352.0.2023.168

    Next Articles

Meta computing: a new computing paradigm under zero trust

Xiuzhen CHENG1(),Weifeng LYU2,Minghui XU1,*(),Runyu PAN1,Dongxiao YU1,Chenxu WANG1,Yong YU3,Xue XIAO4   

  1. 1. School of Computer Science and Technology, Shandong University, Qingdao 266237, Shandong, China
    2. School of Computer Science and Engineering, Beihang University, Beijing 100191, China
    3. School of Computer Science, Shaanxi Normal University, Xi'an 710119, Shaanxi, China
    4. Inspur Group, Jinan 250101, Shandong, China
  • Received:2023-04-23 Online:2023-09-20 Published:2023-09-08
  • Contact: Minghui XU E-mail:xzcheng@sdu.edu.cn;mhxu@sdu.edu.cn

Abstract:

The popularity of the Internet has had a significant impact on the development of computing paradigms. With the continuous improvement of the new generation of information technology infrastructures, academia and industry have been constantly exploring new computing paradigms to fully exploit computing powers. The huge data generated by massive IoT devices gradually exceeds the processing capability of the high-performance back-end represented by cloud servers. Edge computing alleviates this problem through cloud-edge-end coordination, but there still exist difficulties and challenges such as low computing power utilization, low computing and storage fault tolerance capability, and low integration of computing resorces. "Meta Computing" is a new computing paradigm that aims to break down the barriers of computing powers in a zero-trust environment. It can integrate all available connected computing and storage resources, provide efficient, byzantine fault-tolerant, and personalized services, while protecting the data and user privacy. Furthermere, meta computing can ensure the correctness of results, and realize "the entire network can be regarded as a giant computer for a user", that is, "Network-as-a-Computer, NaaC", which is also called "Meta Computer". The meta computer architecture includes a number of function modules including a device management module and a zero-trust computing management module, as well as the cloud-edge-end device resources. The device management module abstracts massive heterogeneous device resources into objects that can be freely manipulated, while the zero-trust computing management module can transparently allocate computing resources to user tasks according to service requirements, complete the tasks with strong fault tolerance and verifiable outputs, and finally settle accounts. Based on the analysis of the architecture and the functional characteristics of meta computing, we put forward suggestions and advice on the development path of meta computing, that is, transitioning from local to global, and analyze the most-influential future application scenarios of meta computing and provide a reasonable plan for the implementation and development of meta computing in future.

Key words: meta computing, zero trust, network-as-a-computer, meta computer, computing power integration, data security

CLC Number: 

  • TP309

Fig.1

The development history of the computing paradigms"

Fig.2

Problems of existing computing paradigms"

Fig.3

meta computer architecture"

Fig.4

Typical applications of meta computing"

1 CHELLAPPA R. Intermediaries in cloud computing: a new computing paradigm[C]//INFORMS Annual Meeting. Dallas, 1997: 26-29.
2 ORAM A . Peer-to-Peer: harnessing the power of disruptive technologies[M]. Sebastopol: O'Reilly Media, Inc., 2001: 1- 450.
3 BARKAI D. Technologies for sharing and collaborating on the Net[C]//Proceedings of the First International Conference on Peer-to-Peer Computing. Linkoping: IEEE Computer Society, 2001: 13-28.
4 International Telecommunication Union. Internet reports 2005: The Internet of Things[R]. Tunis: ITU, 2005.
5 SATYANARAYANAN M , BAHL P , CACERES R , et al. The case for VM-based cloudlets in mobile computing[J]. IEEE Pervasive Computing, 2009, 8 (4): 14- 23.
doi: 10.1109/MPRV.2009.82
6 BONOMI F, MILITO R, ZHU J, et al. Fog computing and its role in the Internet of Things[C]//Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing. Helsinki: ACM, 2012: 13-16.
7 WITT B, WARD L. IBM Operating system/360 concepts and facilities[R]. New York: International Business Machine Corporation, 1965.
8 郭得科, 王怀民. 网络计算典型形态的发展回顾和愿景展望[J]. 中国计算机学会通讯, 2022, 18 (2): 39- 45.
GUO Deke , WANG Huaimin . The review and prospects of typical forms of network computing[J]. Communications of the CCF, 2022, 18 (2): 39- 45.
9 FOSTER I , KESSELMAN C . The grid: blueprint for a new computing infrastructure[M]. San Francisco: Morgan Kaufmann Publishers, 1998.
10 DE ROURE D, JENNINGS N R, SHADBOLT N R. The semantic grid: a future e-science infrastructure[M]// BERMAN F, FOX G, HEY T. Grid computing: making the global infrastructure a reality. Online: John Wiley & Sons, Ltd, 2003: 437-470.
11 FOSTER I, GEISLER J, TUECKE S. MPI on the I-WAY: a wide-area, multimethod implementation of the message passing interface[C]//Proceedings of the Second MPI Developer's Conference. Notre Dame: IEEE Computer Society, 1996: 10-17.
12 FOSTER I, GEISLER J, NICKLESS B, et al. Software infrastructure for the I-WAY high-performance distributed computing experiment[C]//Proceedings of 5th IEEE International Symposium on High Performance Distributed Computing. Syracuse: IEEE Computer Society, 1996: 562-571.
13 STEVENS R , WOODWARD P , DEFANTI T , et al. From the I-WAY to the national technology grid[J]. Communications of the ACM, 1997, 40 (11): 50- 60.
doi: 10.1145/265684.265692
14 FOSTER I , KESSELMAN C . Globus: a metacomputing infrastructure toolkit[J]. The International Journal of Supercomputer Applications and High Performance Computing, 1997, 11 (2): 115- 128.
doi: 10.1177/109434209701100205
15 GRIMSHAW A S , WULF W A . The legion team: The legion vision of a worldwide virtual computer[J]. Communications of the ACM, 1997, 40 (1): 39- 45.
doi: 10.1145/242857.242867
16 SMARR L , CATLETT C E . Metacomputing[J]. Communications of the ACM, 1992, 35 (6): 44- 52.
doi: 10.1145/129888.129890
17 KROL M, MASTORAKIS S, ORAN D, et al. Compute first networking: distributed computing meets ICN[C]//Proceedings of the 6th ACM Conference on Information-Centric Networking. Macao: ACM, 2019: 67-77.
18 WEISER M . The computer for the 21st century[J]. ACM SIGMOBILE Mobile Computing and Communications Review, 1999, 3 (3): 3- 11.
doi: 10.1145/329124.329126
19 郑增威, 吴朝晖. 普适计算综述[J]. 计算机科学, 2003, 30, 18- 29.
ZHENG Zengwei , WU Zhaohui . A survey of pervasive computing[J]. Computer Science, 2003, 30, 18- 29.
20 NIEUWDORP E . The pervasive discourse: an analysis[J]. Computers in Entertainment (CIE), 2007, 5 (2): 13.
doi: 10.1145/1279540.1279553
21 孙其博, 刘杰, 黎羴, 等. 物联网: 概念、架构与关键技术研究综述[J]. 北京邮电大学学报, 2010, 33 (3): 1- 9.
SUN Qibo , LIU Jie , LI Shan , et al. Internet of things: summarize on concepts, architecture and key technology problem[J]. Journal of Beijing University of Posts and Telecommunications, 2010, 33 (3): 1- 9.
22 ITU-T Y. Overview of ubiquitous networking and of its support in NGN[S]. ITU-T Recommendation. 2009.
23 DILLEY J , MAGGS B , PARIKH J , et al. Globally distributed content delivery[J]. IEEE Internet Computing, 2002, 6 (5): 50- 58.
doi: 10.1109/MIC.2002.1036038
24 CoreMark: an eembc benchmark[EB/OL]. [2023-02-03]. https://www.eembc.org/coremark/scores.php.
[1] LIU Li-zhao, YU Jia-ping, LIU Jian, LI Jun-yi, HAN Shao-bing, XU Hua-rong, LIN Huai-chuan, ZHU Shun-zhi. Secure storage addressing algorithm for large data based on quantum radiation field [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 65-74.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] ZHAO Jun1, ZHAO Jing2, FAN Ting-jun1*, YUAN Wen-peng1,3, ZHANG Zheng1, CONG Ri-shan1. Purification and anti-tumor activity examination of water-soluble asterosaponin from Asterias rollestoni Bell[J]. J4, 2013, 48(1): 30 -35 .
[2] YANG Yong-wei1, 2, HE Peng-fei2, LI Yi-jun2,3. On strict filters of BL-algebras#br#[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 63 -67 .
[3] LI Min1,2, LI Qi-qiang1. Observer-based sliding mode control of uncertain singular time-delay systems#br#[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 37 -42 .
[4] HE Hai-lun, CHEN Xiu-lan* . Circular dichroism detection of the effects of denaturants and buffers on the conformation of cold-adapted protease MCP-01 and  mesophilic protease BP01[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2013, 48(1): 23 -29 .
[5] SUN Xiao-ting1, JIN Lan2*. Application of DOSY in oligosaccharide mixture analysis[J]. J4, 2013, 48(1): 43 -45 .
[6] YANG Ying, JIANG Long*, SUO Xin-li. Choquet integral representation of premium functional and related properties on capacity space[J]. J4, 2013, 48(1): 78 -82 .
[7] TANG Feng-qin1, BAI Jian-ming2. The precise large deviations for a risk model with extended negatively upper orthant dependent claim  sizes[J]. J4, 2013, 48(1): 100 -106 .
[8] CHENG Zhi1,2, SUN Cui-fang2, WANG Ning1, DU Xian-neng1. On the fibre product of Zn and its property[J]. J4, 2013, 48(2): 15 -19 .
[9] TANG Xiao-hong1, HU Wen-xiao2*, WEI Yan-feng2, JIANG Xi-long2, ZHANG Jing-ying2, SHAO Xue-dong3. Screening and biological characteristics studies of wide wine-making yeasts[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 12 -17 .
[10] YANG Jun. Characterization and structural control of metalbased nanomaterials[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2013, 48(1): 1 -22 .