Coda: A Highly Available File System for a Distributed Workstation Environment
IEEE Transactions on Computers
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor
Proceedings of the General Track: 2002 USENIX Annual Technical Conference
Ivy: a read/write peer-to-peer file system
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Verifiable audit trails for a versioning file system
Proceedings of the 2005 ACM workshop on Storage security and survivability
Pocket Hypervisors: Opportunities and Challenges
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Protectit: trusted distributed services operating on sensitive data
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
Hi-index | 0.00 |
Mobile virtualization is a nascent technology the value of which lies in enforcing data protection, providing process isolation and simplifying application reuse across device platforms. In this paper, we present VStore, a flexible mechanism for storage management and content protection that exploits virtualization to modularize data access and sharing mechanisms into containers separate from those containing guest operating systems and applications. This can provide mobile devices with rich storage options, including local, remote, or peer to peer stores, without affecting guest operating systems, middleware, or applications, and it enables diverse content create-query-share semantics. Further, VStore can provide the means to support centralized content protection and access control to all resident applications, thereby enabling new content distribution or privacy preservation policies to be enforced transparently. We discuss initial VStore implementation results and conclude by outlining new opportunities and challenges for further research.