The server encrypts each file before staging it on the surrogate. To handle a cache miss at the remote site, the client fetches the data from the surrogate, decrypts it, verifies its fingerprint and then uses the data. The volume of cached keys can be reduced by using a single private encryption key for all files, at the price of total exposure if that key is broken. (p.2)."
The author concludes the article with mention of the Aura Project at Carnegie Mellon, an initiative which is aimed at defined distraction-free, ubiquitous computing and support for nomadic access using the Coda File System, which has recently been updated to support efficient update propagation over low-bandwidth networks [3]. Aura is a commonly referenced concept in much of the cyber foraging literature, and supports the concept of increasingly complex content taxonomies being synchronized with applications and data sources through the use of data staging servers.
Rajesh Balan, Jason Flinn, M. Satyanarayanan, Shafeeq Sinnamohideen and Hen-I Yang. The Case for Cyber Foraging. School of Computer Science. Carnegie Mellon University Publication. Carnegie Mellon University and Intel Research Pittsburgh definitive statement of the topic, the authors are experts in cyber foraging from Carnegie Mellon and the Intel Research Center in Pittsburgh, PA and include in this paper an analysis...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now