This Article 
 Bibliographic References 
 Add to: 
Mobile User Recovery in the Context of Internet Transactions
April-June 2003 (vol. 2 no. 2)
pp. 132-146
Anindya Datta, IEEE Computer Society
Kaushik Dutta, IEEE Computer Society

Abstract—With the expansion of Web sites to include business functions, a user interfaces with e-businesses through an interactive and multistep process, which is often time-consuming. For mobile users accessing the Web over digital cellular networks, the failure of the wireless link, a frequent occurrence, can result in the loss of work accomplished prior to the disruption. This work must then be repeated upon subsequent reconnection—often at significant cost in time and computation. This "disconnection-reconnection-repeat work" cycle may cause mobile clients to incur substantial monetary as well as resource (such as battery power) costs. In this paper, we propose a protocol for "recovering" a user to an appropriate recent interaction state after such a failure. The objective is to minimize the amount of work that needs to be redone upon restart after failure. Whereas classical database recovery focuses on recovering the system, i.e., all transactions, our work considers the problem of recovering a particular user interaction with the system. This recovery problem encompasses several interesting subproblems: 1) modeling user interaction in a way that is useful for recovery, 2)characterizing a user's "recovery state," 3) determining the state to which a user should be recovered, and 4) defining a recovery mechanism. We describe the user interaction with one or more Web sites using intuitive and familiar concepts from database transactions. We call this interaction an Internet Transaction (iTX), distinguish this notion from extant transaction models, and develop a model for it, as well as for a user's state on a Web site. Based on the twin foundations of our iTX and state models, we finally describe an effective protocol for recovering users to valid states in Internet interactions.

[1] R. Agrawal and D.J. DeWitt, “Integrated Concurrency Control and Recovery Mechanisms: Design and Performance Evaluation,” ACM Trans. Database Systems, vol. 10, no. 4, pp. 529-564, 1985.
[2] G. Alonso et al., "Advanced Transaction Models in Workflow Contexts," Proc. 12th Int'l Conf. Data Engineering, IEEE Computer Soc. Press, Los Alamitos, Calif., 1996, pp. 574-581.
[3] R. Barga and D. Lomet, “Measuring and Optimizing a System for Persistent Database Sessions,” Proc. Int'l Conf. Data Eng., pp. 21-30, Apr. 2001.
[4] P. Chrysanthis and K. Ramamritham, “ACTA: A Framework for Specifying and Reasoning about Transaction Structure and Behavior,” Proc. SIGMOD Int'l Conf. Management of Data, May 1990.
[5] T.H. Cormen,C.E. Leiserson, and R.L. Rivest,Introduction to Algorithms.Cambridge, Mass.: MIT Press/McGraw-Hill, 1990.
[6] Nokia Corp, Nokia Wap Server, , 2001.
[7] Microsoft Corporation, Active Server Pages Tutorial, aspasptutorial.asp, 2001.
[8] Microsoft Corporation, Internet Information Server, evaluation/featuresWeb.asp, 2001.
[9] Microsoft Corporation, Visual Interdev,, 2001.
[10] Netscape Communications Support Documentation, Persistent Client State Http Cookies, , 2001.
[11] R. Fielding, J. Gettys, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, “Hypertext Transfer Protocol—http 1.1,” Available via FTP:, 1999.
[12] H. Garcia-Molina and K. Salem, "Sagas," Proc. ACM SIGMOD Ann. Conf., pp. 249-259, May 1987.
[13] D. Georgakopoulos, M. Hornick, and A. Sheth, "An Overview of Workflow Management: From Process Modeling to Workflow Automation Infrastructure," Distributed and Parallel Databases, Vol. 3, No. 2, Apr. 1995, pp. 119-153.
[14] T. Haerder and A. Reuter,“Principles of transaction-oriented database recovery,” ACM Computing Surveys, vol. 15, no. 4, pp. 287-317, Dec. 1983.
[15] Sun Microsystems, Java Server Pages,, 2001.
[16] C. Mohan, D. Haderle, B. Lindsay, H. Pirahesh, and P. Schwarz, ARIES: A Transaction Recovery Method Supporting Fine-Granularity Locking and Partial Rollbacks Using Write-Ahead Logging ACM Trans. Database Systems, vol. 17, no. 1, pp. 94-162, Mar. 1992.
[17] N. Neves and W.K. Fuchs, “Adaptive Recovery for Mobile Environments,” Comm. ACM, vol. 40, no. 1, pp. 68-74, Jan. 1997.
[18] C. Pedregal-Martin and K. Ramamritham, “Guaranteeing Recoverability in Electronic Commerce,” Proc. Workshop Advanced Issues in Electronic Commerce and Web-Based Information Systems, 2001.
[19] A.P. Sheth and M. Rusinkiewicz, “On Transactional Workflows,” Data Eng. Bull., vol. 16, no. 2, pp. 37-40, 1993.
[20] BEA Systems, Weblogic Server, index.shtml, 2001.
[21] J.D. Tygar, “Atomicity Versus Anonymity: Distributed Transactions for Electronic Commerce,” Proc. 24th Int'l Conf. Very Large Data Bases, pp. 1-12, 1998.
[22] U. Varshney and R. Vetter, “Emerging Mobile and Wireless Networks,” Comm. ACM, vol. 43, no. 6, pp. 73-81, June 2000.
[23] G.D. Walborn and P.K. Chrysanthis, “Pro-Motion: Management of Mobile Transactions,” Proc. Symp. Applied Computing, pp. 101-108, 1997.

Index Terms:
Mobile, Internet, transaction, user recovery, interaction model, parametric dependencies, dependent component action graph, ACID properties.
Debra VanderMeer, Anindya Datta, Kaushik Dutta, Krithi Ramamritham, Shamkant B. Navathe, "Mobile User Recovery in the Context of Internet Transactions," IEEE Transactions on Mobile Computing, vol. 2, no. 2, pp. 132-146, April-June 2003, doi:10.1109/TMC.2003.1217233
Usage of this product signifies your acceptance of the Terms of Use.