Abstract
Checkpointing algorithms in mobile computing systems suffer from security attacks. Checkpoint data being stored in stable storage or being transferred over the wireless network is the source of information leakage. Secured Checkpointing comes with computational and storage overhead. In resource constrained mobile computing systems overhead optimization is a challenge. In this paper we propose a secured fault tolerant algorithm which combines movement based checkpointing algorithm with public key cryptography.KeywordsCheckpointrecoverycomputation datacryptographyauthenticationconfidentialitynonrepudiation etc
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have