Data Staging on Untrusted Surrogates

نویسندگان

  • Jason Flinn
  • Shafeeq Sinnamohideen
  • Niraj Tolia
  • Mahadev Satyanarayanan
چکیده

We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed file systems running on small, storage-limited pervasive computing devices. Data staging opportunistically prefetches files and caches them on nearby surrogate machines. Surrogates are untrusted and unmanaged: we use end-to-end encryption and secure hashes to provide privacy and authenticity of data and have designed our system so that surrogates are as reliable and easy to manage as possible. Our results show that data staging reduces average file operation latency for interactive applications running on the Compaq iPAQ handheld by up to 54%.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Staging on NFS

Due to the storage limitation and imperfect prediction, mobile computing devices may experience large delays when accessing data on the distributed file systems. Flinn et al. [4] have proposed a novel architecture, called Data Staging, in which nearby untrusted and unmanaged surrogates are used as the secondary file cache for the client to reduce the remote file operation latency. A prototype s...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

متن کامل

A study on the accuracy of motion tracking of thoracic tumors at radiotherapy with external surrogates

Introduction: In radiotherapy with external surrogates, exact information of tumor position is one of the key factors that improves treatment delivery. Many dynamic tumors in thorax region of patient move mainly due to respiration and are known as intra-fractional motion error that must be compensated, as well. One of clinical strategy is using Stereotactic Body Radiation Thera...

متن کامل

Legal constraints of using surrogacy

Background and Purpose: Surrogacy is a new assisted reproductive technology requiring to be perceived based on the real experiences of surrogacy patients regarding its legal issues so that legislators are able to enact appropriate laws for such patients' safety. This study pursues the goal to examine the experiences of commissioning mothers and surrogates confronting legal issues. Methods: This...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003