Data Staging on Untrusted Surrogates
نویسندگان
چکیده
We show how untrusted computers can be used to facilitate secure mobile data access. We discuss a novel architecture, data staging, that improves the performance of distributed file systems running on small, storage-limited pervasive computing devices. Data staging opportunistically prefetches files and caches them on nearby surrogate machines. Surrogates are untrusted and unmanaged: we use end-to-end encryption and secure hashes to provide privacy and authenticity of data and have designed our system so that surrogates are as reliable and easy to manage as possible. Our results show that data staging reduces average file operation latency for interactive applications running on the Compaq iPAQ handheld by up to 54%.
منابع مشابه
Data Staging on NFS
Due to the storage limitation and imperfect prediction, mobile computing devices may experience large delays when accessing data on the distributed file systems. Flinn et al. [4] have proposed a novel architecture, called Data Staging, in which nearby untrusted and unmanaged surrogates are used as the secondary file cache for the client to reduce the remote file operation latency. A prototype s...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملPerformance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملA study on the accuracy of motion tracking of thoracic tumors at radiotherapy with external surrogates
Introduction: In radiotherapy with external surrogates, exact information of tumor position is one of the key factors that improves treatment delivery. Many dynamic tumors in thorax region of patient move mainly due to respiration and are known as intra-fractional motion error that must be compensated, as well. One of clinical strategy is using Stereotactic Body Radiation Thera...
متن کاملLegal constraints of using surrogacy
Background and Purpose: Surrogacy is a new assisted reproductive technology requiring to be perceived based on the real experiences of surrogacy patients regarding its legal issues so that legislators are able to enact appropriate laws for such patients' safety. This study pursues the goal to examine the experiences of commissioning mothers and surrogates confronting legal issues. Methods: This...
متن کامل