Security in process migration systems


  • Javier Echaiz Laboratorio de Investigación en Sistemas Distribuidos (LISiDi), Departamento de Ciencias e Ingeniería de la Computación, Universidad Nacional del Sur, Bahía Blanca, Argentina
  • Jorge Raúl Ardenghi Laboratorio de Investigación en Sistemas Distribuidos (LISiDi), Departamento de Ciencias e Ingeniería de la Computación, Universidad Nacional del Sur, Bahía Blanca, Argentina


computer security, clustering, grid computing, load sharing, process migration, distributed systems


A loosely coupled distributed system is composed by nodes, usually heterogenous, connected by a network. These systems have enormous aggregate computing potential. However most of this potential is not realized unless the underlying software is able to implement the concept of single system image (SSI) on the physically distributed system. This way the resources belonging to a node could be accessed transparently from any other node. This paper discusses the issues of a process migration protocol as an essential component of a distributed system and its extension to the grid computing paradigm. The security issues are specially considered.


Download data is not yet available.


[1] S. J. Mullender, C. van Rossum, A. S. Tanenbaum, R. van Renesse, and H. van Stavern, Amoeba: a distributed operating system for the 1990s., IEEE Computer, May 1990.
[2] F. Douglis and J. Ousterhout, “Transparent Process Migration: Design Alternatives and the Sprite Implementation,” Software Practice & Experience, 1991.
[3] Amnon Barak and Oren La’adan, “The MOSIX multicomputer operating system for high performance cluster computing,” Future Generation Computer Systems, vol. 13, no. 4–5, pp. 361–372, 1998.
[4] D. Thain, T. Tannenbaum, and M. Livny, “Distributed computing in practice: The condor experience,” 2004.
[5] Javier Echaiz and Jorge Ardenghi, “Single System Image: Pilar de los Sistemas de Clustering,” V Workshop de Investigadores en Ciencias de la Computación, WICC 2003 ´ , pp. 210–214, May 2003.
[6] Inc. Sun Microsystems, “RFC 1094: NFS: Network File System Protocol specification,” Mar. 1989.
[7] James H. Morris, Mahadev Satyanarayanan, Conner Conner, John H. Howard, David S. Rosenthal, and F. Donelson Smith, “Andrew: A distributed personal computing environment,” Communications of the ACM, vol. 29, no. 3, pp. 184–201, Mar. 1986.
[8] Peter Smith and Norman C. Hutchinson, “Heterogeneous Process Migration: The Tui System,” Tech. Rep. TR-96-04, Department of Computer Science, University of British Columbia, Feb. 1996.
[9] Derek L. Eager, Edward D. Lazowska, and John Zahorjan, “The Limited Performance Benefits of Migrating Active Processes for Load Sharing,” Conf. on Measurement & Modelling of Comp. Syst., ACM SIGMETRICS, pp. 63–72, May 1988.
[10] John K. Ousterhout, “Scheduling Techniques for Concurrent Systems,” in Third International Conference on Distributed Computing Systems, May 1982, pp. 22–30.
[11] Ken Shirriff, “Building Distributed Process Management on an Object-Oriented Framework,” in Proceedings of the USENIX Annual Technical Conference (USENIX-97), Berkeley, Jan. 1997, pp. 119–132, Usenix Association.
[12] Javier Echaiz, “Migración de Procesos en Sistemas Heterogéneos,” Magister en Ciencias de la Computación, Universidad Nacional del Sur, Apr 2005.
[13] B. Clifford Neuman, J. G. Steiner, and J. I. Schiller, “Kerberos: An authentication service for open network systems,” in Winter 1988 USENIX Conference, Dallas, TX, 1988, USENIX Association, pp. 191–201.
[14] J. Kohl and C. Neuman, “RFC 1510: The Kerberos Network Authentication Service (V5),” Sept. 1993.
[15] Frans Kaashoek, “Self-certifying File System,” Dec. 2000.
[16] Declan Patrick O’shanahan, “CryptosFS: Fast cryptographic secure NFS,” Nov. 2000.
[17] Burton S. Kaliski Jr., “IEEE P1363: A Standard for RSA, Diffie-Hellman, and Elliptic-Curve Cryptography (Abstract),” in Security Protocols Workshop, 1996, pp. 117–118.
[18] T. Mark A. Lomas, Ed., Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings, vol. 1189 of Lecture Notes in Computer Science. Springer, 1997.
[19] J. Lee, “A survey on IPSec Key Management Protocols,” 1997.
[20] Dejan S. Milojiciˇ c, Fred Douglis, Yves Pain-daveine, Richard Wheeler, and Songnian Zhou, “Process migration,” ACM Computing Surveys, vol. 32, no. 3, pp. 241–299, 2000.
[21] Javier Echaiz and Jorge Ardenghi, “Carga Compartida en Sistemas Distribuidos Heterogeneos,” ´ V Workshop de Investigadores en Ciencias de la Computacion, WICC 2004 ´ , pp. 549–553, May 2004.
[22] Geoffrey Fox and Dennis Gannon, “Grid computing: Computational grids,” Computing in Science and Engineering, vol. 3, no. 4, pp. 74–86, July/Aug. 2001.
[23] Ewa Deelman and Carl Kesselman, “Grid computing,” Scientific Programming, vol. 10, no. 2, pp. 101–102, 2002.
[24] And Domenico Laforenza, Mark Baker, and Rajkumar Buyya, “Grids and grid technologies for wide-area distributed computing,” July 2002.
[25] Mary Thompson, “Security implications of typical grid computing scenarios,” Dec. 2000.




How to Cite

Echaiz, J., & Ardenghi, J. R. (2005). Security in process migration systems. Journal of Computer Science and Technology, 5(04), p. 305–311. Retrieved from



Original Articles