Term Paper: Dependable Distributed Computing

Pages: 3 (870 words)  ·  Style: APA  ·  Bibliography Sources: 6  ·  Topic: Education - Computers  ·  Buy This Paper

¶ … Distribution Systems with a Concentration on Cyber Foraging

Cyber foraging and the quantification of trust in context-aware Web Applications: A Performance Assessment of Caching Trust vs. Hoarding Content

Description

The use of cyber foraging as a mechanism for enabling Internet-aware mobile devices of all types to interconnect with data staging servers shows significant potential for creating composite applications in real time, in addition to updating content taxonomies defined by mobile device users. Content taxonomies could potentially include social networking, consumer-generated media feeds including blogs, and news feeds enabled through RSS. The definition and fine-tuning of content taxonomies on mobile devices is in its nascent stages today yet growing rapidly due to the sophistication of mobile devices; however a corresponding operating architecture with greater breadth and agility is needed. Caching trust, or the ability to sufficiently cache knowledge vs. hoarding content is a fundamental design decision in this architecture, and the design dichotomy addressed in these suggested research topics.

Source(s)

M. Satyanarayanan, Caching Trust Rather Than Content. M. Satyanarayanan. School of Computer Science, Carnegie Mellon University, Operating Systems Review. Volume 34, No. 4, October 2000

The author of this paper presents the concept of caching as it has typically applied to the performance of computing systems, mentioning the concept of how this concept decreases latency and makes network failures transparent at the user level of networks. The author contends that in mobile-based environments that would have the ability to deliver composite application components, entire applications and a wide variety of content-based applets, RSS and real-time newsfeeds through cyber foraging-based delivery mechanisms with data staging servers there is the fundamental decision of whether to hoard or cache content, and further, the author introduces the concept of caching trust.

In this case, it is the assumption that all data of potential interest can be hoarded on the mobile client [1, 2, 4]. In other words, such clients have to be prepared to cope with cache misses during normal use. If they are able to cache trust, then any untrusted site in the fixed infrastructure can be used to stage data for servicing cache misses -- one does not have to go back to a distant server, nor does one have to compromise security. (p. 1)."

Satyanarayanan goes on to mention the concepts of privacy being protected through the use of per-file private encryption keys to protect content on data staging servers and the use of a digital fingerprint to authenticate the content for use on the remote server. Satyanarayanan defines the security method as follows:

It is simple to extend this idea to privacy. In addition… [END OF PREVIEW]

Dependable Distributed Systems Term Paper


Using Cloud Computing to Combat DDOS Attacks Research Paper


Risk Management and Analysis Process and Policy Before Technology Research Proposal


Promising Phenomenon Dissertation


Hypervisors Analysis of Virtualization Term Paper


View 30 other related papers  >>

Cite This Term Paper:

APA Format

Dependable Distributed Computing.  (2007, December 20).  Retrieved August 20, 2019, from https://www.essaytown.com/subjects/paper/dependable-distributed-computing/914819

MLA Format

"Dependable Distributed Computing."  20 December 2007.  Web.  20 August 2019. <https://www.essaytown.com/subjects/paper/dependable-distributed-computing/914819>.

Chicago Format

"Dependable Distributed Computing."  Essaytown.com.  December 20, 2007.  Accessed August 20, 2019.
https://www.essaytown.com/subjects/paper/dependable-distributed-computing/914819.