An efficient recovery scheme for mobile computing environments

被引:13
|
作者
Park, T [1 ]
Woo, N [1 ]
Yeom, HY [1 ]
机构
[1] Sejong Univ, Dept Comp Engn, Seoul 143747, South Korea
关键词
distributed systems; fault-tolerance; mobile computing; message logging; asynchronous recovery;
D O I
10.1109/ICPADS.2001.934801
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an efficient recovery scheme based on checkpointing and message logging for mobile computing systems. For the efficient management of checkpoints and message logs, a movement-based scheme is proposed. Mobile hosts carrying their recovery information to the nearby mobile support station can recover instantly in case of a failure, however, the cost to transfer the recovery information must be high. On the other hand, the recovery information remaining dispersed over a number of support stations visited by mobile hosts must incur very high recovery cost. To balance the failure;free operation cost and the recovery cost, in the proposed scheme, the recovery information of a mobile host remains at the visited support stations while the host moves within a certain range. Only when the host moves out of the range, the recovery information is transferred to a nearby mobile support station. As a result, the proposed scheme can control the information transfer cost as well as the recovery cost.
引用
收藏
页码:53 / 60
页数:8
相关论文
共 50 条
  • [31] An efficient traceable data sharing scheme in cloud computing for mobile devices
    Wang Z.
    Ye J.
    Wang J.
    Wang, Zhiying (392535641@qq.com), 2018, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (12) : 156 - 165
  • [32] An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing
    Li, Jing
    Guan, Zhitao
    Du, Xiaojiang
    Zhang, Zijian
    Wu, Jun
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [33] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Xiuqing Lu
    Zhenkuan Pan
    Hequn Xian
    Journal of Cloud Computing, 9
  • [34] An Efficient Conjunctive Keyword Searchable Encryption Scheme for Mobile Cloud Computing
    Lin, Tao
    Sun, Zexian
    Sun, Hexu
    Cao, Bin
    INTELLIGENT COMPUTING THEORIES AND APPLICATION, ICIC 2016, PT II, 2016, 9772 : 659 - 669
  • [35] Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing
    Alhassan, Maryam
    Khan, Abdul Raouf
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 2727 - 2740
  • [36] An efficient and secure data sharing scheme for mobile devices in cloud computing
    Lu, Xiuqing
    Pan, Zhenkuan
    Xian, Hequn
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [37] Distributed computing in mobile environments
    Badrinath, B.R.
    Computers and Graphics (Pergamon), 1996, 20 (05): : 615 - 617
  • [38] Security in mobile computing environments
    Veijalainen, J
    Visa, A
    MOBILE NETWORKS & APPLICATIONS, 2003, 8 (02): : 111 - 112
  • [39] Distributed computing in mobile environments
    Badrinath, BR
    COMPUTERS & GRAPHICS, 1996, 20 (05) : 615 - 617
  • [40] Cloud computing for mobile environments
    Jeong, Hwa-Young
    Rana, Omer F.
    Hsu, Ching-Hsien
    Jeong, Young-Sik
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (10): : 2753 - 2755