Abstract

Checkpointing algorithms in mobile computing systems suffer from security attacks. Checkpoint data being stored in stable storage or being transferred over the wireless network is the source of information leakage. Secured Checkpointing comes with computational and storage overhead. In resource constrained mobile computing systems overhead optimization is a challenge. In this paper we propose a secured fault tolerant algorithm which combines movement based checkpointing algorithm with public key cryptography.KeywordsCheckpointrecoverycomputation datacryptographyauthenticationconfidentialitynonrepudiation etc

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call