Mobile Agents In A Distributed Network With Trusted Node Implementation For Data Protection

Authors

  • Kathirvelkumaran L Dept. of Computer Science, Rathinam College of Arts and Science, Coimbatore, Tamil Nadu, INDIA
  • Muralidharan R Dept. of Computer Science, Rathinam College of Arts and Science, Coimbatore, Tamil Nadu, INDIA

DOI:

https://doi.org/10.26438/ijcse/v7i1.157163

Keywords:

Mobile Agent, Trusted Server or Node, DSA, Public Key, Host Node

Abstract

Mobile Agents (MA) represents a comparatively new computing pattern which is used in numerous verticals as a means for anatomy disseminated applications. These Mobile Agents are programs which work in such a way that it will work independently by moving from one node to another in order to perform the assigned tasks on behalf of its owner in a distributed network. During which the mobile agents will communicate with the other agents or the hosts in the network and preserves the data when routing between one node and another. But it is difficult for the agents to transfer the preserved data to the home node due to lack of reliability. Thus in this Paper, it is discussed about how the mobile agents can preserve the collected data through a Trusted server or node by allocating a protected space in the trusted node and what are the measures are used for securing the data.

References

[1] Karnik, N. “Protection in mobile agent systems” Technical report University of Minnesota, pp.1-12, 2000

[2] PAhich P.. K. Dutta, and M.C. Govil,“Security Issues in Mobile Agents”, International Journal of Computer Applications, Vol. 11, pp 1-7, December 2010.

[3] D.M. Chess, “ Security issues in mobile code systems".mobile agents and security, Vol 3. LNCS1419. Springer-Verlag 1998.

[4] S.M.S.I. Rizvi, Z. Sultana, B. Sun, and Md. W. Islam,“Security of Mobile Agent in Ad hoc Network using Threshold Cryptography”, World Academy of Science,Engineering and Technology PP.70-75 2010.

[5] S. M.. Moussa, G.A. Agha, “Integrating Encrypted Mobile Agents with Smart Spaces in a Multi-agent Simulator for Resource Management”, Journal of Software, Vol. 5, Jun 2010.

[6] Amro, Belal, Mobile Agent Systems, Recent Security Threats and Counter Measures. International Journal of Computer Science Issues (IJCSI). 11. 146-151,2014

[7] L.Kathirvelkumaran, R.Muralidharan “A Standard Framework And Migration Process of Mobile Agents Using Preprocessing Techniques”, International Research Journal of Computer Science (IRJCS), Vol. 4 , Issue No 06, pp.40-43, June 2017

[8] L.Kathirvelkumaran, R.Muralidharan A Framework for Network Monitoring Performance Management of Mobile Agents Using Pre-Processing Techniques In Distributed Environment International Journal of Pure and Applied Mathematics Vol.119 No. 12, , ISSN: 1314-3395,pp. 13641-13650, 2018

[9] Rajdeep Bhanot and Rahul Hans A Secure and Fault Tolerant Platform for Mobile Agent Systems International Journal of Security and Its Applications Vol. 9, No. 5,ISSN: 1738-9984 IJSIA ,2015

[10] A.K. Sharma, Atul Mishra, Vijay Singh An Intelligent Mobile-Agent Based Scalable Network Management Architecture for Large-Scale Enterprise System International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.1, January 2012

Downloads

Published

2019-01-31
CITATION
DOI: 10.26438/ijcse/v7i1.157163
Published: 2019-01-31

How to Cite

[1]
L. Kathirvelkumaran and R. Muralidharan, “Mobile Agents In A Distributed Network With Trusted Node Implementation For Data Protection”, Int. J. Comp. Sci. Eng., vol. 7, no. 1, pp. 157–163, Jan. 2019.

Issue

Section

Research Article