Abstract
The possibility of accessing and/or receiving local or remote data anywhere and at anytime constitutes an important advantage in many business environments. However, when working with mobile devices, users face many problems, such as: (1) devise exposure problems – mobile devices are more vulnerable and fragile than stationary devices, because they can be easily stolen, lost or damaged, (2) media problems – wireless communications are often unstable, asymmetric and expensive, and (3) availability problems – mobile devices stay disconnected for long periods of time. To alleviate these problems, we present a service, Data Lockers, which offers to its users first, the possibility of keeping their data in a secure and safe space in a proxy, thus alleviating the device exposure problem. Next, data stored in a data locker are available even when the mobile device is disconnected, thus providing a solution to the availability problem. Finally, specific tasks are carried out at the fixed network on behalf of the mobile user, in this way relieving the media problem. The architecture of the Locker Rental Service is based on mobile agents. These agents, and the locker, stay always close to the location of the user, traveling to meet the user wherever the user moves, therefore, allowing users to use anywhere-anytime, ubiquitous persistent storage space located at the fixed network.
Similar content being viewed by others
References
Y. Amir, B. Awerbuch and R.S. Borgstrom, A cost-benefit framework for online management of a metacomputing system, The International Journal for Decision Support Systems 28(1–2) (April 2000) 155–164.
Cyber-Ark Software Ltd., http://www.cyber-ark.com/
Driveway Corporation, http://www.driveway.com/
M. Esler, J. Hightower, T. Anderson and G. Borriello, Next century challenges: Data-centric networking for invisible computing: The Portolano project at the University of Washington, in: Proceedings of the Fifth Annual International Conference on Mobile Computing and Networks (MobiCOM'99), Seattle, WA (August 1999).
Fleet Boston Financial Corporation, http://www.filetrust.com/
General Magic, Mobile agents white paper, in: General Magic Technology White Paper (1998).
A. Goñi, A. Illarramendi, E. Mena, Y. Villate and J. Rodríguez, Antarctica: A multiagent system for internet data services in a wireless computing framework, in: NSF Workshop on an Infrastructure for Mobile and Wireless Systems, Scottsdale, AZ (October 2001).
R. Gray, D. Rus and D. Kotz, Agent TCL: Targeting the needs of mobile computers, IEEE Internet Computing (1997).
IBM Aglets Workbench Home Page, http://www.trl.ibm.co.jp/aglets/
T. Imielinski and B.R. Badrinath, Mobile wireless computing: Challenges in data management, Communications of the ACM (October 1994) 19–27.
A. Joshi, S. Weerawarana and E. Houstis, On disconnected browsing of distributed information, in: IEEE RIDE97 (1997) pp. 101–107.
J.J. Kistler and M. Satyanarayanan, Disconnected operation in the Coda file system, ACM Transactions on Computer Systems 10 (1992) 3–25.
E. Kovacs, K. Röhrle and M. Reich, Mobile agents OnTheMove – integrating an agent system into the mobile middleware, in: Acts Mobile Summit, Rhodos, Greece (June 1998).
Lexias Inc, http://www.mydigivault.com/
D. Milojicic, Mobile agent applications, IEEE Concurrency 7(3) (1999) 80–90.
Milojicic et al., MASIF, The OMGMobile Agent System Interoperability Facility, in: Proceedings of Mobile Agents'98 (September 1998).
S. Papastavrou, G. Samaras and E. Pitoura, Mobile agents for WWW distributed database access, in: Proceedings of the International Conference on Data Engineering (1999).
E. Pitoura and G. Samaras, Data Management for Mobile Computing (Kluwer Academic, 1998).
G. Samaras and A. Pitsillides, Client/Intercept: a computational model for wireless environments, in: Proceedings of the 4th International Conference on Telecommunications (ICT'97) (April 1997).
B. Schneier, Applied Cryptography, 2nd ed. (Wiley, 1996).
C. Tschudin, Mobile agent security, in: Intelligent Information Agents – Agent Based Information Discovery and Management in the Internet, ed. M. Klusch (Springer-Verlag, 1999) pp. 431–446.
Xdrive Technologies, http://www.xdrive.com/
YourZ.com Inc., http://www.myspace.com/
Zephra Corporation, http: // www. securitymadesimple.com/
Rights and permissions
About this article
Cite this article
Villate, Y., Illarramendi, A. & Pitoura, E. Keep Your Data Safe and Available While Roaming. Mobile Networks and Applications 7, 315–328 (2002). https://doi.org/10.1023/A:1015467429243
Issue Date:
DOI: https://doi.org/10.1023/A:1015467429243