IEEE Technology and Society Magazine - Fall 2014 - 49

O

pen Mustard Seed
(OMS) is a project
of the Institute for
Data-Driven Design
(ID3) and the M.I.T.
Media Lab that seeks to develop
new social ecosystems consisting of trusted self-healing digital
institutions operating on open networks. The cornerstone of OMS is
an open data platform that enables
people to share all their personal
data within a legally constituted
"trust framework." This framework allows people to initiate their
own "personal data store" (PDS)
that can securely store and process static and dynamic data about
themselves. All elements of the
trust framework - open authentication, storage, discovery, payment,
auditing, market making, and monetized "app store" services - are
based on "privacy by design" principles. That is, privacy, security,
and trusted exchange are built into
the very design of the system itself.
It is important to make these
principles a functional reality in
digital networks if we are going
to unlock the great stores of latent
value that open networks hold. As
postulated by Reed's Law, the value
in a network increases exponentially
as interactions move from a "broadcasting model" that offers "best content" (in which value is described
by the number of consumers N) to
a network of "peer-to-peer transactions" (where the network's value
is based on "most members," mathematically denoted as N2). However,
by far the most valuable networks
are based on those that facilitate
group affiliations. When users have
tools for "free and responsible association for common purposes" the
value of the network soars exponentially to 2N [1].
However, the latent value of
"Group Forming Networks," or
GFNs, as David Reed calls them,
cannot be accessed unless there is
an appropriate network architecture
and associated platforms and tools.
We need a network architecture and

software systems that can facilitate
the formation of trust and social
capital in user-centric and scalable
ways. This is particularly important
as more sectors of commerce, governance, and social life are shaped by
large databases of personal information whose opaque uses are causing

Design of Open
Mustard Seed
There are two key building blocks in
the architecture of OMS: the Trusted
Compute Cell (TCC) and the Trusted
Compute Framework (TCF).
The Trusted Compute Cell can be
considered a cell unit (see Fig. 1) that

Privacy, security, and trusted
exchange are built into the very
design of the system itself.
legitimate concerns about data security, personal privacy, and social trust.
OMS seeks to let individuals
negotiate their own social contracts
regarding the uses of their personal information. By providing
a consent-based platform to manage data directly and responsively,
OMS enables, by design, the emergence of new sorts of effective,
quasi-autonomous governance and
self-provisioning. And it achieves
these goals without necessarily or
directly requiring "government" (as
opposed to "governance"). Online
communities working in welldesigned software environments can
act more rapidly, and with greater
legitimacy, than conventional government institutions. In this article,
we give examples of such collective action in three social use cases:
data sharing in local neighborhoods,
exchange of digital assets (in particular crypto-currencies), and massive
(even planetary) scale data sharing.

IEEE TECHNOLOGY AND SOCIETY MAGAZINE

individuals control in order to specify
and implement their personal data
preferences in networked computing.
A TCC can be replicated, conjoined
with other cells, and enhanced with
capabilities that are context-specific.
It helps to see the TCC from the
perspective of the social functions it
seeks to provide (as a service) to its
owner. When the owner of a TCC is
an individual that represents himself
or herself in the virtual space, the
TCC acts as an identity manager, personal data manager, registry of his or
her connections (to other TCCs), and
an applications execution manager,
among other functions.
When a TCC is created to serve
as an organizational unit (e.g., social
group or digital institution), the TCC
has the capability to provide services
that pertain to groups and groupbehaviors. In this case, the TCC
establishes a group-identity, and also
performs membership management,
collective data store management,

IM

CM

RM

AM

(1) RM = Registry Management
(2) IM = Identity Management
(3) PM = PDS Management
(4) CM = Compute Management
(5) AM = Applications Management

PM
Trusted Compute Cell (TCC)
Fig. 1. Components of the TCC.

|

FALL 2014

|

49



Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - Fall 2014

IEEE Technology and Society Magazine - Fall 2014 - Cover1
IEEE Technology and Society Magazine - Fall 2014 - Cover2
IEEE Technology and Society Magazine - Fall 2014 - 1
IEEE Technology and Society Magazine - Fall 2014 - 2
IEEE Technology and Society Magazine - Fall 2014 - 3
IEEE Technology and Society Magazine - Fall 2014 - 4
IEEE Technology and Society Magazine - Fall 2014 - 5
IEEE Technology and Society Magazine - Fall 2014 - 6
IEEE Technology and Society Magazine - Fall 2014 - 7
IEEE Technology and Society Magazine - Fall 2014 - 8
IEEE Technology and Society Magazine - Fall 2014 - 9
IEEE Technology and Society Magazine - Fall 2014 - 10
IEEE Technology and Society Magazine - Fall 2014 - 11
IEEE Technology and Society Magazine - Fall 2014 - 12
IEEE Technology and Society Magazine - Fall 2014 - 13
IEEE Technology and Society Magazine - Fall 2014 - 14
IEEE Technology and Society Magazine - Fall 2014 - 15
IEEE Technology and Society Magazine - Fall 2014 - 16
IEEE Technology and Society Magazine - Fall 2014 - 17
IEEE Technology and Society Magazine - Fall 2014 - 18
IEEE Technology and Society Magazine - Fall 2014 - 19
IEEE Technology and Society Magazine - Fall 2014 - 20
IEEE Technology and Society Magazine - Fall 2014 - 21
IEEE Technology and Society Magazine - Fall 2014 - 22
IEEE Technology and Society Magazine - Fall 2014 - 23
IEEE Technology and Society Magazine - Fall 2014 - 24
IEEE Technology and Society Magazine - Fall 2014 - 25
IEEE Technology and Society Magazine - Fall 2014 - 26
IEEE Technology and Society Magazine - Fall 2014 - 27
IEEE Technology and Society Magazine - Fall 2014 - 28
IEEE Technology and Society Magazine - Fall 2014 - 29
IEEE Technology and Society Magazine - Fall 2014 - 30
IEEE Technology and Society Magazine - Fall 2014 - 31
IEEE Technology and Society Magazine - Fall 2014 - 32
IEEE Technology and Society Magazine - Fall 2014 - 33
IEEE Technology and Society Magazine - Fall 2014 - 34
IEEE Technology and Society Magazine - Fall 2014 - 35
IEEE Technology and Society Magazine - Fall 2014 - 36
IEEE Technology and Society Magazine - Fall 2014 - 37
IEEE Technology and Society Magazine - Fall 2014 - 38
IEEE Technology and Society Magazine - Fall 2014 - 39
IEEE Technology and Society Magazine - Fall 2014 - 40
IEEE Technology and Society Magazine - Fall 2014 - 41
IEEE Technology and Society Magazine - Fall 2014 - 42
IEEE Technology and Society Magazine - Fall 2014 - 43
IEEE Technology and Society Magazine - Fall 2014 - 44
IEEE Technology and Society Magazine - Fall 2014 - 45
IEEE Technology and Society Magazine - Fall 2014 - 46
IEEE Technology and Society Magazine - Fall 2014 - 47
IEEE Technology and Society Magazine - Fall 2014 - 48
IEEE Technology and Society Magazine - Fall 2014 - 49
IEEE Technology and Society Magazine - Fall 2014 - 50
IEEE Technology and Society Magazine - Fall 2014 - 51
IEEE Technology and Society Magazine - Fall 2014 - 52
IEEE Technology and Society Magazine - Fall 2014 - 53
IEEE Technology and Society Magazine - Fall 2014 - 54
IEEE Technology and Society Magazine - Fall 2014 - 55
IEEE Technology and Society Magazine - Fall 2014 - 56
IEEE Technology and Society Magazine - Fall 2014 - 57
IEEE Technology and Society Magazine - Fall 2014 - 58
IEEE Technology and Society Magazine - Fall 2014 - 59
IEEE Technology and Society Magazine - Fall 2014 - 60
IEEE Technology and Society Magazine - Fall 2014 - 61
IEEE Technology and Society Magazine - Fall 2014 - 62
IEEE Technology and Society Magazine - Fall 2014 - 63
IEEE Technology and Society Magazine - Fall 2014 - 64
IEEE Technology and Society Magazine - Fall 2014 - 65
IEEE Technology and Society Magazine - Fall 2014 - 66
IEEE Technology and Society Magazine - Fall 2014 - 67
IEEE Technology and Society Magazine - Fall 2014 - 68
IEEE Technology and Society Magazine - Fall 2014 - 69
IEEE Technology and Society Magazine - Fall 2014 - 70
IEEE Technology and Society Magazine - Fall 2014 - 71
IEEE Technology and Society Magazine - Fall 2014 - 72
IEEE Technology and Society Magazine - Fall 2014 - 73
IEEE Technology and Society Magazine - Fall 2014 - 74
IEEE Technology and Society Magazine - Fall 2014 - 75
IEEE Technology and Society Magazine - Fall 2014 - 76
IEEE Technology and Society Magazine - Fall 2014 - 77
IEEE Technology and Society Magazine - Fall 2014 - 78
IEEE Technology and Society Magazine - Fall 2014 - 79
IEEE Technology and Society Magazine - Fall 2014 - 80
IEEE Technology and Society Magazine - Fall 2014 - Cover3
IEEE Technology and Society Magazine - Fall 2014 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com