CFP last date
20 May 2024
Reseach Article

Security Agents: A Mobile Agent based Trust Model for Cloud Computing

by Priyank Singh Hada, Ranjita Singh, Mukul Manmohan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 36 - Number 12
Year of Publication: 2011
Authors: Priyank Singh Hada, Ranjita Singh, Mukul Manmohan
10.5120/4547-6435

Priyank Singh Hada, Ranjita Singh, Mukul Manmohan . Security Agents: A Mobile Agent based Trust Model for Cloud Computing. International Journal of Computer Applications. 36, 12 ( December 2011), 12-15. DOI=10.5120/4547-6435

@article{ 10.5120/4547-6435,
author = { Priyank Singh Hada, Ranjita Singh, Mukul Manmohan },
title = { Security Agents: A Mobile Agent based Trust Model for Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { December 2011 },
volume = { 36 },
number = { 12 },
month = { December },
year = { 2011 },
issn = { 0975-8887 },
pages = { 12-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume36/number12/4547-6435/ },
doi = { 10.5120/4547-6435 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:23:07.682782+05:30
%A Priyank Singh Hada
%A Ranjita Singh
%A Mukul Manmohan
%T Security Agents: A Mobile Agent based Trust Model for Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 36
%N 12
%P 12-15
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In cloud computing infrastructure, usually cloud user has to rely on cloud service provider for transfer of data into it. It is still a matter of great concern for a cloud user to trust security and reliability of cloud services. There is major need of bringing reliability, transparency and security in cloud model for client satisfaction. The cloud user data resides on virtual machines which are located on a shared environment which makes it vulnerable to many attacks. In this paper we propose a trust model for cloud architecture which uses mobile agent as security agents to acquire useful information from the virtual machine which the user and service provider can utilize to keep track of privacy of their data and virtual machines. These agents monitor virtual machine integrity and authenticity. Security agents can dynamically move in the network, replicate itself according to requirement and perform the assigned tasks like accounting and monitoring of virtual machines.

References
  1. Shuai Zhang, Shufen Zhang, Xuebin Chen, Xiuzhen Huo, "Cloud Computing Research and Development Trend". Future Networks, 2010. ICFN '10. Second International Conference. Jan. 2010.
  2. VMWare Staff, “Virtualization overview”. White Paper: http://www.vmware.com/pdf/virtualization.pdf.
  3. Xen Architecture Overview, 13 February, 2008: http://wiki.xen.org/xenwiki/XenArchitecture.
  4. Buchanan, W.J., Naylor, M., Scott, A.V., "Enhancing network management using mobile agents," Engineering of Computer Based Systems, 2000. (ECBS 2000) Proceedings. Seventh IEEE International Conference and Workshop, 2000.
  5. Microsoft Co., “Azure services platform”: http://www.microsoft.com/azure/default.mspx.
  6. Google Inc., “Google application engine”: http://code.google.com/intl/it-IT/appengine.
  7. Ashish Kumar Srivastava, Aditya Goel, “Security Solution for WSN Using Mobile Agent Technology”, International Journal of Research and Reviews in Wireless Sensor Networks (IJRRWSN) Vol. 1, No. 3, September 2011.
  8. Aversa, R., Di Martino, B., Rak, M., Venticinque, S., "Cloud Agency: A Mobile Agent Based Cloud System", Complex, Intelligent and Software Intensive Systems (CISIS), 2010 International Conference, pp.132-137, 15-18 Feb. 2010.
  9. Neisse, R., Holling, D., Pretschner, A., "Implementing Trust in Cloud Infrastructures", Cluster, Cloud and Grid Computing (CCGrid), 2011 11th IEEE/ACM International Symposium, pp.524-533, 23-26 May 2011.
  10. Popovic, Kresimir, Hocenski, Zeljko, "Cloud computing security issues and challenges", MIPRO, 2010 Proceedings of the 33rd International Convention, pp.344-349, 24-28 May 2010.
  11. Grobauer, B., Walloschek, T., Stocker, E., "Understanding Cloud Computing Vulnerabilities", Security & Privacy, IEEE, vol.9, no.2, pp.50-57, March-April 2011.
  12. Anthony Bisong and Syed (Shawon) M. Rahman, “An Overview of the Security Concerns in Enterprise Cloud Compuitng”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011.
  13. Amit Sangroya, Saurabh Kumar, Jaideep Dhok, Vasudeva Varma, “Towards Analyzing Data Security Risks in Cloud Computing Environments”. International Conference on Information Systems, Technology, and Management (ICISTM 2010).
  14. Richard Chow, Philippe Golle, Markus Jakobsson, Ryusuke Masuoka, Jesus Molina Elaine Shi and Jessica Staddon, “Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control”, CCSW’09, November 13, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Cloud Security Mobile Agent Virtual Machine Trust Management Integrity of data in Cloud