Implementing data integrity and confidentiality in mobile phone based cyber foraging system
Abstract
Following the emergence of cyber foraging systems small resource constrained mobile phone
devices are able to offload some of their resource intensive work to computationally powerful
surrogate computers accessible on LAN. However, mobile phone based cyber foraging system
also threatens control over data ownership, distribution and management. Users cannot be
guaranteed that surrogate computers do not share data with unauthorized entities. Likewise,
storing data on a mobile device causes user to lose control over that data when the device is
stolen or lost; hence cannot prevent data from being compromised. This project examines the
challenge of data integrity and confidentiality arising from using mobile phone based cyber
foraging systems. We implemented and integrated data integrity and confidentiality enforcing
mechanism based on Remote Access Control and Auditing (RACA) framework into an open
source mobile phone based cyber foraging system prototype using use case approach.
Experimental approach method is applied to measure and evaluate execution time overhead
cost attributed to RACA integration. Result obtained indicated that RACA not only enhances
data integrity and confidentiality but also imposes an insignificantly compromise on task
offloading execution time. However, for enhanced confidentiality and availability we
recommend the use of SSL protocol for data transmission and deployment of surrogate
computers through defensive responses to Denial of Service (DoS) attacks respectively
Citation
Masters of Science in Computer Science.Publisher
University of Nairobi