Smart Phones as Self-Cleaning Portable Caches for Infrastructure-Based Mobile Computing

نویسندگان

  • Stephen Smaldone
  • Benjamin Gilbert
  • Matt Toups
  • Liviu Iftode
  • Mahadev Satyanarayanan
چکیده

An increasingly ubiquitous computing infrastructure promises mobile users an attractive “carrynothing” computing model, in which powerful computers for personal use can be found anywhere, anytime. Since pure “carry-nothing” computing approaches can make users unacceptably dependent on the availability and performance of Internet connectivity, compromise solutions in which users carry their computing environment have been proposed in the literature. To make these approaches practical, and to outweigh the benefits of “carry-everything” models, a user’s personal computing environment must be conveniently, efficiently, and reliably stored and transferred between the local computing infrastructure and centralized servers. Unfortunately, all currently proposed approaches fail to meet one or more of these requirements. We present Horatio, a trusted personal assistant that enhances user experience in infrastructurebased mobile computing systems. Horatio runs on smart phones (or other smart personal devices, such as PDAs, handheld PCs, etc.), leveraging three key properties of these devices: (i) users carry them wherever they go, (ii) users place high levels of trust in them, and (iii) they are almost always connected to the Internet, albeit with varying and sometimes limited bandwidth. Horatio devices act as trusted allies in three ways. First, they cache users’ personal computing environments and make them available even when servers are not reachable. Second, they ensure that any cache modifications will be eventually stored at servers. Third, they improve the performance of both saving and retrieving a personal computing environment. In this paper, we present the initial basic design of Horatio and a number of near-term future directions for this project. We describe how Horatio: (i) extends the Internet Suspend/Resume R © system by introducing new state transfer protocols based upon the separation of control and data state, (ii) cleans cache state asynchronously without user intervention, and (iii) reduces both the suspend and resume latencies of a user’s personal computing environment while maintaining high levels of availability and reliability.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Facet: towards a smart camera network of mobile phones

Smart camera networks provide the opportunity to detect, classify, and trace visual events by means of a wireless network of embedded computing devices equipped with camera sensors. Previous research in this area has largely focused on custom hardware solutions. In contrast, we propose to use mobile phones as a portable and low-cost platform to implement smart camera networks. Due to mass produ...

متن کامل

Outdoor Distributed Computing with Split Smart Messages

In this paper, we exemplify outdoor distributed computing and point out the key challenges. We present Split Smart Messages, a lightweight, portable, network failure resilient and relatively secure middleware that enables a large subset of outdoor distributed computing applications. We also present a Service Discovery, Interaction and Payment Protocol (SDIPP) tailored for mobile phones. We eval...

متن کامل

A Cooperative Emergency Navigation Framework Using Mobile Cloud Computing

The use of wireless sensor networks (WSNs) for emergency navigation systems suffer disadvantages such as limited computing capacity, restricted battery power and high likelihood of malfunction due to the harsh physical environment. By making use of the powerful sensing ability of smart phones, this paper presents a cloud-enabled emergency navigation framework to guide evacuees in a coordinated ...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication

For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as an appropriate trusted gateway for external machines with low communication needs. A message-based approach is best in such a scenario with moving mobile phones and machines. We propose a security model for access control to the communication infrastructure that is also messa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008