mobile systems availability mobile systems availability
play

Mobile Systems Availability Mobile Systems Availability Integrity - PowerPoint PPT Presentation

Mobile Systems Availability Mobile Systems Availability Integrity and Confidentiality Integrity and Confidentiality MoSAIC MoSAIC M.O.Killijian, D.Powell, M.Bantre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurcom Context Context 3


  1. Mobile Systems Availability Mobile Systems Availability Integrity and Confidentiality Integrity and Confidentiality MoSAIC MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom

  2. Context Context • 3 year project, 3 partners: LAAS, Eurécom, IRISA  Officially started September 2004  Funded by French Ministry of Research • Spontaneous Information Systems (SIS)  Wireless enabled PDAs  Mobile AdHoc Networks (MANETs)  Peer-to-peer model of interactions • New means to enforce  Availability Dependability  Confidentiality and  Integrity Security  Privacy

  3. Context Context • Many research works targeting the network level  Routing  Medium Access Control • We focus on the middleware level  Higher level notions/mechanisms • Right place for dependability mechanisms  Access to the application context • App. dependent recovery (partition/disconnection) → Collaborative Backup of Critical Data

  4. Scenario Scenario Alice is going to a symposium

  5. Scenario Scenario Alice meets new people and colleagues

  6. Scenario Scenario Alice produces data and breaks her PDA

  7. Scenario Scenario But she gets a new PDA and is able to restore her data

  8. Challenges for Dependability Challenges for Dependability • Intermittent access to infrastructure • No prior organization • Ephemeral interactions • User transparency • Private sensitive data • Limited energy, computation and storage

  9. Goals Goals • Design and develop  new mechanisms for the tolerance of • accidental faults • malicious faults  without usual strong assumptions • synchronous communication • global clocks • infrastructure • New middleware for dependable mobile systems

  10. Collaborative critical data Collaborative critical data backup backup • Issues  Resource allocation/discovery  Garbage collection of obsolete backups  Integrity and confidentiality of data  Resilience to DoS (selfishness or maliciousness)  Negotiation between mutually suspicious peer devices (no prior trust relationship) • Hints  Fragmentation-Redundancy-Dissemination  Peer-to-peer  Mobility for dissemination

  11. Collaborative critical data Collaborative critical data backup backup • Issues  Resource allocation/discovery  Garbage collection of obsolete backups  Integrity and confidentiality of data  Resilience to DoS (selfishness or maliciousness)  Negotiation between mutually suspicious peer devices (no prior trust relationship) • Hints  Fragmentation-Redundancy-Dissemination  Peer-to-peer  Mobility for dissemination

  12. Trust management for Trust management for collaborative services collaborative services • Issues  No prior trust relationship  Protect from and identify malicious devices  Accountability, privacy, integrity,confidentiality • Hints  Self-carried reputation  Currency-based incentives  Hybrids

  13. Collaborative Backup for Collaborative Backup for Ubiquitous Computing Ubiquitous Computing • Transparent distributed backup of critical data for mobile systems over wireless communications  Inspired by peer-to-peer techniques  Fragmentation-Redundancy-Dissemination based • No-prior trust relationship  Automated resource discovery and negotiation  E-cash and reputation schemes • Privacy  Tamper-proof hardware/trust core  Identity management (authentication, multiple IDs, etc.)

  14. Mobile Systems Availability Mobile Systems Availability Integrity and Confidentiality Integrity and Confidentiality MoSAIC MoSAIC http://www.laas.fr/mosaic

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend