摘要 :
Advances in computing and communication technologies have resulted in a wide variety of networked mobile devices that access data over the Internet. In this paper, we argue that servers by themselves may not be able to handle this...
展开
Advances in computing and communication technologies have resulted in a wide variety of networked mobile devices that access data over the Internet. In this paper, we argue that servers by themselves may not be able to handle this diversity in client characteristics and so intermediaries, such as proxies, should be employed to handle the mismatch between the server-supplied data and the client capabilities. Since existing proxies are primarily designed to handle traditional wired hosts, such proxy architectures will need to be enhanced to handle mobile devices. We propose such an enhanced proxy architecture that is capable of handling the heterogeneity in client needs―specifically the variations in client bandwidth and display capabilities. Our architecture combines transcoding (which is used to match the fidelity of the requested object to client capabilities) and caching (which is used to reduce the latency for accessing popular objects). Proxies that Transcode and Cache, PTCs, intelligently adapt to prevailing system conditions using learning techniques to decide whether to transcode locally or fetch an appropriate version from the server. Our experimental results indicate that the use of PTCs produces significant improvements in the client response times. We show that such results hold true for a variety of data content types like images and video data. Further, we find that even simple learning techniques can lead to significant performance improvements.
收起
摘要 :
Effective network management software ensures networks to run credibly. In this paper we discuss the design and implementation of network device fault management based on Pure Java. It includes designs of general functions, server...
展开
Effective network management software ensures networks to run credibly. In this paper we discuss the design and implementation of network device fault management based on Pure Java. It includes designs of general functions, server functions, client functions and a database table. The software can make it convenient to monitoring a network device, and improve network efficiency.
收起
摘要 :
Mobile devices and applications exhibit highly diverse behavior in their usage and power/performance requirements. In order to accommodate such diversity, this paper presents 'HeteroMates' system that uses heterogeneous processors...
展开
Mobile devices and applications exhibit highly diverse behavior in their usage and power/performance requirements. In order to accommodate such diversity, this paper presents 'HeteroMates' system that uses heterogeneous processors to extend the dynamic power/performance range of client devices, i.e., offer both high performance and reduced power consumption. It proposes core group abstraction that groups a small number of heterogeneous cores to form a single execution unit. Croup heterogeneity is exposed as multiple heterogeneity (H) states, an interface similar to the P-state interface already used for frequency scaling. Further, the core group abstraction is extended to a multicoregroup to allow multiple cores within a group to be active concurrently. Also demonstrated is the importance of 'uncore' power in total SoC power consumption and the need for uncore-aware operation and uncore power scalability when seeking to extend a platform's dynamic power/performance range using heterogeneity. Experimental evaluations use real-world client applications and a unique experimental testbed comprised of heterogeneous cores and a shared uncore component. Results show that HeteroMates can provide significant performance improvements while also lowering energy consumption for a diverse set of applications when compared to homogeneous processor configurations.
收起
摘要 :
With the rapid development of mobile communication technologies and network applications, communication models for mobile client and server interaction are becoming increasingly popular. The certificateless public key cryptography...
展开
With the rapid development of mobile communication technologies and network applications, communication models for mobile client and server interaction are becoming increasingly popular. The certificateless public key cryptography is suitable for designing security protocols which are used for mobile devices under the model of client and server. In the last decade, various ID-based protocols have been discussed, but some of them have several flaws. To address the security problems found in the key exchange protocol designed by Hassan et al., we introduce a new protocol named iHEEL protocol, a new key exchange and authentication protocol in client-server environment. Our new protocol is proved to be secure under the random oracle model and computational Diffie-Hellman assumption. Finally, iHEEL protocol is compared with several preceding protocols in terms of security properties and communication cost, which is measured by different data volumes.
收起
摘要 :
Mobile devices are increasingly being used to store and manage users' personal information, as well as to access popular third-party context-based services. Very often, these applications need to determine common availabilities am...
展开
Mobile devices are increasingly being used to store and manage users' personal information, as well as to access popular third-party context-based services. Very often, these applications need to determine common availabilities among a set of user schedules, in order to allow colleagues, business partners and people to meet. The privacy of the scheduling operation is paramount to the success of such applications, as often users do not want to share their personal schedule details with other users or third-parties. In this paper, we propose practical and privacy-preserving solutions for mobile devices to the server-based scheduling problem. Our three novel algorithms take advantage of the homomorphic properties of well-known cryptosystems in order to privately and efficiently compute common user availabilities. We also formally outline the privacy requirements in such scheduling applications and we implement our solutions on real mobile devices. The experimental measurements and analytical results show that the proposed solutions not only satisfy the privacy properties but also fare better, in regard to computation and communication efficiency, compared to other well-known solutions. Finally, we assess the utility and expectations, in terms of privacy and usability, of the proposed solutions by means of a targeted survey and user-study of mobile-phone users.
收起
摘要 :
Problem statement: Content adaptation have been playing an important role in mobile devices, wherein the content display differs from desktop computers in many aspects, such as display screens, processing power, network connection...
展开
Problem statement: Content adaptation have been playing an important role in mobile devices, wherein the content display differs from desktop computers in many aspects, such as display screens, processing power, network connection bandwidth. In order to display web contents appropriately on mobile devices and on other types of devices such as hand computers, PDAs, Smart phones, it is important to adapt or transcode them to fit the characteristics of these devices. Approach: Existing content adaptation systems deploy various techniques which have been developed for specific purposes and goals. By exploiting various possible combinations of available resources, appropriate adaptation process can be carried over on the actual data, so that the information can be assimilated in a different end system other than the intended system. In this study, we present a content adaptation system based on rules created for mobile devices. Rules are invoked based on the individual client device information. Results: The adaptation has been performed according to the delivery device which was formalized through the profiler system. A profile holds information about the hardware and software specifications of the device thereby enabling the adaption of web content based on their characteristics which enables the user to access the web easily on various devices. Conclusion/Recommendation: This study enhances the viability of the information being presented to user, which will be independent of the end system being used for accessing the information. With the help of configurable rules, effective content adaptation can be achieved to provide optimal result.
收起
摘要 :
The authentication protocols are trusted components in a communication system in order to protect sensitive information against a malicious adversary in the client-server environment by means of providing a variety of services inc...
展开
The authentication protocols are trusted components in a communication system in order to protect sensitive information against a malicious adversary in the client-server environment by means of providing a variety of services including users' privacy and authentication. In the cryptographic protocols, understanding the security failures is the key for both patching to the existing protocols and designing the future protocols. Recently, in 2014, Wang proposed an improved Elliptic Curve Cryptography (ECC) based anonymous remote authentication scheme using smart card and claimed that the proposed scheme is secure against password guessing attack, smart card lost/stolen verifier attack, and also preserves user anonymity and prevents credential leakage. However, in this paper, we show that Wang's scheme fails to preserve the user anonymity and does not prevent the off-line password guessing attack, credential leakage and smart card lost/stolen verifier attack. In order to withstand those security pitfalls found in Wang's scheme, we aim to propose a new secure privacy-preserving ECC-based client authentication with key agreement protocol using smart card. Through the formal and informal security analysis we show that our scheme is secure against possible known attacks including the off-line password guessing attack, credential leakage attack and smart card lost/stolen verifier attack. Our scheme also preserves the user anonymity property. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks. Our scheme provides high security along with low computational and communication costs. As a result, our scheme is practically suitable for mobile devices in the client-server environment as compared to other related schemes in the literature.
收起
摘要 :
Cloud computing providers have disseminated dynamic storage provisioning delivered to end users as on-demand services. Although cloud file storage and sharing has become popular among home users, the access requirements, performan...
展开
Cloud computing providers have disseminated dynamic storage provisioning delivered to end users as on-demand services. Although cloud file storage and sharing has become popular among home users, the access requirements, performance expectations and usage characteristics are different for organisations, and were not originally considered by popular applications and tools for synchronising files between cloud providers and local repositories. Moreover, multisite organisations traditionally have legacy file storage and wide-area networking solutions to support their business systems. Typically, the file repositories are replicated between sites using private communication links. The combination of legacy storage solutions interconnected through private links with cloud-based file storage is a challenging task. In this context, this paper introduces Cloud4NetOrg, a client architecture for cloud file storage and multisite repository synchronisation. We implemented prototypes of this architecture that interact with two popular cloud file services (DropBox and OneDrive), and the experimental results indicate a promising application in collaborative environments with several LANs. Indeed, Cloud4NetOrg decreases the synchronisation time and the total data transferred from/to cloud repositories by using the organisation repositories as a hierarchical cache system.
收起
摘要 :
A cache stores data in order to serve future requests to those data faster. In mobile devices, the data have to be transferred from a server through the mobile network before being stored in the cache. The mobile network is prone ...
展开
A cache stores data in order to serve future requests to those data faster. In mobile devices, the data have to be transferred from a server through the mobile network before being stored in the cache. The mobile network is prone to failure caused by users' movements and by the placement of base transceiver stations. Moreover, the mobile devices use various telecommunications technologies and therefore the speed of the network is highly variable. Using a cellular network for communication is also expensive. The cache is an intermediate component which addresses this problem. Once the data are downloaded, they can be stored in the cache for possible future reuse. When using a cache, the system designer presumes that the data will be requested again in the future. On the other hand, the original data stored on the server can be changed. Then, the cached data are in an inconsistent state. In this paper, authors present an adaptive method for maintaining the consistency of cached data which saves network traffic by reducing the number of messages needed for inconsistency detection.
收起
摘要 :
Developing software for personal wireless devices (PWDs) requires new methods and tools that address the restrictions introduced by these devices' mobile nature. The thin-client applications for limited devices (TCPTE) framework s...
展开
Developing software for personal wireless devices (PWDs) requires new methods and tools that address the restrictions introduced by these devices' mobile nature. The thin-client applications for limited devices (TCPTE) framework supports the development of thin-client applications for mobile devices with limited resources. Using TCPTE, we can execute Java applications on a server and display their AWT interfaces on a remote client. TCPTE combines the advantages of thin-client computing with the richness of client-server graphical interfaces and lets programmers develop applications for PWDs using the same processes and tools they typically use for desktop applications.
收起