MoSAIC: Mobile System Availability Integrity and Confidentiality

We describe the work we are conducting on new middleware services for dependable and secure mobile systems. This work is based on approaches a la peer-to-peer in order to circumvent the problems introduced by the lack of infras- tructure in self-organizing networks of mobile nodes, such as MANETs. The mechanisms we propose are based on collaboration between peer mobile devices to provide mid- dleware services such as trust management and critical data storage. This short paper gives a brief description of the problems we are trying to solve and some hints and ideas towards a solution.

[1]  Mukesh Singhal,et al.  Mutable Checkpoints: A New Checkpointing Approach for Mobile Computing Systems , 2001, IEEE Trans. Parallel Distributed Syst..

[2]  Brian D. Noble,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation Pastiche: Making Backup Cheap and Easy , 2022 .

[3]  Mukesh Singhal,et al.  Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems , 1996, IEEE Trans. Parallel Distributed Syst..

[4]  Andrew V. Goldberg,et al.  Towards an archival Intermemory , 1998, Proceedings IEEE International Forum on Research and Technology Advances in Digital Libraries -ADL'98-.

[5]  Scott Shenker,et al.  Making gnutella-like P2P systems scalable , 2003, SIGCOMM '03.

[6]  Donggang Liu,et al.  Efficient self-healing group key distribution with revocation capability , 2003, CCS '03.

[7]  Laurent Bussard One-time authorization for off-line interactions , 2003 .

[8]  Yves Deswarte,et al.  Supporting multiple levels of criticality , 1998, Digest of Papers. Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (Cat. No.98CB36224).

[9]  Randy H. Katz,et al.  Measuring and Reducing Energy Consumption of Network Interfaces in Hand-Held Devices (Special Issue on Mobile Computing) , 1997 .

[10]  Michel Banâtre,et al.  Lessons from FTM: An Experiment in Design and Implementation of a Low-Cost Fault-Tolerant System , 1996, IEEE Trans. Reliab..

[11]  Jean-Charles Fabre,et al.  Portable serialization of CORBA objects: a reflective approach , 2002, OOPSLA '02.

[12]  Yves Deswarte,et al.  An Internet Authorization Scheme Using Smart-Card-Based Security Kernels , 2001, E-smart.

[13]  Hein Meling,et al.  Anthill: a framework for the development of agent-based peer-to-peer systems , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[14]  Christopher Batten,et al.  pStore: A Secure Peer-to-Peer Backup System∗ , 2007 .

[15]  Val Henson,et al.  An Analysis of Compare-by-hash , 2003, HotOS.

[16]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[17]  Mahadev Satyanarayanan,et al.  Opportunistic Use of Content Addressable Storage for Distributed File Systems , 2003, USENIX Annual Technical Conference, General Track.

[18]  Xiaoyun Wang,et al.  Finding Collisions in the Full SHA-1 , 2005, CRYPTO.

[19]  Ahmed Helmy Efficient Resource Discovery in Wireless AdHoc Networks: Contacts Do Help , 2005 .

[20]  Hector Garcia-Molina,et al.  Bidding for storage space in a peer-to-peer data preservation system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[21]  Gil Utard,et al.  Data Distribution in a Peer to Peer Storage System , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..

[22]  Michel Banâtre,et al.  SPREADing the Web , 2003, PWC.

[23]  Michel Banâtre,et al.  Collaborative backup for dependable mobile applications , 2004, MPAC '04.

[24]  Ralph Deters,et al.  3LS - a peer-to-peer network simulator , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[25]  Gerd Kortuem,et al.  Disseminating Trust Information in Wearable Communities , 2000 .

[26]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[27]  W. Kent Fuchs,et al.  Message logging in mobile computing , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).

[28]  Michael Burrows,et al.  A Cooperative Internet Backup Scheme , 2003, USENIX Annual Technical Conference, General Track.

[29]  Cornelia Kappler,et al.  Enabling Mobile Peer-to-Peer Networking , 2004, EuroNGI Workshop.

[30]  Ethan L. Miller,et al.  Long-Term file activity patterns in a UNIX workstation environment , 1998 .

[31]  Krithi Ramamritham,et al.  Support for Recovery in Mobile Systems , 2002, IEEE Trans. Computers.

[32]  John Kubiatowicz,et al.  Erasure Coding Vs. Replication: A Quantitative Comparison , 2002, IPTPS.

[33]  Walter F. Tichy,et al.  An Empirical Study of Delta Algorithms , 1996, SCM.

[34]  Antony I. T. Rowstron,et al.  Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.

[35]  Michel Banâtre,et al.  Ambient computing applications: an experience with the SPREAD approach , 2003, 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the.

[36]  Michael Mitzenmacher,et al.  Digital fountains: a survey and look forward , 2004, Information Theory Workshop.

[37]  Peter L. Reiher,et al.  Roam: a scalable replication system for mobile computing , 1999, Proceedings. Tenth International Workshop on Database and Expert Systems Applications. DEXA 99.

[38]  Stefan Savage,et al.  The Phoenix Recovery System: Rebuilding from the Ashes of an Internet Catastrophe , 2003, HotOS.

[39]  Roger Dingledine,et al.  The Free Haven Project : design and deployment of an anonymous secure data haven , 2000 .

[40]  Peter A. Dinda,et al.  Wayback: A User-level Versioning File System for Linux (Awarded Best Paper!) , 2004, USENIX Annual Technical Conference, FREENIX Track.

[41]  Gerd Kortuem,et al.  When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[42]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[43]  Laurent Bussard,et al.  History-Based Signature or How to Trust Anonymous Documents , 2004, iTrust.

[44]  William A. Arbaugh,et al.  Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[45]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[46]  Christian Grothoff,et al.  An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks , 2005 .

[47]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[48]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM 2001.

[49]  Kwong-Sak Leung,et al.  Operation-based Update Propagation in a Mobile File System , 1999, USENIX Annual Technical Conference, General Track.

[50]  L. Floridi,et al.  The tragedy of the digital commons , 2004, Ethics and Information Technology.

[51]  Michael Mitzenmacher,et al.  Accessing multiple mirror sites in parallel: using Tornado codes to speed up downloads , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[52]  Edward Grochowski,et al.  Emerging Trends in Data Storage on Magnetic Hard Disk Drives , 1999 .

[53]  Pekka Nikander Fault Tolerance in Decentralized and Loosely Coupled Systems , 2000 .

[54]  Heon Young Yeom,et al.  An efficient recovery scheme for mobile computing environments , 2001, Proceedings. Eighth International Conference on Parallel and Distributed Systems. ICPADS 2001.

[55]  Mahadev Satyanarayanan,et al.  Scalable, secure, and highly available distributed file access , 1990, Computer.

[56]  Paul Mackerras,et al.  The rsync algorithm , 1996 .

[57]  Matthieu Roy,et al.  Sauvegarde coopérative entre pairs pour dispositifs mobiles , 2005, UbiMob '05.

[58]  Antoine Vernois,et al.  Data durability in peer to peer storage systems , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[59]  Jean-Charles Fabre,et al.  Reflective Fault-Tolerant Systems: From Experience to Challenges , 2003, IEEE Trans. Computers.

[60]  Yves Deswarte,et al.  Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[61]  Norman C. Hutchinson,et al.  Deciding when to forget in the Elephant file system , 1999, SOSP.

[62]  Tyson Condie,et al.  Simulating A File-Sharing P2P Network , 2003 .

[63]  Dah Ming Chiu,et al.  Erasure code replication revisited , 2004 .

[64]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[65]  G. Hardin The Tragedy of the Commons , 2009 .

[66]  Valérie Issarny,et al.  AdHocFS: sharing files in WLANs , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..

[67]  Laurent Bussard,et al.  Trust and Authorization in Pervasive B2E Scenarios , 2003, ISC.

[68]  David R. Karger,et al.  Wide-area cooperative storage with CFS , 2001, SOSP.

[69]  Darrell D. E. Long,et al.  Deep Store: an archival storage system architecture , 2005, 21st International Conference on Data Engineering (ICDE'05).

[70]  Serge Abiteboul,et al.  Detecting changes in XML documents , 2002, Proceedings 18th International Conference on Data Engineering.

[71]  Laurent Bussard,et al.  Embedding Distance-Bounding Protocols within Intuitive Interactions , 2003, SPC.

[72]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[73]  Vladimiro Sassone,et al.  A Formal Model for Trust in Dynamic Networks , 2003 .

[74]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[75]  Christian Grothoff,et al.  Efficient Sharing of Encrypted Data , 2002, ACISP.

[76]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[77]  Dennis Kügler,et al.  An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks , 2003, Privacy Enhancing Technologies.

[78]  Ben Y. Zhao,et al.  OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.

[79]  Jason Flinn,et al.  Energy-Efficiency and Storage Flexibility in the Blue File System , 2004, OSDI.

[80]  Antony I. T. Rowstron,et al.  PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[81]  Valérie Issarny,et al.  A Middleware Service for Mobile Ad Hoc Data Sharing, Enhancing Data Availability , 2003, Middleware.

[82]  Kian-Lee Tan,et al.  PeerStore: better performance by relaxing in peer-to-peer backup , 2004 .

[83]  Lihao Xu,et al.  Hydra: a platform for survivable and secure data storage systems , 2005, StorageSS '05.

[84]  Gaetano Borriello,et al.  Peer-To-Peer Backup for Personal Area Networks , 2003 .

[85]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[86]  Jean-Marc Menaud,et al.  SIDE surfer: enriching casual meetings with spontaneous information gathering , 2001, CARN.

[87]  Fred Douglis,et al.  Redundancy Elimination Within Large Collections of Files , 2004, USENIX Annual Technical Conference, General Track.

[88]  Philipp Obreiter,et al.  A Taxonomy of Incentive Patterns - The Design Space of Incentives for Cooperation , 2003, AP2PC.

[89]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[90]  Michael Luby,et al.  A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.

[91]  Nj Piscataway,et al.  Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .

[92]  Laurent Bussard,et al.  Untraceable secret credentials: trust establishment with privacy , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[93]  Pietro Michiardi,et al.  Game theoretic analysis of security in mobile ad hoc networks , 2002 .

[94]  Felix C. Freiling,et al.  Using Smart Cards for Fair Exchange , 2001, WELCOM.

[95]  Dhiraj K. Pradhan,et al.  Recoverable mobile environment: design and trade-off analysis , 1996, Proceedings of Annual Symposium on Fault Tolerant Computing.

[96]  Angelos D. Keromytis,et al.  Offline Micropayments without Trusted Hardware , 2002, Financial Cryptography.

[97]  Pekka Nikander,et al.  Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties , 2002, Security Protocols Workshop.

[98]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[99]  Anas Abou El Kalam,et al.  Security Model for Health Care Computing and Communication Systems , 2003, SEC.

[100]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[101]  N. Asokan,et al.  Optimistic protocols for fair exchange , 1997, CCS '97.

[102]  David Mazières,et al.  A low-bandwidth network file system , 2001, SOSP.

[103]  Mario Kolberg,et al.  Tools for Peer-to-Peer Network Simulation , 2006 .

[104]  Sean Quinlan,et al.  Venti: A New Approach to Archival Storage , 2002, FAST.

[105]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[106]  Henning Schulzrinne,et al.  Seven degrees of separation in mobile ad hoc networks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).

[107]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[108]  Brian D. Noble,et al.  Samsara: honor among thieves in peer-to-peer storage , 2003, SOSP '03.

[109]  Masayuki Terada,et al.  An Optimistic Fair Exchange Protocol for Trading Electronic Rights , 2004, CARDIS.

[110]  Pietro Michiardi,et al.  Cooperation enforcement and network security mechanisms for mobile ad hoc networks , 2004 .

[111]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[112]  Stefan Savage,et al.  Total Recall: System Support for Automated Availability Management , 2004, NSDI.

[113]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[114]  David Powell,et al.  Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices , 2006, 2006 Sixth European Dependable Computing Conference.

[115]  Kavitha Ranganathan,et al.  Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).

[116]  Udi Manber,et al.  Finding Similar Files in a Large File System , 1994, USENIX Winter.

[117]  Marvin Theimer,et al.  Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.

[118]  Marvin Theimer,et al.  Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.

[119]  Oliver P. Waldhorst,et al.  A special-purpose peer-to-peer file sharing system for mobile ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[120]  Robert Tappan Morris,et al.  Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.