Data Staging on Untrusted Surrogates

We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed file systems running on small, storage-limited pervasive computing devices. Data staging opportunis-tically prefetches files and caches them on nearby surrogate machines. Surrogates are untrusted and unmanaged: we use end-to-end encryption and secure hashes to provide privacy and authenticity of data and have designed our system so that surrogates are as reliable and easy to manage as possible. Our results show that data staging reduces average file operation latency for interactive applications running on the Compaq iPAQ hand-held by up to 54%.

[1]  G. Wu,et al.  WINMAC: a novel transmission protocol for infostations , 1999, 1999 IEEE 49th Vehicular Technology Conference (Cat. No.99CH36363).

[2]  Brian D. Noble,et al.  Safety, Visibility, and Performance in a Wide-Area File System , 2002, FAST.

[3]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[4]  Werner Vogels,et al.  File system usage in Windows NT 4.0 , 1999, SOSP.

[5]  Arun Venkataramani,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tcp Nice: a Mechanism for Background Transfers , 2022 .

[6]  Mahadev Satyanarayanan,et al.  The case for cyber foraging , 2002, EW 10.

[7]  Mahadev Satyanarayanan,et al.  Coda File System User and System Administrators Manual , 1995 .

[8]  David Gelernter,et al.  Lifestreams: a storage model for personal data , 1996, SGMD.

[9]  Geoffrey H. Kuenning,et al.  Automated hoarding for mobile computers , 1997, SOSP.

[10]  Mahadev Satyanarayanan,et al.  Disconnected operation in the Coda File System , 1992, TOCS.

[11]  David Garlan,et al.  Aura: an Architectural Framework for User Mobility in Ubiquitous Computing Environments , 2002, WICSA.

[12]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[13]  David G Leeper Wireless data blaster. , 2002, Scientific American.

[14]  Mahadev Satyanarayanan,et al.  Categories and Subject Descriptors: D.4.3 [Software]: File Systems Management—Distributed , 2022 .

[15]  Andrea C. Arpaci-Dusseau,et al.  Information and control in gray-box systems , 2001, SOSP.

[16]  Randal C. Burns,et al.  Group-based management of distributed file caches , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[17]  Jim Waldo,et al.  The Jini architecture for network-centric computing , 1999, CACM.

[18]  Darrell D. E. Long,et al.  The case for efficient file access pattern modeling , 1999, Proceedings of the Seventh Workshop on Hot Topics in Operating Systems.

[19]  Arun Venkataramani,et al.  Bandwidth constrained placement in a WAN , 2001, PODC '01.

[20]  Peter Honeyman,et al.  Multi-level Caching in Distributed File Systems or Your cache ain't nuthin' but trash , 1992 .

[21]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[22]  James Griffioen Randy Appleton Performance Measurements of Automatic Prefetching , 1995 .

[23]  Brian D. Noble,et al.  A Case for Fluid Replication , 1999 .

[24]  David Garlan,et al.  Project Aura: Toward Distraction-Free Pervasive Computing , 2002, IEEE Pervasive Comput..

[25]  Maria Ebling,et al.  Exploiting weak connectivity for mobile file access , 1995, SOSP.

[26]  Jim Zelenka,et al.  Informed prefetching and caching , 1995, SOSP.

[27]  William J. Bolosky,et al.  A large-scale study of file-system contents , 1999, SIGMETRICS '99.

[28]  Mahadev Satyanarayanan,et al.  Disconnected Operation in the Coda File System , 1999, Mobidata.

[29]  Mahadev Satyanarayanan,et al.  Caching trust rather than content , 2000, OPSR.

[30]  Garth A. Gibson,et al.  Automatic I/O hint generation through speculative execution , 1999, OSDI '99.

[31]  Kazuhiko Yamazaki,et al.  IBM's Linux Watch: The Challenge of Miniaturization , 2002, Computer.

[32]  Randy H. Katz,et al.  Measuring and Reducing Energy Consumption of Network Interfaces in Hand-Held Devices (Special Issue on Mobile Computing) , 1997 .

[33]  Jaap C. Haartsen,et al.  The Bluetooth radio system , 2000, IEEE Personal Communications.

[34]  Jason Flinn,et al.  Quantifying the energy consumption of a pocket computer and a Java virtual machine , 2000, SIGMETRICS '00.

[35]  Mahadev Satyanarayanan,et al.  Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..