Skip to main content

Data Lockers: Mobile-Agent Based Middleware for the Security and Availability of Roaming Users Data

  • Conference paper
Cooperative Information Systems (CoopIS 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1901))

Included in the following conference series:

Abstract

Accessing remote data anywhere and at anytime constitutes an important advantage in many business environments. However, when working with mobile devices, users face many problems related to: (1) device restrictions: mobile devices are resource-constrained, more vulnerable and fragile than stationary devices (devise exposure problems) and, (2) the communication media: wireless communications are often unstable, asymmetric and expensive (media problems). To alleviate these problems, we present a service, the Lockers Rent Service, for keeping the data of mobile users in a secure and safe space in a proxy at the fixed network, thus providing a solution to the device exposure problems. Data stored in data lockers are available even when the mobile device is disconnected. Furthermore, specific tasks are carried out at the fixed network on behalf of the mobile user, in this way relieving the media problems. The architecture of the Locker Rent Service is based on mobile agents.

This work is supported by CICYT: Comisión Interministerial de Ciencia y Tecnologì a, Spain. [TIC97-0962]; and MOVISTAR, a Spanish Cellular Phone Company.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D.S. Milojicic, et al.: MASIF, the OMG Mobile Agent System Interoperability Facility. In: Proceedings of Mobile Agents 1998 (September 1998)

    Google Scholar 

  2. Amir, Y., Awerbuch, B., Borgstrom, R.S.: A cost-benefit framework for online management of a metacomputing system. In: The International Journal for Decision Support Systems. Elsevier Science, Amsterdam (to appear)

    Google Scholar 

  3. Gray, R., Rus, D., Kotz, D.: Agent TCL: Targeting de needs of mobile computers. IEEE Internet Computing (1997)

    Google Scholar 

  4. Joseph, A.D., Tauber, J.A., Kaashoek, M.F.: Mobile computing with the Rover toolkit. IEEE Transactions on Computers: Special Issue on Mobile Computing 46(3) (March 1997)

    Google Scholar 

  5. Joshi, A., Weerawarana, S., Houstis, E.: On disconnected browsing of distributed information. In: IEEE RIDE 1991, pp. 101–107 (1997)

    Google Scholar 

  6. Kistler, J.J., Satyanarayanan, M.: Disconnected operation in the Coda file system. ACM Transactions on Computer Systems 10, 3–25 (1992)

    Article  Google Scholar 

  7. Kovacs, E., Röhrle, K., Reich, M.: Mobile agents OnTheMove - integrating an agent system into the mobile middleware. In: Acts Mobile Summit., Rhodos, Greece (June 1998)

    Google Scholar 

  8. IBM Aglets Workbench Home Page, http://www.trl.ibm.co.jp/aglets/

  9. Papastavrou, S., Samaras, G., Pitoura, E.: Mobile agents for WWW distributed database access. In: Proceedings of the International Conference on Data Engineering (1999)

    Google Scholar 

  10. Pitoura, E., Samaras, G.: Data Management for Mobile Computing. Kluwer Academic Publishers, Dordrecht (1998)

    MATH  Google Scholar 

  11. Samaras, G., Pitsillides, A.: Client/Intercept: a computational model for wireless environments. In: Proceedings of the 4th International Conference on Telecommunications (ICT 1997) (April 1997)

    Google Scholar 

  12. Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Chichester (1996)

    Google Scholar 

  13. Tschudin, C.: Mobile agent security. In: Intelligent Information Agents. Forthcoming LNCS. M. Klusch

    Google Scholar 

  14. Villate, Y., Gil, D., Goñi, A., Illarramendi, A.: Mobile agents for providing mobile computers with data services. In: Proceedings of the Ninth IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 1998 (1998)

    Google Scholar 

  15. Villate, Y., Pitoura, E., Illarramendi, A., Elrna-garmid, A.K.: Extending the data services of mobile computers by external data lockers. In: Proceedings of the Third International Workshop on Mobility in Databases and Distributed Systems, MDDS 2000. IEEE Computer Society Press, Los Alamitos (September 2000)

    Google Scholar 

  16. X: drive, http://www.xdrive.com/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Villate, Y., Illarramendi, A., Pitoura, E. (2000). Data Lockers: Mobile-Agent Based Middleware for the Security and Availability of Roaming Users Data. In: Scheuermann, P., Etzion, O. (eds) Cooperative Information Systems. CoopIS 2000. Lecture Notes in Computer Science, vol 1901. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10722620_26

Download citation

  • DOI: https://doi.org/10.1007/10722620_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41021-8

  • Online ISBN: 978-3-540-45266-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics