skip to main content
10.1145/1028509.1028517acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
Article

Collaborative backup for dependable mobile applications

Published: 18 October 2004 Publication History

Abstract

We describe the work we are conducting on new middleware services for dependable and secure mobile systems. This work is based on approaches à la peer-to-peer in order to circumvent the problems introduced by the lack of infrastructure in self-organizing networks of mobile nodes, such as MANETs. The mechanisms we propose are based on collaboration between peer mobile devices to provide middleware services such as trust management and critical data storage. This short paper gives a brief description of the problems we are trying to solve and some hints and ideas towards a solution.

References

[1]
M. Boulkenafed and V. Issarny. AdHocFS: Sharing Files in WLANs. In 2nd Int. Symp. on Network Computing and Applications, pages 156--63. IEEE CS Press, 2003.]]
[2]
M. Boulkenafed and V. Issarny. A middleware service for mobile ad hoc data sharing, enhancing data availability. In 4th ACM/IFIP/USENIX International Middleware Conference, pages 493--511. Springer, 2003.]]
[3]
S. Buchegger and J.-Y. L. Boudec. The selfish node: Increasing routing security in mobile ad hoc networks. Technical Report RR 3354, IBM, May 2001.]]
[4]
G. Cao and M. Singhal. Mutable checkpoints: a new checkpointing approach for mobile computing systems. IEEE Transactions on Parallel and Distributed Systems, 12:157--72, 2001.]]
[5]
I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong. Freenet: A distributed anonymous information storage and retrieval system. Lecture Notes in Computer Science, 2009:46, 2001. http://freenet.sourceforge.net.]]
[6]
B. Dahill, B. Levine, E. Royer, and C. Shields. A secure routing protocol for ad hoc networks. In 10th Conference on Network Protocols (ICNP), November 2002.]]
[7]
Y. Deswarte, L. Blain, and J.-C. Fabre. Intrusion tolerance in distributed systems. In IEEE Symposium on Security and Privacy, pages 110--121. IEEE CS Press, 1991.]]
[8]
A. Khalili, J. Katz, and W. A. Arbaugh. Toward secure key distribution in truly ad-hoc networks. In Symp. on Applications and the Internet Workshops (SAINT'03 Workshops), pages 342--46, 2003.]]
[9]
M.-O. Killijian, M. Banâtre, P. Couderc, L. Courtès, S. Crosta, R. Molva, D. Powell, Y. Roudier, and F. Weiss. The MoSAIC project. http://www.laas.fr/mosaic/.]]
[10]
D. Kügler. An analysis of gnunet and the implications for anonymous, censorship-resistant networks. http://www.ovmj.org/GNUnet/.]]
[11]
S. Lee, R. Sherwood, and B. Bhattacharjee. Cooperative peer groups in NICE. In INFOCOM'03, April 2003.]]
[12]
D. Liu, P. Ning, and K. Sun. Efficient self-healing group key distribution with revocation capability. In 10th ACM Conf. on Computer and Communications Security (CCS'03), pages 231--40, 2003.]]
[13]
MNET. The MNET project. http://mnetproject.org.]]
[14]
P. Nikander. Fault tolerance in decentralized and loosely coupled systems. In Ericsson Conference on Software Engineering. Ericsson, 2000.]]
[15]
P. Papadimitratos and Z. J. Haas. Secure routing for mobile ad hoc networks. In SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), 2002.]]
[16]
T. Park, N. Woo, and H. Y. Yeom. An efficient recovery scheme for mobile computing environments. In Int. Conf. on Parallel And Distributed Systems (ICPADS), pages 53--60. IEEE CS Press, 2001.]]
[17]
C. Pedregal-Martin and K. Ramamrithan. Support for recovery in mobile systems. IEEE Transactions of Computers, 51:1219--24, 2002.]]
[18]
D. K. Pradhan, P. Krishna, and N. H. Vaidya. Recoverable mobile environment: Design and trade-off analysis. In 26th IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-26), pages 16--25. IEEE CS Press, 1996.]]
[19]
R. Prakash and M. Singhal. Low-cost checkpointing and failure recovery in mobile computing systems. IEEE Transactions on Parallel and Distributed Systems, 7:1035--48, 1996.]]
[20]
B. Yao, K.-F. Ssu, and W. K. Fuchs. Message logging in mobile computing. In 29th IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-29), pages 294--301. IEEE CS Press, 1999.]]
[21]
M. Zapata and N. Asokan. Securing ad hoc routing protocols. In ACM Workshop on Wireless Security (WiSe 2002), September 2002.]]
[22]
L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network Magazine, 13:24--30, 1999.]]

Cited By

View all
  • (2013)On Dependability Issues in Ambient Intelligence SystemsPervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments10.4018/978-1-4666-2041-4.ch014(146-155)Online publication date: 2013
  • (2011)On Dependability Issues in Ambient Intelligence SystemsInternational Journal of Ambient Computing and Intelligence10.4018/jaci.20110701033:3(18-27)Online publication date: 1-Jul-2011
  • (2011)Infrastructureless Spatial Storage AlgorithmsACM Transactions on Autonomous and Adaptive Systems10.1145/1968513.19685186:2(1-26)Online publication date: 1-Jun-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MPAC '04: Proceedings of the 2nd workshop on Middleware for pervasive and ad-hoc computing
October 2004
77 pages
ISBN:1581139519
DOI:10.1145/1028509
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 October 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. collaboration
  2. data back-up
  3. mobile applications

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2013)On Dependability Issues in Ambient Intelligence SystemsPervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments10.4018/978-1-4666-2041-4.ch014(146-155)Online publication date: 2013
  • (2011)On Dependability Issues in Ambient Intelligence SystemsInternational Journal of Ambient Computing and Intelligence10.4018/jaci.20110701033:3(18-27)Online publication date: 1-Jul-2011
  • (2011)Infrastructureless Spatial Storage AlgorithmsACM Transactions on Autonomous and Adaptive Systems10.1145/1968513.19685186:2(1-26)Online publication date: 1-Jun-2011
  • (2009)Hovering Information – Self-Organizing Information that Finds its Own StorageAutonomic Communication10.1007/978-0-387-09753-4_5(111-145)Online publication date: 3-Aug-2009
  • (2008)Dependability evaluation of a replication service for mobile applications in dynamic ad-hoc networksProceedings of the 5th international conference on Service availability10.5555/1788594.1788614(171-186)Online publication date: 19-May-2008
  • (2008)Securing Ad Hoc Storage through Probabilistic Cooperation AssessmentElectronic Notes in Theoretical Computer Science (ENTCS)10.1016/j.entcs.2008.05.003192:2(17-29)Online publication date: 1-May-2008
  • (2008)Recovery in Autonomous Robot SwarmsEuropean Robotics Symposium 200810.1007/978-3-540-78317-6_25(243-252)Online publication date: 2008
  • (2008)Dependability Evaluation of a Replication Service for Mobile Applications in Dynamic Ad-Hoc NetworksService Availability10.1007/978-3-540-68129-8_14(171-186)Online publication date: 2008
  • (2007)Security rationale for a cooperative backup service for mobile devicesProceedings of the Third Latin-American conference on Dependable Computing10.5555/2396065.2396087(212-230)Online publication date: 26-Sep-2007
  • (2007)Applying a Threshold Scheme to the Pseudonymization of Health DataProceedings of the 13th Pacific Rim International Symposium on Dependable Computing10.1109/PRDC.2007.21(397-400)Online publication date: 17-Dec-2007
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media