Secure Dynamic Reconfiguration of Scalable CORBA Systems with Mobile Agents

As various Internet services, electronic commerce, and information and communication systems permeate our lives, their continual availability becomes a dominant issue. But continuing software evolution requires system reconfiguration. Running systems must upgrade their components or change their configuration parameters. In addition, Internet services often need to serve thousands or millions of users. This scenario raises three conflicting issues that need to be resolved: availability, configurability, and scalability. We propose the use of mobile reconfiguration agents for the efficient, secure, and scalable dynamic reconfiguration of Internet systems. In our system, the agents are deployed within the object-oriented architecture of a CORBA-compliant ORB that supports safe reconfiguration both of its middleware engine and of user applications. Using a graphical front-end, administrators build reconfiguration agents and specify the topology of the reconfiguration network the agents traverse to reconfigure the distributed system on-the-fly. The agents collect, group, and return the results of inspection and reconfiguration operations in the distributed system to the administrator. Our infrastructure provides an efficient way of supporting secure dynamic reconfiguration of long-running, scalable Internet systems based on CORBA. This paper discusses our motivation, application scenarios and the design and implementation of our system. We conclude with performance results and directions for future work.

[1]  Antonio Puliafito,et al.  An analytical comparison of the client-server, remote evaluation and mobile agents paradigms , 1999, Proceedings. First and Third International Symposium on Agent Systems Applications, and Mobile Agents.

[2]  Mario Baldi,et al.  Evaluating the tradeoffs of mobile code design paradigms in network management applications , 1998, Proceedings of the 20th International Conference on Software Engineering.

[3]  Andreas Reuter,et al.  Transaction Processing: Concepts and Techniques , 1992 .

[4]  Jan Vitek,et al.  The JavaSeal Mobile Agent Kernel , 1999, Proceedings. First and Third International Symposium on Agent Systems Applications, and Mobile Agents.

[5]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[6]  Radu Popescu-Zeletin,et al.  An Approach for Providing Mobile Agent Fault Tolerance , 1998, Mobile Agents.

[7]  Prashant Jain,et al.  Dynamically Configuring Communication Services with the Service Configurator Pattern , 1998 .

[8]  J. C. Byington,et al.  Mobile agents and security , 1998, IEEE Commun. Mag..

[9]  Fabio Kon,et al.  Monitoring, Security, and Dynamic Configuration with the dynamicTAO Reflective ORB , 2000, Middleware.

[10]  Daniel Hagimont,et al.  A performance evaluation of the mobile agent paradigm , 1999, OOPSLA '99.

[11]  Doug Montgomery,et al.  Mobile Streams: a middleware for reconfigurable distributed scripting , 1999, Proceedings. First and Third International Symposium on Agent Systems Applications, and Mobile Agents.

[12]  George C. Necula,et al.  Safe, Untrusted Agents Using Proof-Carrying Code , 1998, Mobile Agents and Security.

[13]  Lily B. Mummert,et al.  Camelot and Avalon: A Distributed Transaction Facility , 1991 .