Title :
Secure checkpointing using public key cryptography in mobile computing
Author :
Biswas, Suparna ; Neogy, Sarmistha
Author_Institution :
West Bengal Univ. of Technol., India
Abstract :
A secure checkpointing algorithm for resource constrained and failure prone mobile computing system is proposed here. A mobile node saves checkpoint of processes running on it. If a process fails then it recovers from last saved checkpoint due to security attack. Today´s e-commerce is getting converted to m-commerce where mobile devices are used to do transactions on the Internet. A checkpoint contains system specific as well as application specific data. If checkpoint data itself gets corrupted confidentiality of application specific data is lost and recovery of failed process cannot be ensured. Hence checkpoints must be saved and retrieved securely through wireless channels. Here we define a term “Time to Security Attack “(TTS) for checkpoints of applications running on mobile nodes. TTS is defined as a function of number of mobile nodes, mobility rate, failure rate and handoff rate of mobile node in a safety critical mobile computing system. We analyze the performance of proposed secure checkpointing algorithm and compare recovery cost with and without cryptography.
Keywords :
Internet; checkpointing; mobile computing; public key cryptography; Internet; checkpointing algorithm; e-commerce; m-commerce; mobile computing system; public key cryptography; security attack; time to security attack; wireless channels; Checkpointing; Communication system security; Cryptography; Mobile communication; Mobile computing; Wireless communication; checkpoint; encryption; time to security attack; trusted fault tolerance;
Conference_Titel :
Advanced Networks and Telecommunication Systems (ANTS), 2011 IEEE 5th International Conference on
Conference_Location :
Bangalore
Print_ISBN :
978-1-4673-0093-3
DOI :
10.1109/ANTS.2011.6163669