Professional Documents
Culture Documents
Full download Mobile Cloud Computing: Foundations and Service Models Huijun Wu & Dijiang Huang file pdf all chapter on 2024
Full download Mobile Cloud Computing: Foundations and Service Models Huijun Wu & Dijiang Huang file pdf all chapter on 2024
https://ebookmass.com/product/comptia-cloud-guide-to-cloud-
computing-west/
https://ebookmass.com/product/cloud-native-computing-pethuru-raj/
https://ebookmass.com/product/cloud-computing-concepts-
technology-security-architecture-thomas-erl-eric-barcelo-monroy/
https://ebookmass.com/product/aws-cloud-computing-concepts-and-
tech-analogies-ashish-prajapati/
Cloud Computing Law 2nd Edition Christopher Millard
https://ebookmass.com/product/cloud-computing-law-2nd-edition-
christopher-millard/
https://ebookmass.com/product/cloud-computing-theory-and-
practice-3rd-edition-dan-c-marinescu/
https://ebookmass.com/product/cloud-computing-law-2nd-edition-
christopher-millard-editor/
https://ebookmass.com/product/cloud-computing-concepts-
technology-security-and-architecture-second-edition-thomas-erl/
https://ebookmass.com/product/the-cloud-to-thing-continuum-
opportunities-and-challenges-in-cloud-fog-and-edge-computing-1st-
ed-edition-theo-lynn/
Mobile Cloud
Computing
Foundations and Service Models
Dijiang Huang, Huijun Wu
Mobile Cloud Computing
This page intentionally left blank
Mobile Cloud Computing
Foundations and Service Models
Dijiang Huang
Huijun Wu
Morgan Kaufmann is an imprint of Elsevier
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, United States
Copyright © 2018 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on
how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as
the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted
herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in
research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods,
compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the
safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or
damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods,
products, instructions, or ideas contained in the material herein.
ISBN: 978-0-12-809641-3
To my family:
love and regards,
— Huijun
This page intentionally left blank
Contents
About the Authors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxi
Chapter 2: Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.1 The Concept of Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
2.1.1 What Is Virtualization? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
2.1.2 Abstraction vs. Virtualization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.2 Classifications of Computer/Machine Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . 36
2.2.1 First Classification: Host Internal Process Model . . . . . . . . . . . . . . . . . . . . . 36
2.2.2 Second Classification: ISA, System Calls, and APIs . . . . . . . . . . . . . . . . . . 38
2.2.3 Third Classification: Two Types of Hypervisor. . . . . . . . . . . . . . . . . . . . . . . . 41
2.3 Lightweight Virtualization: Containers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.3.1 Docker: OS Level Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
2.3.2 OSGi: Application Level Virtualization Library . . . . . . . . . . . . . . . . . . . . . . . 51
2.3.3 Comparison to Hypervisor Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
2.4 Mobile Device Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
2.4.1 Bring Your Own Device (BYOD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
2.4.2 KVM over ARM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
vii
Contents
viii
Contents
ix
Contents
x
Contents
Appendix D: Bring Your Own Device (BYOD) Implementation and Evaluation . . . . 283
D.1 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
D.2 Host and Guest Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283
D.2.1 Host File System and Kernel Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
D.2.2 Guest File System and Kernel Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
D.2.3 Qemu for ARM Setup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285
D.3 Booting up Arndale Board . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286
D.4 Open vSwitch with KVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
Bibliography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
xi
This page intentionally left blank
About the Authors
Dijiang Huang
Why should I have been the person to write this book? Well, I seem
to have accumulated the right mix of experience and qualifications
over the last 22 years. I graduated in Telecommunications from
Beijing University of Posts and Telecommunications (China) with
a Bachelor degree in 1995; my first job was that of a network en-
gineer in the computer center of Civil Aviation Administration of
China (CAAC); having four-year industry working experience,
I came to the University of Missouri-Kansas City (UMKC) in the
United States to pursue my graduate study in the joint computer and LinkedIn QR Code
telecommunication networking program of Computer Science; and
I earned my MSc and PhD degrees in Computer Science in 2001 and
2004, respectively. During my study at UMKC, I became interested
in the research areas of mobile computing and security, and focused
my research on securing Mobile Ad Hoc Networks (MANET).
After graduating with my PhD, I joined the Computer Science and
Engineering (CSE) department at Arizona State University (ASU) as
an Assistant Professor to start my independent academic life. One of my early research focus
areas was securing MANET communication and networking protocols. Later, I realized that
the cross-layer approach is extremely important to make a MANET solution more efficient
and practical. Gradually, I looked into the research problem on how to build a situation-aware
solution to better support MANET applications considering various instability issues due to
nodes’ mobility and intermittent communication. Considering mobiles trying to utilize all
reachable resources to support their applications, this situation is very similar to the resource
management scenario for cloud computing; of course, with different context, running environ-
ment, programming and virtualization capabilities and constraints.
In 2010, I was awarded the Office of Naval Research (ONR) Young Investigator Program
(YIP) award for working on a research project to establish a secure mobile cloud computing
xiii
About the Authors
system. The main task of the award is to develop a secure and robust mobile cloud computing
system to support trustworthy mission-critical MANET operations and resource management
considering communication, networking, storage, computation, and security requirements and
constraints. With the booming of Internet of Things (IoT), SDx (i.e., Software Defined Ev-
erything) in a mobile application scenario such as mobility powered and focused applications
for the future smart city, mobile cloud computing has been refocusing its research agenda on
a broader definition of “mobile” including cloud infrastructure, software, and services. I hope
this book can share my past research and development outcomes and provide a starting point
to ride on the next research and development wave for mobile cloud computing, which can
benefit both research communities and practitioners.
In summary, my current research interests are in computer and network security, mobile ad
hoc networks, network virtualization, and mobile cloud computing. I am currently an As-
sociate Professor in the School of Computing Informatics Decision Systems Engineering
(CIDSE) of ASU, and I am currently leading the Secure Networking and Computing (SNAC)
research group. Most of my current and previous research is supported by federal agencies
such as National Science Foundation (NSF), ONR, Army Research Office (ARO), Naval
Research Lab (NRL), National Science Foundation of China (NSFC), and North Atlantic
Treaty Organization (NATO); and industries such as Consortium of Embedded System (CES),
Hewlett-Packard, NCI Inc., and China Mobile. In addition to ONR Young Investigator Award,
I was also a recipient of HP Innovation Research Program (IRP) Award and JSPS Fellowship.
I am a cofounder of two start-up companies: Athena Network Solutions LLC (ATHENETS)
and CYNET LLC. I am a senior member of IEEE and member of ACM. For more informa-
tion about my research publications, teaching, and professional community services, please
refer to http://www.public.asu.edu/~dhuang8/. By the way, I love all kinds of sports, play gui-
tar, and like traveling :-).
xiv
About the Authors
Huijun Wu
Huijun Wu is now an engineer at Twitter Inc. He received his PhD
from Arizona State University.
In 2007, Huijun graduated from Huazhong University of Science &
Technology, after which he showed interest in database and data pro-
cessing. He worked on a database kernel project named CacheDB
which is an in-memory real-time database kernel. CacheDB was
adopted by the China Southern Power Grid to collect meter metrics
in Guangzhou, China. When Huijun was working on the CacheDB LinkedIn QR Code
project, he invented a log merging method and a parallel recov-
ery method, which were patented. For the accomplishments in the
database and data processing area, he received his MS degree.
In 2009, Huijun joined Alcatel-Lucent Shanghai Bell to work on
the 5060 Wireless Call Server (WCS). The 5060 WCS has served
multiple areas worldwide, playing pivotal role in the backbone com-
munication network. Huijun’s work helped the 5060 WCS to work
reliably.
Huijun did not stop progressing. He joined the SNAC research group and started his PhD
journey in 2011. The 5 years spent at SNAC research group were the best time in his life. He
worked with the intelligent SNAC colleagues in the mobile cloud area. His research includes
mobile cloud application, mobile cloud service framework, and cloud computing. He devel-
oped a mobile cloud service framework called POEM, which was awarded the best student
paper at the 4th IEEE International Conference on Mobile Services. Besides mobile cloud
system, he published several offloading algorithms to optimize computation performance. For
the accomplishments in the mobile cloud area, he received his PhD degree.
Huijun joined Twitter Inc. in 2016, working on the Heron project. Heron is a realtime, dis-
tributed, fault-tolerant stream processing engine to substitute Apache Storm, and Heron is
moving to Apache Incubator. Huijun contributed several new components for Heron, in-
cluding MetricsCacheManager. Besides developing Heron, he is a technique article author
to promote the Heron project.
xv
This page intentionally left blank
Foreword
Today personal computing devices such as smart phones and tablets have become the most
popular means to access the Internet. They feature processing, storage, and communications
power that increase exponentially, almost doubling each year. They are also equipped with a
growing number of sensors, making them ideal for environmental monitoring, activity recog-
nition and recording, health monitoring, navigation, and social match making. However, many
emerging applications require independent, personal devices to coordinate the inputs, e.g., to
analyze photos from a variety of cameras or to route data through multiple radios. Enabling
these applications will require new services for efficient and secure sharing of data and re-
sources.
Equally impressive has been the evolution of another utility, the vehicle, from its function
as a basic means of transport to that of a sophisticated sensor platform. On-board vehicular
routers have enormous processing, storage, and communication resources. Vehicle process-
ing and communications resources coupled with sophisticated lasers, infrared sensors, and
cameras have brought us the autonomous driving cars. In this area, a major contribution has
been to intelligent transport by facilitating cruise control, detecting pedestrians, and assisting
impaired drivers. Even bigger gains are expected from Vehicle-to-Vehicle communications,
e.g., informing other vehicles of road conditions ahead, exchanging pedestrian sightings and
collaborating to resolve congestion.
These examples are a part of a growing trend in mobile computing. Technologies are lead-
ing to a shift away from a backbone centric Internet scenario (in which personal and vehicular
platforms communicate exclusively with the Internet Cloud), towards a mobile Internet dom-
inated by mobile node interactions. Keeping the data local produces two important benefits –
reducing wireless access traffic and easing Internet Cloud load. It is appropriate then to view
a cluster of collaborating mobile devices as a Mobile Computing Cloud (MCC). One can bor-
row from the Internet Cloud the notion of “service”, initially provided to local cloud members
only, but now extensible to Internet customers as well. The Mobile Computing Cloud shares
one aspect with the Internet Cloud: the access to massive resources (storage, processing, com-
munications, and applications). However, resources are scattered over heterogeneous, and
often intermittently connected, personal and vehicular platforms. They cannot be aggregated
xvii
Foreword
and harnessed for supercomputer type computations. This scattering of resources is a major
challenge in MCCs. On the other hand, pervasiveness and mobility are also their main assets:
mobility makes the MCCs the ideal observatories over the physical world in which they oper-
ate.
Given the phenomenal growth of Mobile Data and Mobile Applications, there is no question
that Mobile Cloud Computing will be one of the fastest growing themes in Mobile Internet
research and development. While there are many excellent articles and books that cover Mo-
bile Computing platforms, protocols, security and applications in depth as separate topics, it is
far more difficult to find a comprehensive source of information that captures and interrelates
the various components together in a consistent way. The Book “Mobile Cloud Computing:
Foundations and Service Models” by Dijiang Huang and Huijun Wu takes on the challenge
of providing a unified view of Mobile Cloud Computing design from Foundation to Services.
The book is appropriate for beginners as it goes through the various steps of the MCC design.
It is also very valuable for practitioners, for its ample references and implementation exam-
ples.
The book is organized in three parts. Part 1 covers the fundamentals. After an extremely help-
ful taxonomy, mobile platforms including iOS and Android are introduced, and computation
offloading, the most popular mobile cloud service, is described. Next, Virtualization is intro-
duced as the most important enabling technology for mobility. Besides virtualization concepts
developed for the Internet Cloud such as computation, network, storage virtualization and
Hypervisor, Mobile device virtualization techniques (e.g., BYOD and KVM over ARM) are
presented. Finally, MCC service models are described, starting as usual from Internet Cloud
services – (IaaS), (PaaS), (SaaS) – and moving next to existing mobile cloud service models
with plenty of use-case examples, and concluding with mobile IoT microservices.
Part 2 reports on current research and development of mobile cloud computing leveraging
the author’s own work, in particular POEM, an open service framework based on OSGi and
XMPP and offering an offloading and composition system for MCCs. Next, offloading is de-
fined as an optimization problem (to minimize energy and latency) and it is solved using a
mobile cloud directed acyclic graph model. Finally, service offloading/composition is tested
on several MCC application scenarios including hedge and fog platforms. Noteworthy is
the service demonstration on IOT microservice platforms for popular use cases like personal
health management, smart building, and platooning of autonomous vehicles.
Part 3 is dedicated to security. First, Access Control is demonstrated using ABE (Attribute
Based Encryption) and is illustrated on an Information Centric Networking (ICN) naming
scheme and a secure offloading application. Next, a secure BYOD solution based on KVM-
based virtualization of ARM devices is presented. Two essential components are hardware
xviii
Foreword
assisted virtualization and Open vSwitch. An SDN remote controller is used to provide SDN
functionalities.
The four Appendices cover advanced topics of significant interest to implementers. The Cloud
resource management section provides an excellent survey on management techniques in the
Internet Cloud. It is contrasted to mobile cloud management of mobile resources, still in its
infancy, but nonetheless critical. The Mobile Cloud Programming Platform is an initiative
by the authors to develop a platform based on XMPP and OSGi compatible with the existing
mobile OS implementation. If offers a valid open environment for developers with excellent
example illustration. Cryptographic Constructions covers the theoretical aspects of ABE and
together with the Part 3 section makes the topic self-contained in the book. The Bring Your
Own Device (BYOD) section complements the Part 1 BYOD coverage with an interesting
implementation and evaluation.
Hopefully, I have successfully highlighted the content of this book and convinced you to ex-
amine it personally. Practicing mobile computing engineers as well as beginners will enjoy
and benefit from this reading as much as I did.
Mario Gerla
CS Dept. UCLA
xix
Another random document with
no related content on Scribd:
But it was one of the disabilities of the fulfillment of his vow, that he
could not leave England until many things had been done, and when
he spoke his tone was apologetic.
“My hands are tied for a while. I have no choice, Mildred, or I
would not hesitate to go at once. If you wish, the yacht shall be got
ready and you can take your sister with you for company until I can
join you.”
“You are very good, but I don’t think that I am very keen on going.
After all it would have been rather dull—just you and I,” she
answered coldly.
Lady Ethel took the baby back to the nurse and a few moments
later Drake excused himself with the plea that he would finish his
unpacking.
“Why have you brought that man to live with us?” Lady Mildred
asked when she was alone with her husband.
“I like him,” Gaunt answered emphatically.
“Yes. But that is not an answer to my question.”
“Have you any objection? If so, I can very quickly alter the
arrangement.”
“No. I don’t wish that. You have the right to ask any friend you wish
to your house.”
“If you dislike the idea, I will——”
“No—no. You misunderstand me,” she interrupted him hastily. “I
was only thinking that it was a little strange that you should make a
clergyman a member of our family. I have never noticed that you
were religiously inclined,” she wound up drily.
“Mildred, dear, will you be patient with me? It is my intention to
make a great change in my life, and I want your help and sympathy.”
A look of surprise swept over her face.
“Surely you haven’t lost all your money, or anything dreadful of
that kind?” she cried.
“No. But even if I had, you would be quite safe. Your settlement
was a quarter of a million, and that can never be touched,” he
answered grimly.
“May I ask the reason of the change you propose?”
“First of all, I shall give up business in the City. As soon as
possible I shall retire from all the companies in which I am interested,
and shall invest my capital in gilt edged securities that are easily
realized. But a great deal of this capital I intend to use, and it is
probable that in a few months’ time I shall be only a moderately
wealthy man.”
Lady Mildred had listened with eager attention, and was evidently
very puzzled by the announcement.
“It is certain that you can do as you like with your money. As you
say, I and the child are provided for by the settlement,” she remarked
frigidly.
Gaunt was silent and there was a hesitating look in his eyes for he
was wondering if it were possible to tell his wife of the vow that he
had made; but it was certain that she would not understand, and so
the idea was quickly abandoned.
“Mildred, I had hoped that we were going to be better friends,” he
said impulsively.
“Is that possible, John? I think we are a model couple for I cannot
remember that we have ever quarrelled,” she answered nervously.
“I wish that you cared for me sufficiently—to quarrel. I sometimes
wonder if you suspect how much I love you. A few days ago—when
you were so ill—I imagined that, that you loved me even as I love
you.”
“My dear, I am afraid that you are growing sentimental. Really,
John, you are full of surprises. Of course I love you.”
Their eyes met, and his were filled with so great a passion that she
grew afraid and rose quickly.
“I am very tired, and the doctor said that I must not overdo it. I
think I will retire,” she said hastily.
Gaunt proffered his arm and together they walked in silence to her
room, at the door of which she dismissed him with a smile. He went
to the library, and sat down to think over what had taken place. It
was certain that Lady Mildred had been hurt by his refusal to set off
on the yacht at once, and he cursed the necessity of refusal, but
there was no alternative if he was to keep faith.
These last few days had revealed to him some of the difficulties
that lay before him, and for the moment he was dismayed, but it was
typical of the man that there was not even a temptation to turn aside
from the course that he had mapped out.
His reverie was interrupted by the entrance of Drake and Lady
Ethel, both of whom were in the best of spirits, for they were chatting
together gaily and it seemed to Gaunt that the man whom he now
called his father confessor was enjoying himself thoroughly.
“Mr. Drake, I will play you a hundred up,” said Lady Ethel.
“I can’t play billiards,” Drake replied ruefully.
“Then it’s time you learned and I will teach you.”
“I shall be delighted,” he answered.
Gaunt looked after him, and then called out.
“Drake, I want to have a long chat after dinner, so please don’t
make any promise to amuse this young lady,” he said drily.
A slight flush came to Drake’s face as he answered quietly.
“I shall be at your service, Mr. Gaunt.”
And Lady Ethel threw him a glance that was full of mischief.
CHAPTER IX
D URING the last two weeks Gaunt had been working hard in the
City and had made arrangements for relinquishing his active life.
Tempting propositions had been brought to him but they had been
firmly refused, and the general impression was that he had made
sufficient money to satisfy even his requirements and was about to
retire.
There was no attempt to disguise from himself that the chief
matter with which he must deal was the Congo, and he brought all
his intellect to bear on the problem before him. But the difficulties
seemed well-nigh insurmountable.
Now that he knew his position, it was characteristic that he would
not discuss the matter with Drake until he could see daylight. The
suggestion that he should speak at the meeting was distasteful in the
extreme, but finally he decided that refusal was impossible.
When he faced the thousands of tense faces he was calm and
collected.
“Have I your Grace’s permission to speak?” he asked of the
Archbishop.
The latter rose and cleared his throat.
“My lords, ladies and gentlemen. Most of you know the name of
John Gaunt, and I feel sure that you will be interested in one who
must have unique knowledge of the subject we are discussing,” he
said, and resumed his seat.
“I thank your Grace, and promise that I will detain you for but a few
moments. I have listened attentively to all that you have said and I
tell you that the condition of affairs in the Congo has not been
exaggerated. I do not intend to shock you with horrors, but with my
own eyes I have seen men, women and even children murdered in
cold blood, maimed and tortured.”
He paused, for a hoarse murmur had arisen so that it was a few
minutes before he could continue.
“I admit that I myself have made money through labor which has
been procured by these means. My wealth is founded on the ‘red
rubber’ which has come from the Congo. I tell you this so that you
shall know I am quite honest in what I am about to say, for I shall
speak against my own pecuniary interests. You have been
discussing the effects of the annexation of the Congo by the Belgian
government, and some of you have expressed the hope that matters
may be improved thereby.”
He paused, and the silence was intense.
“Your hopes are doomed to disappointment. There can be no
improvement in the conditions, for any improvement would
necessitate the abandonment of the slavery which exists. I said
slavery—but it is hardly the right word, for in modern history slavery
has not meant work forced by the fear of death or torture. Wherever
the late King held active sway, there the country was laid waste by
the sword, and rubber was produced not with any idea of the future
but solely for immediate gold. The abandonment of the present
system can only be accomplished by the abandonment of the Congo
by the Belgians. That they will not do unless compelled by superior
force. Their present budget anticipates a profit of nearly a million
pounds. If the land and produce of the soil be returned to the rightful
owners—the natives—then, instead of a profit, there would
necessarily be a heavy deficit. When the Congo budget provides for
a deficit and not a huge profit, then and not till then will you know
that the natives are about to receive fair treatment. That will occur
only when the country has been drained dry. If you hear that a
portion of the country has been opened to the foreigner, you will
know that that portion is worthless, for the population will either have
been killed or have fled from the fear of death, and the produce will
have been exhausted.”
This statement made a profound impression, and all anxiously
waited for Gaunt to continue.
“You are seeking the amelioration of the natives. To accomplish
this you must remove the present officials. There must be no half
measures and I am convinced that no amount of talk will have the
slightest effect. Actions and not words are required, and it is for you
to see that England does more than talk. A single gunboat at the
mouth of the river would affect a change, while diplomatic
representations will be swept aside as has been done in the past.
Surely England is strong enough to act alone—or is it fear of
Germany that ties her hands? If this be the case, it is not the spirit
that won our empire, and as a race we are doomed. Let there be no
more hesitation, let each of you use his influence and bring pressure
to bear upon our government.”
“We have already done everything in our power,” a bishop
interrupted vehemently.
“Then I fear that the reform of the Congo is impossible. But let us
make an effort. I am a rich man—rich, largely through the Congo—
but, if money is necessary, I am prepared to spend every penny
piece of it on this work. More than that, I now publicly announce that
from this moment I am the enemy of the governors of the Congo.
Any ability that I possess shall be used to affect reform.”
There was a murmur which developed into loud cheers, and there
was a look of defiance in Gaunt’s eyes as he listened.
“My lords, I feel that I owe you some personal explanation. You
must have viewed my appearance here with mingled feelings, for I
am aware that I am looked upon as one of the strongest supporters
of the present régime. You all know the name of Edward Drake, who
has done such good work in the East End of London, and I refer you
to him should you have any doubt as to the honesty of my intentions.
It is owing to his influence that I am here to-night.”
Gaunt paused for a moment and the Archbishop rose to his feet.
“I am sure that we have listened to Mr. Gaunt’s statement with
profound interest. From one point alone what he has said is
invaluable. His evidence will remove every shadow of doubt as to the
atrocities that have been and are taking place in the Congo. I must
own frankly that I looked always upon him as one of our bitterest
enemies. I have been ashamed to think that an Englishman could
have profited by cruelty and torture. Surely God must have brought
him here to-night. We must all admire the courage with which he has
spoken. It was no light thing to face us and frankly admit the sins of
the past, and I honor him for what he has done. He has taken the
only course open to a Christian, for he has promised to do his utmost
to right the wrongs in which he has been a participator. Before Mr.
Gaunt resumes his seat, I should like to ask him one question.
Naturally he is in touch with the rulers of the Congo—would it not be
possible for him to use his influence with them, to bring pressure to
bear upon them that they should govern the natives equitably?”
The Archbishop resumed his seat and Gaunt continued:
“No personal influence or pressure would effect any change.
There is only one effective weapon—force. The position of England
has caused a good deal of cynical amusement in the Congo. The
British government would only move if so great a feeling were
aroused in this country that they dared not do otherwise. Much has
been done in recent years by meetings and writings in the press; but
the Congo is so far away that the truth has never been driven home.
The question of Tariff Reform or Free Trade can rouse fierce
passions, for the principle touches our pocket; but that thousands of
human beings should suffer torture—that is a thing to read and be
harrowed about—but a cup-tie is of much more immediate
importance. Perhaps I am unjust to my fellow countrymen, for at
times they have been aroused to white fury by the story of
oppression and murder. Witness the Armenian atrocities. But then
there was a great man with a silver tongue who could move a nation
by his words. And the only chance for the people of the Congo is that
such a man should rise again and tear from us our complacency.
Make the British people understand that they have been cleverly
swindled. The late King played the confidence trick upon America
and the great powers of Europe. He deliberately hoodwinked them
with his tongue in his cheek. But King Leopold was a master ‘crook.’
He was a born diplomat of the most unscrupulous type; and to his
dying day he was a match for every foreign secretary that crossed