Data lockers: Mobile-agent based middleware for the security and availability of roaming users data

被引:0
|
作者
Villate, Y
Illarramendi, A
Pitoura, E
机构
[1] Univ Basque Country, Languages & Syst Dept, Bilbao 20080, Spain
[2] Univ Ioannina, Dept Comp Sci, GR-45110 Ioannina, Greece
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Accessing remote data anywhere and at anytime constitutes an important advantage in many business environments. However, when working with mobile devices, users face many problems related to: (1) device restrictions: mobile devices are resource-constrained, more vulnerable and fragile than stationary devices (devise exposure problems) and, (2) the communication media: wireless communications are often unstable, asymmetric and expensive (media problems). To alleviate these problems, we present a service, the Lockers Rent Service, for keeping the data of mobile users in a secure and safe space in a proxy at the fixed network, thus providing a solution to the device exposure problems. Data stored in data lockers are available even when the mobile device is disconnected. Furthermore, specific tasks are carried out at the fixed network on behalf of the mobile. user, in this way relieving the media problems. The architecture of the Locker Rent Service is based on mobile agents.
引用
收藏
页码:275 / 286
页数:12
相关论文
共 50 条
  • [1] A Mobile-agent Security Architecture
    Lin, DeShu
    Huang, TingLei
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 477 - 480
  • [2] The Research on Mobile-agent Security
    WANG Ru chuan
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2002, (03) : 47 - 52
  • [3] Data Security in Free Roaming Mobile Agents
    Geetha, G.
    Jayakumar, C.
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 472 - +
  • [4] An Evaluation of Time-Threshold-based Mobile-Agent Data Collection Schemes
    Shen, Song
    Wu, Pengfei
    2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 920 - 923
  • [5] Robustness and security in a mobile-agent based network monitoring system
    Tripathi, A
    Koka, M
    Karanth, S
    Osipkov, I
    Talkad, H
    Ahmed, T
    Johnson, D
    Dier, S
    INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, : 320 - 321
  • [6] Research on Mobile-Agent Based Data Access Model in Pervasive Computing Environment
    Li Fan
    Jiang WeiJian
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1523 - +
  • [7] Protecting mobile-agent data collection against blocking attacks
    Shao, Min-Hua
    Zhou, Hanying
    COMPUTER STANDARDS & INTERFACES, 2006, 28 (05) : 600 - 611
  • [8] A mobile agent-based communications middleware for data streaming in the battlefield
    Carvalho, Marco
    Suri, Niranjan
    Arguedas, Marco
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 794 - 800
  • [9] A middleware service for mobile ad hoc data sharing, enhancing data availability
    Boulkenafed, Malika
    Issarny, Valérie
    2003, Springer Verlag (2672):
  • [10] A middleware service for mobile ad hoc data sharing, enhancing data availability
    Boulkenafed, M
    Issarny, V
    MIDDLEWARE 2003, PROCEEDINGS, 2003, 2672 : 493 - 511