mobile systems availability integrity and confidentiality mosaic
Download
Skip this Video
Download Presentation
Mobile Systems Availability Integrity and Confidentiality MoSAIC

Loading in 2 Seconds...

play fullscreen
1 / 14

Mobile Systems Availability Integrity and Confidentiality MoSAIC - PowerPoint PPT Presentation


  • 64 Views
  • Uploaded on

Mobile Systems Availability Integrity and Confidentiality MoSAIC. M.O.Killijian , D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom. Context. 3 year project, 3 partners: LAAS, Eurécom, IRISA Officially started September 2004 Funded by French Ministry of Research

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Mobile Systems Availability Integrity and Confidentiality MoSAIC' - parry


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
mobile systems availability integrity and confidentiality mosaic
Mobile Systems Availability Integrity and Confidentiality MoSAIC

M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier

LAAS-CNRS - IRISA- Eurécom

context
Context
  • 3 year project, 3 partners: LAAS, Eurécom, IRISA
    • Officially started September 2004
    • Funded by French Ministry of Research
  • Spontaneous Information Systems (SIS)
    • Wireless enabled PDAs
    • Mobile AdHoc Networks (MANETs)
    • Peer-to-peer model of interactions
  • New means to enforce
    • Availability
    • Confidentiality
    • Integrity
    • Privacy

Dependability

and

Security

context1
Context
  • Many research works targeting the network level
    • Routing
    • Medium Access Control
  • We focus on the middleware level
    • Higher level notions/mechanisms
      • Right place for dependability mechanisms
    • Access to the application context
      • App. dependent recovery (partition/disconnection)
  • Collaborative Backup of Critical Data
scenario
Scenario

Alice is going to a symposium

scenario1
Scenario

Alice meets new people and colleagues

scenario2
Scenario

Alice produces data and breaks her PDA

scenario3
Scenario

But she gets a new PDA and is able to restore her data

challenges for dependability
Challenges for Dependability
  • Intermittent access to infrastructure
  • No prior organization
  • Ephemeral interactions
  • User transparency
  • Private sensitive data
  • Limited energy, computation and storage
goals
Goals
  • Design and develop
    • new mechanisms for the tolerance of
      • accidental faults
      • malicious faults
    • without usual strong assumptions
      • synchronous communication
      • global clocks
      • infrastructure
  • New middleware for dependable mobile systems
collaborative critical data backup
Collaborative critical data backup
  • Issues
    • Resource allocation/discovery
    • Garbage collection of obsolete backups
    • Integrity and confidentiality of data
    • Resilience to DoS (selfishness or maliciousness)
    • Negotiation between mutually suspicious peer devices (no prior trust relationship)
  • Hints
    • Fragmentation-Redundancy-Dissemination
    • Peer-to-peer
    • Mobility for dissemination
collaborative critical data backup1
Collaborative critical data backup
  • Issues
    • Resource allocation/discovery
    • Garbage collection of obsolete backups
    • Integrity and confidentiality of data
    • Resilience to DoS (selfishness or maliciousness)
    • Negotiation between mutually suspicious peer devices (no prior trust relationship)
  • Hints
    • Fragmentation-Redundancy-Dissemination
    • Peer-to-peer
    • Mobility for dissemination
trust management for collaborative services
Trust management for collaborative services
  • Issues
    • No prior trust relationship
    • Protect from and identify malicious devices
    • Accountability, privacy, integrity,confidentiality
  • Hints
    • Self-carried reputation
    • Currency-based incentives
    • Hybrids
collaborative backup for ubiquitous computing
Collaborative Backup for Ubiquitous Computing
  • Transparent distributed backup of critical data for mobile systems over wireless communications
    • Inspired by peer-to-peer techniques
    • Fragmentation-Redundancy-Dissemination based
  • No-prior trust relationship
    • Automated resource discovery and negotiation
    • E-cash and reputation schemes
  • Privacy
    • Tamper-proof hardware/trust core
    • Identity management (authentication, multiple IDs, etc.)
ad