1,074 research outputs found

    A Cloud-based Mobile Privacy Protection System with Efficient Cache Mechanism

    Get PDF
    People increasingly rely on their mobile devices and use them to store a lot of data. Some of the data are personal and private, whose leakage leads to users\u27 privacy harm. Meanwhile, mobile apps and services over-collect users\u27 data due to the coarse-grained access control approach utilized by the mobile operating system. We propose a cloud-based approach to provide fine-grained access control toward data requests. We add privacy level, as a new metadata, to data and manage the storage using different policies correspondingly. However, the proposed approach leads to performance decreases because of the extra communication cost. We also introduce a novel cache mechanism to eliminate the extra cost by storing non-private and popular data on the mobile device. As part of our cache mechanism, we design a user-preference-based ordering method along with the principle of locality to determine how popular some data are. We also design a configurable refresh policy to improve the overall performance. Finally, we evaluate our approach using a real phone in a simulated environment. The results show that our approach can keep the response time of all data requests within a reasonable range and the cache mechanism can further improve the performance

    Supporting Secure and Transparent Mobility in Wireless Local-Area Networks

    Get PDF
    Wireless Local Area Networks (WLANs) are experiencing unprecedented growth as the last mile connectivity solution. Mobility is an important feature of any wireless communication system. Handoffs are a crucial link level functionality that enable a mobile user to stay connected to a wireless network by switching the data connection from one base station or access point to another. Conceptually the handoff process can be subdivided into two phases: (i) Discovery - wherein the client searches for APs in vicinity and (ii) Authentication - the client authenticates to an AP selected from the discovery phase. The handoff procedure recommended by the IEEE 802.11 standard and closely implemented by various wireless vendors is an intrusive and a brute-force approach. My testbed based study of these algorithms showed that they incur high latencies varying between 400ms to 1.3 seconds depending on the security settings in effect. Such inefficient handoff mechanisms can have a detrimental impact on applications especially synchronous multimedia connections such as Voice over IP. In my dissertation, I have proposed and evaluated the notion of locality among APs induced by user mobility patterns. A relation is created among APs which captures this locality in a graph theoretic manner called neighbor graphs -- a distributed structure that autonomously captures such locality. Based on this, I have designed and evaluated efficient mechanisms to address the two different phases of this handoff process. Through a rigorous testbed based implementation, I have demonstrated the viability of the concept of mobility induced locality through good performance improvements. Through extensive simulations I have studied the performance of proposed handoff mechanisms over various different topologies. This work has shown that a topological structure which captures the locality relationship among APs is fundamental to designing mechanisms that make user mobility transparent from the higher layers of the networking stack

    Location and routing optimization protocols supporting internet host mobility

    Get PDF
    PhD ThesisWith the popularity of portable computers and the proliferation of wireless networking interfaces, there is currently a great deal of interest in providing IP networking support for host mobility using the Internet as a foundation for wireless networking. Most proposed solutions depend on a default route through the mobile host's horne address, which makes for unnecessarily long routes. The major problem that this gives rise to is that of finding an efficient way of locating and routing that allows datagrams to be delivered efficiently to moving destinations whilst limiting costly Internet-wide location updates as much as possible. Two concepts - "local region" and "patron service" - are introduced based on the locality features of the host movement and packet traffic patterns. For each mobile host, the local region is a set of designated subnetworks within which a mobile host often moves, and the patrons are the hosts from which the majority of traffic for the mobile host originated. By making use of the hierarchical addressing and routing structure of Internet, the two concepts are used to confine the effects of a host moving, so location updates are sent only to a designated host moving area and to those hosts which are most likely to call again, thus providing nearly optimal routing for most communication. The proposed scheme was implemented as an IP extension using a network simulator and evaluated from a system performance point of view. The results show a significant reduction in the accumulated communication time along with improved datagram tunneling, as compared with its extra location overhead. In addition, a comparison with another scheme shows that our functionality is more effective both for location update and routing efficiency. The scheme offers improved network and host scalability by isolating local movement from the rest of the world, and provides a convenient point at which to perform administration functions
    corecore