Voluntary Cooperation in Pervasive Computing Services

The advent of pervasive computing is moving us towards a new paradigm for computing in terms of ad hoc services. This carries with it a certain risk, from a security and management viewpoint. Users become increasingly responsible for their own hosts. A form of service transaction based on minimal trust is discussed. A proof of concept implementation of nondemand (voluntary) services is discussed for pervasive computing environments. 'Voluntary Remote Procedure Call' is a test-implementation of the proposed protocol integrated into cfengine, to show how voluntary cooperation of nodes can allow a cautious exchange of collaborative services, based on minimal trust. An analysis of implementation approaches followed by a discussion of the desirability of this technology is presented.

[1]  Ralph Wittmann,et al.  Delegating Remote Operation Execution in a Mobile Computing Environment , 1996, Mob. Networks Appl..

[2]  Morris Sloman,et al.  Policies Hierarchies for Distributed Systems Management , 1993, IEEE J. Sel. Areas Commun..

[3]  Jean-Philippe Martin-Flatin,et al.  Push vs. pull in Web-based network management , 1998, Integrated Network Management VI. Distributed Management for the Networked Millennium. Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management. (Cat. No.99EX302).

[4]  Siri Fagernes,et al.  Pervasive Computer Management: A Model of Network Policy with Local Autonomy , 2006 .

[5]  Monica S. Lam,et al.  Virtual Appliances in the Collective: A Road to Hassle-Free Computing , 2003, HotOS.

[6]  Andrew M. Colman,et al.  The complexity of cooperation: Agent-based models of competition and collaboration , 1998, Complex..

[7]  Howard Rheingold,et al.  Smart Mobs: The Next Social Revolution , 2002 .

[8]  Sally Floyd,et al.  Wide area traffic: the failure of Poisson modeling , 1995, TNET.

[9]  James F. Doyle,et al.  Peer-to-Peer: harnessing the power of disruptive technologies , 2001, UBIQ.

[10]  Mark Burgess,et al.  A Site Configuration Engine , 1995, Comput. Syst..

[11]  B. R. Badrinath,et al.  Reworking the RPC Paradigm for Mobile Clients , 1996, Mob. Networks Appl..

[12]  Valérie Issarny,et al.  Analyzing Non-functional Properties of Mobile Agents , 2000, FASE.

[13]  Alva L. Couch,et al.  Selected Papers in Network and System Administration , 2001 .

[14]  Mark Burgess,et al.  Scalability of Peer Configuration Management in Logically Ad Hoc Networks , 2004, IEEE Transactions on Network and Service Management.

[15]  Gesine Reinert,et al.  Small worlds , 2001, Random Struct. Algorithms.

[16]  Jeffrey D. Case,et al.  Simple network management protocol , 1995 .

[17]  Paolo Bellavista,et al.  Policy-Driven Binding to Information Resources in Mobility-Enabled Scenarios , 2003, Mobile Data Management.

[18]  Oswald Drobnik,et al.  Agent-based configuration management of distributed applications , 1996, Proceedings of International Conference on Configurable Distributed Systems.

[19]  Mark Burgess,et al.  A graph-theoretical model of computer security , 2004, International Journal of Information Security.

[20]  Mark Burgess,et al.  An Approach to Understanding Policy Based on Autonomy and Voluntary Cooperation , 2005, DSOM.

[21]  Xiaohua Jia,et al.  A reliable asynchronous RPC architecture for wireless networks , 2002, Comput. Commun..

[22]  Kurt Geihs,et al.  Decentralized SNMP management with mobile agents , 1999, Integrated Network Management VI. Distributed Management for the Networked Millennium. Proceedings of the Sixth IFIP/IEEE International Symposium on Integrated Network Management. (Cat. No.99EX302).

[23]  A. Colman,et al.  The complexity of cooperation: Agent-based models of competition and collaboration , 1998, Complex..

[24]  Anupam Joshi,et al.  A Secure Infrastructure for Service Discovery and Access in Pervasive Computing , 2003, Mob. Networks Appl..