Middleware Service for Mobile Ad Hoc Data Sharing, Enhancing Data Availability

  • Malika Boulkenafed
  • Valérie Issarny
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2672)


It is now commonplace for a person to use lightweight wireless computing devices, and to make his/her data available to other people's devices using todays various networking capabilities (infrastructurebased WLAN, ad hoc WLAN, GSM, etc.). Middleware platforms initially developed for stationary distributed systems cannot be directly applied in such a mobile environment. They must adapt their functionalities so as to best cope with possible resource constraints (energy, storage) of mobile terminals as well as with the various types of wireless networks that are now available. In this paper, we present a middleware service that allows collaborative data sharing among ad hoc groups that are dynamically formed according to the connectivity achieved by the ad hoc WLAN. Our service enhances, in particular, data availability within mobile ad hoc collaborative groups, and integrates a new adaptive data replication protocol for mobile terminals, combining both optimistic and conservative schemes. Our service has been designed so as to minimize energy consumption and optimize data availability and storage consumption.


Middleware services data availability collaborative work ad hoc networks mobile computing wireless networks 


  1. 1.
    Micah Adler and Christian Scheideler: Efficient communication strategies for adhoc wireless networks. In ACM Symposium on Parallel Algorithms and Architectures, pages 259–268, 1998.Google Scholar
  2. 2.
    G. Ateniese, M. Steiner, and G. Tsudik: New multiparty authentication services and key agreement protocols. IEEE Journal of Selected Areas in Communications, 18(4):pp. 1–13, 2000.CrossRefGoogle Scholar
  3. 3.
    C. Bettstetter and C. Renner: A comparison of service discovery protocols and implementation of the service location protocol. In Proceedings 6th EUNICE Open European Summer School: Innovative Internet Applications, 2000.Google Scholar
  4. 4.
    Malika Boulkenafed, Anis Ben Arbia, David Mentré, and Valérie Issarny: AdHocFS: Sharing files in wlans, 2002. http://www-rocq.inria.fr/solidor/work/AdHocFS.html.
  5. 5.
    Malika Boulkenafed and Valérie Issarny: Coherency management in ad-hoc group communication. In Proc. of the joint VIVIAN-ROBOCOP workshop on Software Infrastructures for Component-Based Applications on Consumer Devices, Lausanne, Switzerland, September 16, 2002.Google Scholar
  6. 6.
    M. Burmester and Y. Desmedt: A secure and efficient conference key distribution system. In LNCS Springer, editor, Proc. of Eurocrypt’94, pages pp. 275–286, 1995.Google Scholar
  7. 7.
    W. Diffie, D. Steer, L. Strawczynski, and M. Weiner: A secure audio teleconference system. In LNCS Springer, editor, Proc. of Crypto’88, 1988.Google Scholar
  8. 8.
    W. K. Edwards, E. D. Mynatt, K. Petersen, M. J. Spreitzer, D. B. Terry, and M. M. Theimer: Designing and implementing asynchronous applications with bayou. In Proc. of the Symp. on User Int. Software and Tech., Banff Alberta (Canada), Oct. 1997.Google Scholar
  9. 9.
    Todd Ekenstam, Charles Matheny, Peter L. Reiher, and Gerald J. Popek: The bengal database replication system. Journal of Distributed and Parallel Databases, 9(3):187–210, 2001. http://www.citeseer.nj.nec.com/449358.html.MATHCrossRefGoogle Scholar
  10. 10.
    L. Feeney and M. Nilsson: Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In proc. of the IEEE Infocom, 5(8), 2001. http://www.sics.se/ feeney.
  11. 11.
    J. D. Gibson: The Mobile Communication Handbook. CRC Press, 2nd edition, 1999.Google Scholar
  12. 12.
    Richard G. Guy, Peter L. Reiher, David Ratner, Michial Gunter, Wilkie Ma, and Gerald J. Popek: Rumor: Mobile data access through optimistic peer-to-peer replication. In ER Workshops, pages 254–265, 1998. http://www.citeseer.nj.nec.com/guy98rumor.html.
  13. 13.
    T. Imielinski: Mobile Computing. Kluwer Academic Publishers, 1996.Google Scholar
  14. 14.
    M. Just and S. Vaudenay: Authenticated multy-party key agreement. In Proc. of ASIACRYPT’96, 1996.Google Scholar
  15. 15.
    John Kubiatowicz, David Bindel, Yan Chen, Patrick Eaton, Dennis Geels, Ramakrishna Gummadi, Sean Rhea, Hakim Weatherspoon, Westly Weimer, Christopher Wells, and Ben Zhao: Oceanstore: An architecture for global-scale persistent storage. In Proceedings of ACM ASPLOS. ACM, November 2000. http://www.citeseer.nj.nec.com/kubiatowicz00oceanstore.html.
  16. 16.
    Geofrey H. Kuenning: Seer: Predictive File Hoarding for Disconnected Mobile Operation. PhD thesis, University of California, Los Angeles, May 1997.Google Scholar
  17. 17.
    P. Kumar and M. Satyanarayanan: Supporting application-specific resolution in an optimistically replicated file system. In Proceedings of the 4th Workshop on Workstation Operating Systems, 1993.Google Scholar
  18. 18.
    Haiyun Luo, Paul Medvedev, Jerry Cheng, and Songwu Lu: A self-coordinating approach to distributed fair queueing in ad hoc wireless networks. In INFOCOM, pages 1370–1379, 2001. http://www.citeseer.nj.nec.com/luo01selfcoordinating.html.
  19. 19.
    Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker: Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255–265, 2000. http://www.citeseer.nj.nec.com/marti00mitigating.html.
  20. 20.
    Cecilia Mascolo, L. Zanolin, and Wolfgang Emmerich: Xmiddle: an xml based approach for incremental code mobility and update. Journal of Automated Software Engineering, 9(2), 2002.Google Scholar
  21. 21.
    Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone: Handbook of Applied Cryptography. CRC Press, 4th edition edition, 1996. http://www.cacr.math.uwaterloo.ca/hac/.
  22. 22.
    Davide Mentre, Malika Boulkenafed, and Valérie Issarny: AdHocFS: A serverless file system for mobile users. Research Report 4303, INRIA-Rocquencourt, 2001.Google Scholar
  23. 23.
    K. Petersen, M. J. Spreitzer, D. B. Terry, M. M. Theimer, and A. J. Demers: Flexible update propagation for weakly consistent replication. In Proc. Symp. on Operating Systems Principles (SOSP-16), pages 288–301, Saint Malo, Oct. 1997.Google Scholar
  24. 24.
    Amir Qayyum: “Analysis and evaluation of channel access schemes and routing protocols for wireless networks”. PhD thesis, University of Paris Sud, Orsay, France, November 2000.Google Scholar
  25. 25.
    P. Reiher, J. Popek, M. Gunter, J. Salomone, and D. Ratner: Peer-to-peer reconciliation based replication for mobile computers. In European Conference on Object Oriented Programming’ 96 Second Workshop on Mobility and Replication, 1996. http://www.citeseer.nj.nec.com/5097.html.
  26. 26.
    M. Satyanarayanan, James J. Kistler, Puneet Kumar, Maria E. Okasaki, Ellen H. Siegel, and David C. Steere: Coda: A highly available file system for a distributed workstation environment. Journal of IEEE Transactions on Computers, 39(4):447–459, 1990. http://www.citeseer.nj.nec.com/satyanarayanan90coda.html.CrossRefGoogle Scholar
  27. 27.
    H. Yu and A. Vahdat: Design and evaluation of a continuous consistency model for replicated services. In Proc. of the 4rd Symposium on Operating Systems Design and Implementation, 2000. http://www.citeseer.nj.nec.com/yu00design.html.

Copyright information

© IFIP International Federation for Information Processing 2003

Authors and Affiliations

  • Malika Boulkenafed
    • 1
  • Valérie Issarny
    • 1
  1. 1.Inria-RocquencourtDomaine de Voluceau, RocquencourtLe Chesnay CédexFrance

Personalised recommendations