Mobile Agents Based on Virtual Machines to Protect Sensitive Information

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 470)


Virtual machine technology is the principal reason for efficient provisioning of IT resources and infrastructure services. The mobile agent concept, similar to VM migration, allows software agents to change their computing platform. It appears likely to combine both, where a VM itself becomes a mobile agent. Currently VM migration is broadly used within data centers or classical cloud eco system. This work addresses its extension to external devices in local environments of end users as migration target. Technology attributes like strong isolation, platform independence and the ongoing effort to enable hybrid migration between heterogeneous computing architectures are delivering a promising and sophisticated basis. Here we give first insights into this approach, realizing a layer of abstraction which makes use of VM migration to separate sensitive information by migration and making use of advantages like isolation and location-aware functionality. Eventually we believe such cloud architectures will result into an overall higher level of security and trust!


Virtual Machine Mobile Agent Trust Platform Module Live Migration Client Device 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



This work has received funding from the European Communitys Seventh Framework Programme (FP7/2007–2013) under grant agreement TRESCCA no 318036.


  1. 1.
    Balan, R.K., Satyanarayanan, M., Park, S.Y., Okoshi, T.: Tactics-based remote execution for mobile computing. In: Proceedings of the 1st International Conference on Mobile Systems, Applications and Services, MobiSys ’03, pp. 273–286. ACM, New York (2003)Google Scholar
  2. 2.
    Bouchenak, S., Hagimont, D., De Palma, N.: Efficient java thread serialization. In: Proceedings of the 2nd International Conference on Principles and Practice of Programming in Java, PPPJ ’03, pp. 35–39. Computer Science Press Inc., New York (2003)Google Scholar
  3. 3.
    Caceres, R., Carter, C., Narayanaswami, C., Raghunath, M.: Reincarnating pcs with portable soulpads. In: Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, MobiSys ’05, pp. 65–78. ACM, New York (2005)Google Scholar
  4. 4.
    Chun, B.-G., Ihm, S., Maniatis, P., Naik, M., Patti, A.: Clonecloud: elastic execution between mobile device and cloud. In: Proceedings of the Sixth Conference on Computer Systems, EuroSys ’11, pp. 301–314. ACM, New York (2011)Google Scholar
  5. 5.
    Coppola, M., Grammatikakis, M., Kornaros, G., Spyridakis, A.: Trusted computing on heterogeneous embedded systems-on-chip with virtualization and memory protection. In: The Fourth International Conference on Cloud Computing, GRIDs, and Virtualization, CLOUD COMPUTING 2013, pp. 225–229 (2013)Google Scholar
  6. 6.
    Cuervo, E., Balasubramanian, A., Cho, D.-K., Wolman, A., Saroiu, S., Chandra, R., Bahl, P.: Maui: making smartphones last longer with code offload. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services, MobiSys ’10, pp. 49–62. ACM, New York (2010)Google Scholar
  7. 7.
    Flinn, J., Park, S., Satyanarayanan, M.: Balancing performance, energy, and quality in pervasive computing. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, ICDCS ’02, pp. 217–226. IEEE Computer Society, Washington, DC (2002)Google Scholar
  8. 8.
    Gentry, C., Halevi, S.: Implementing gentry’s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129–148. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  9. 9.
    Hoyer, M., Schröder, K., Schlitt, D., Nebel, W.: Proactive dynamic resource management in virtualized data centers. In: Proceedings of the 2nd International Conference on Energy-Efficient Computing and Networking, e-Energy ’11, pp. 11–20. ACM, New York (2011)Google Scholar
  10. 10.
    Kozuch, M., Satyanarayanan, M.: Internet suspend/resume. In: Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications, pp. 40–46. IEEE (2002)Google Scholar
  11. 11.
    Osman, S., Subhraveti, D., Su, G., Nieh, J.: The design and implementation of zap: a system for migrating computing environments. SIGOPS Oper. Syst. Rev. 36(SI), 361–376 (2002)CrossRefGoogle Scholar
  12. 12.
    Quitadamo, R., Cabri, G., Leonardi, L.: Mobile jikesrvm: a framework to support transparent java thread migration. Sci. Comput. Program. 70(23), 221–240 (2008). Special Issue on Principles and Practices of Programming in Java (PPPJ 2006)CrossRefzbMATHMathSciNetGoogle Scholar
  13. 13.
    Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14–23 (2009)CrossRefGoogle Scholar
  14. 14.
    Su, L., Courcambeck, S., Guillemin, P., Schwarz, C., Pacalet, R.: Secbus: operating system controlled hierarchical page-based memory bus protection. In: Proceedings of the Conference on Design, Automation and Test in Europe, DATE ’09, pp. 570–573. European Design and Automation Association, Leuven (2009)Google Scholar
  15. 15.
    Suezawa, T.: Persistent execution state of a java virtual machine. In: Proceedings of the ACM 2000 Conference on Java Grande, JAVA ’00, pp. 160–167. ACM, New York (2000)Google Scholar
  16. 16.
    Thuemmler, C., Mueller, J., Covaci, S., Magedanz, T., de Panfilis, S., Jell, T., Gavras, A.: Applying the software-to-data paradigm in next generation e-health hybrid clouds. In: 2013 Tenth International Conference on Information Technology: New Generations (ITNG), pp. 459–463 (2013)Google Scholar
  17. 17.
    Vigna, G.: Mobile agents: ten reasons for failure. In: Proceedings of the 2004 IEEE International Conference on Mobile Data Management, pp. 298–299. IEEE (2004)Google Scholar
  18. 18.
    Wang, J.: Survey of state-of-the-art in inter-vm communication mechanisms (2009)Google Scholar
  19. 19.
    Young, C., Lakshman, Y.N., Szymanski, T., Reppy, J., Presotto, D., Pike, R., Narlikar, G., Mullender, S., Grosse, E.: Protium, an infrastructure for partitioned applications. In: Proceedings of the Eighth Workshop on Hot Topics in Operating Systems, pp. 47–52 (2001)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  1. 1.R&D Division EnergyOFFISOldenburgGermany
  2. 2.Department for Computer ScienceC.v.O. University of OldenburgOldenburgGermany

Personalised recommendations