Skip to main content
Log in

Keep Your Data Safe and Available While Roaming

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

The possibility of accessing and/or receiving local or remote data anywhere and at anytime constitutes an important advantage in many business environments. However, when working with mobile devices, users face many problems, such as: (1) devise exposure problems – mobile devices are more vulnerable and fragile than stationary devices, because they can be easily stolen, lost or damaged, (2) media problems – wireless communications are often unstable, asymmetric and expensive, and (3) availability problems – mobile devices stay disconnected for long periods of time. To alleviate these problems, we present a service, Data Lockers, which offers to its users first, the possibility of keeping their data in a secure and safe space in a proxy, thus alleviating the device exposure problem. Next, data stored in a data locker are available even when the mobile device is disconnected, thus providing a solution to the availability problem. Finally, specific tasks are carried out at the fixed network on behalf of the mobile user, in this way relieving the media problem. The architecture of the Locker Rental Service is based on mobile agents. These agents, and the locker, stay always close to the location of the user, traveling to meet the user wherever the user moves, therefore, allowing users to use anywhere-anytime, ubiquitous persistent storage space located at the fixed network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Y. Amir, B. Awerbuch and R.S. Borgstrom, A cost-benefit framework for online management of a metacomputing system, The International Journal for Decision Support Systems 28(1–2) (April 2000) 155–164.

    Google Scholar 

  2. Cyber-Ark Software Ltd., http://www.cyber-ark.com/

  3. Driveway Corporation, http://www.driveway.com/

  4. M. Esler, J. Hightower, T. Anderson and G. Borriello, Next century challenges: Data-centric networking for invisible computing: The Portolano project at the University of Washington, in: Proceedings of the Fifth Annual International Conference on Mobile Computing and Networks (MobiCOM'99), Seattle, WA (August 1999).

  5. Fleet Boston Financial Corporation, http://www.filetrust.com/

  6. General Magic, Mobile agents white paper, in: General Magic Technology White Paper (1998).

  7. A. Goñi, A. Illarramendi, E. Mena, Y. Villate and J. Rodríguez, Antarctica: A multiagent system for internet data services in a wireless computing framework, in: NSF Workshop on an Infrastructure for Mobile and Wireless Systems, Scottsdale, AZ (October 2001).

  8. R. Gray, D. Rus and D. Kotz, Agent TCL: Targeting the needs of mobile computers, IEEE Internet Computing (1997).

  9. IBM Aglets Workbench Home Page, http://www.trl.ibm.co.jp/aglets/

  10. T. Imielinski and B.R. Badrinath, Mobile wireless computing: Challenges in data management, Communications of the ACM (October 1994) 19–27.

  11. A. Joshi, S. Weerawarana and E. Houstis, On disconnected browsing of distributed information, in: IEEE RIDE97 (1997) pp. 101–107.

  12. J.J. Kistler and M. Satyanarayanan, Disconnected operation in the Coda file system, ACM Transactions on Computer Systems 10 (1992) 3–25.

    Google Scholar 

  13. E. Kovacs, K. Röhrle and M. Reich, Mobile agents OnTheMove – integrating an agent system into the mobile middleware, in: Acts Mobile Summit, Rhodos, Greece (June 1998).

  14. Lexias Inc, http://www.mydigivault.com/

  15. D. Milojicic, Mobile agent applications, IEEE Concurrency 7(3) (1999) 80–90.

    Google Scholar 

  16. Milojicic et al., MASIF, The OMGMobile Agent System Interoperability Facility, in: Proceedings of Mobile Agents'98 (September 1998).

  17. S. Papastavrou, G. Samaras and E. Pitoura, Mobile agents for WWW distributed database access, in: Proceedings of the International Conference on Data Engineering (1999).

  18. E. Pitoura and G. Samaras, Data Management for Mobile Computing (Kluwer Academic, 1998).

  19. G. Samaras and A. Pitsillides, Client/Intercept: a computational model for wireless environments, in: Proceedings of the 4th International Conference on Telecommunications (ICT'97) (April 1997).

  20. B. Schneier, Applied Cryptography, 2nd ed. (Wiley, 1996).

  21. C. Tschudin, Mobile agent security, in: Intelligent Information Agents – Agent Based Information Discovery and Management in the Internet, ed. M. Klusch (Springer-Verlag, 1999) pp. 431–446.

  22. Xdrive Technologies, http://www.xdrive.com/

  23. YourZ.com Inc., http://www.myspace.com/

  24. Zephra Corporation, http: // www. securitymadesimple.com/

Download references

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Villate, Y., Illarramendi, A. & Pitoura, E. Keep Your Data Safe and Available While Roaming. Mobile Networks and Applications 7, 315–328 (2002). https://doi.org/10.1023/A:1015467429243

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1015467429243

Navigation