Advertisement

Boosting Dependable Ubiquitous Computing: A Case Study

  • Christian Fernández-Campusano
  • Roberto Cortiñas
  • Mikel Larrea
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8276)

Abstract

Ubiquitous computing has inherent features, e.g., a number of elements in the system with restricted communication and computation capabilities, which make harder to achieve dependability. In this work we explore this research line through the study of TrustedPals, a smartcard-based framework which allows implementing security policies in ubiquitous systems and applications in a decentralized way. The current architecture of TrustedPals uses a consensus algorithm adapted to the omission failure model. In this work, we propose to alternatively use the Paxos algorithm, in order to address more ubiquitous environments.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Pease, M.C., Shostak, R.E., Lamport, L.: Reaching agreement in the presence of faults. J. ACM 27(2), 228–234 (1980)MathSciNetCrossRefGoogle Scholar
  2. 2.
    Fischer, M.J., Lynch, N.A., Paterson, M.: Impossibility of distributed consensus with one faulty process. J. ACM 32(2), 374–382 (1985)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Chandra, T.D., Toueg, S.: Unreliable failure detectors for reliable distributed systems. J. ACM 43(2), 225–267 (1996)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Cortiñas, R., Freiling, F.C., Ghajar-Azadanlou, M., Lafuente, A., Larrea, M., Penso, L.D., Soraluze, I.: Secure failure detection and consensus in trustedpals. IEEE Trans. Dependable Sec. Comput. 9(4), 610–625 (2012)CrossRefGoogle Scholar
  5. 5.
    Fort, M., Freiling, F.C., Penso, L.D., Benenson, Z., Kesdogan, D.: Trustedpals: Secure multiparty computation implemented with smart cards. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 34–48. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Yao, A.C.C.: Protocols for secure computations (extended abstract). In: FOCS, pp. 160–164. IEEE Computer Society (1982)Google Scholar
  7. 7.
    Lamport, L.: The part-time parliament. ACM Trans. Comput. Syst. 16(2), 133–169 (1998)CrossRefGoogle Scholar
  8. 8.
    Chandra, T.D., Hadzilacos, V., Toueg, S.: The weakest failure detector for solving consensus. Journal of the ACM 43(4), 685–722 (1996)MathSciNetCrossRefGoogle Scholar
  9. 9.
    Casteigts, A.: The JBotSim library. CoRR abs/1001.1435 (2010)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2013

Authors and Affiliations

  • Christian Fernández-Campusano
    • 1
  • Roberto Cortiñas
    • 1
  • Mikel Larrea
    • 1
  1. 1.University of the Basque Country UPV/EHUSpain

Personalised recommendations