Abstract

An efficient fault tolerant algorithm based on movement-based secure checkpointing and logging for mobile computing system is proposed here. The recovery scheme proposed here combines independent checkpointing and message logging. Here we consider mobility rate of the user in checkpointing so that mobile host can manage recovery information such as checkpoints and logs properly so that a mobile host takes less recovery time after failure. Mobile hosts save checkpoints when number of hand-off exceeds a predefined hand-off threshold value. Current approaches save logs in base station. But this approach maximizes recovery time if message passing frequency is large. If a mobile host saves log in its own memory, recovery cost will be less because log retrieval time will be small after failure. But there is a probability of memory crash of a mobile host. In that case logs can not be retrieved if it is saved only in mobile node. If the failure is transient then logs can be retrieved from the memory of mobile node. Hence in this algorithm mobile hosts also save log in own memory and base station. In case of crash recovery, log will be retrieved from base station and in case of transient failure recovery logs will be retrieved from mobile host. In this algorithm recovery probability is optimized and total recovery time is reduced in comparison to existing works. Logs are very small in size. Hence saving logs in mobile hosts does not cause much memory overhead. Hand-off threshold is a function of mobility rate, message passing frequency and failure rate of mobile hosts. This algorithm describes a secure checkpointing technique as a method for providing fault tolerance while preventing information leakage through the checkpoint data.

Highlights

  • INTRODUCTIONFault tolerant mobile computing systems are increasingly being used in such application as ecommerce, banking, different mobile monitoring devices in hospital and mission critical application, where privacy and integrity of data as important as uninterrupted operation of services provided

  • Fault tolerant mobile computing systems are increasingly being used in such application as ecommerce, banking, different mobile monitoring devices in hospital and mission critical application, where privacy and integrity of data as important as uninterrupted operation of services provided.The checkpointing and logging technique is one such distributed service to provide fault tolerance for the system

  • In light of the above constraint, this paper presents a movement-based checkpointing strategy combined with logging for recovery of individual hosts in mobile computing environments

Read more

Summary

INTRODUCTION

Fault tolerant mobile computing systems are increasingly being used in such application as ecommerce, banking, different mobile monitoring devices in hospital and mission critical application, where privacy and integrity of data as important as uninterrupted operation of services provided. In light of the above constraint, this paper presents a movement-based checkpointing strategy combined with logging for recovery of individual hosts in mobile computing environments. Our proposed approach mobile host saves log in its own memory to reduce the recovery time and increase recovery probability after failure This type of log saving schemes is applicable to such kind of mobile device which can support large amount of storage of message and in which instant recovery is required after failure. The network is one of the common places where security threats exist [5][6] In this algorithm each mobile host encrypts checkpoint and saves in base station. Our proposed low overhead, movement based, secure checkpointing and rollback recovery algorithm ensures fault tolerance of applications running on mobile hosts as well as confidentiality of checkpoint data.

RELATED WORKS
Our Observations
Problem definition
SYSTEM MODEL
Assumptions
PROPOSED WORK
Working example
CORRECTNESS AND PROOF
PERFORMANCE ANALYSIS
CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.