Shielding security sensitive parts of mobile agent

被引:2
作者
Preeti [1 ]
Chaturvedi P. [1 ]
Hans R. [2 ]
机构
[1] Department of Computer Science, Gurukul Kangri Vishwavidyalaya, Haridwar
[2] Department of Information Technology, D.A.V. University, Jalandhar
来源
Preeti (preetishivach2009@gmail.com) | 1600年 / Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 13期
关键词
Aglets; Blowfish; Cryptography; Distributed computing; Dual layer; Fragmentation; Integrity; Mobile agent; Obfuscation; Security;
D O I
10.1504/IJCIS.2017.083640
中图分类号
学科分类号
摘要
Distributed computing is an emerging area of today's internet era. Mobile agent is one of the paradigms used in applications of distributed computing. When a mobile agent arrives on a particular host, the host provides the environment to the mobile agent for execution, during this period the mobile agent is under full control of the host. Executing host can harm the agent in many ways such as it can alter the code of the agent, it can tamper the data collected by the agent up to this point and also it can change the itinerary of the agent etc. This paper focuses on the area of securing the code and data collected by the agent. Code security proposal is an integration of obfuscation and encryption/decryption technique, whereas for providing secure data, dual layer of encryption/decryption is applied. © Copyright 2017 Inderscience Enterprises Ltd.
引用
收藏
页码:289 / 302
页数:13
相关论文
共 22 条
[1]  
Ahmed T.M., Using secure-image mechanism to protect mobile agent against malicious hosts, World Academy of Science, Engineering and Technology, 59, pp. 439-444, (2009)
[2]  
Armoogum S., Caully A., Obfuscation techniques for mobile agent code confidentiality, Journal of Information & Systems Management, 1, 1, pp. 25-36, (2011)
[3]  
Benachenhou L., Pierre S., Protection of a mobile agent with a reference clone, Computer Communication, 29, 2, pp. 268-278, (2006)
[4]  
Bierman E., Cloete E., Classification of malicious host threats in mobile agent computing, Proceeding of SAICSIT, pp. 141-148, (2002)
[5]  
Borselius N., Mobile agent security, Electronics & Communication Engineering Journal, pp. 211-218, (2002)
[6]  
Bouchemal N., Ramdane M., Zaidi S., CAP: Clone agent protocol to protect mobile agents, MASAUM Journal of Basic and Applied Sciences, 1, 1, (2009)
[7]  
Chess D., Grosof B., Harrison C., Levine D., Parris C., Itinerant agents for mobile computing, IEEE Personal Communications, 2, 5, pp. 34-49, (1995)
[8]  
Dhanalakshmi K., Kadhar Nawaz G.M., Matrix hop mobile agent (MHMA) system for e-service applications, International Conference on Communication Technology and System Design, (2011)
[9]  
Esparza O., Fernandez M., Soriano M., Munoz J.L., Forne J., Mobile agent watermarking and fingerprinting: Tracing malicious hosts, Dexa, 2736, (2003)
[10]  
Giovanni V., Protecting mobile agents through tracing, Proceedings of the Third ECOOP Workshop on Operating System Support for Mobile Object Systems, pp. 137-153, (1997)