DOI QR코드

DOI QR Code

A Load Balancing and Security Scheme of Mobile Agents based on the mobile Trust Model

신뢰모델을 기반으로 한 이동 에이전트의 로드밸런싱과 에이전트 보호 기법

  • Jung, Chang-Ryul (Department of Computer Engineering, Sunchon National University) ;
  • Lee, Sung-Keun (Department of Multimedia Engineering, Sunchon National University)
  • Received : 2013.08.10
  • Accepted : 2013.10.14
  • Published : 2013.10.31

Abstract

Mobile Agent is an autonomous mobility technology is being applied in various fields. In particular, mobile agents execution in the Internet environment through the safe execution of the security must be guaranteed. Also, agent to run the agent, the agent's workload should be distributed. In this paper, a trust model based on the security mechanism of the agent execution is proposed. Proposed mechanism to ensure safe execution of the agent was not considered in existing relative researches for rational agent workload distribution and load balancing to improve throughput was. The proposed trust-based security mechanisms for agents to go through security analysis proved safe execution of the agent.

이동 에이전트는 이동성이 있어 다양한 분야에서 응용되는 기술이다. 특히 오픈네트워크에서의 이동 에이전트 실행은 보안을 통한 안전한 실행이 보장되어야 한다. 또한 에이전트는 에이전트 실행을 위해 에이전트의 작업량 분배가 이루어져야 한다. 이를 위해 본 논문에서는 신뢰모델 기반의 에이전트 실행 보안 메커니즘을 제안하였다. 제안된 메커니즘은 에이전트의 안전한 실행 보장과 기존 연구에서 고려되지 않았던 합리적인 에이전트 작업량 분배를 위한 로드 밸런싱으로 처리율을 향상되도록 하였다. 제안된 신뢰기반 에이전트 보안 메커니즘에 대한 보안 분석을 통해 이동 에이전트의 안전한 실행을 증명하였다.

Keywords

References

  1. M. V. Prem, S. Swamynathan, "Securing Mobile Agent and its Platform from Passive Attack of Malicious Mobile Agents," Proc. International Conference on Advances in Engineering, Science and Management(ICAESM-2012), pp.605-609, 2012.
  2. Zhidong Shen, Xiaoping Wu, "A Trusted Computing Technology Enabled Mobile Agent System," Proc. International Conference on Computer Science and Software Engineering, pp.567-570, 2008.
  3. F. T. Ibharalu, A. B. Sofoluwe, A. T. Akinwale, "A reliable protection architecture for mobile agents in open network system," International Journal of Computer Applications, Vol.17, Issue 7, pp.6-14, 2011.
  4. P. Dadhich, K. Dutta and M. C. Govil, "On the Approach of Combining Trust and Security for Securing Mobile Agents: Trust Enhanced Security," Proc. IEEE 2011 2nd International Conference on Computer and Communication Technology (ICCCT), pp. 379-384, 2011.
  5. H. K. Tan, L. Moreau, "Trust relationships in a mobile agent system," proc. 5th IEEE International Conference on mobile Agents, Vol. LNCS2240, Atlanta, Georgia, December, 2001.
  6. U. K. Tupakula, V. Varadharajan, "Detecting Security Attacks in Trusted Virtual Domains," proc. 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), pp.529-535, 2010.
  7. B. Li, M. Xing, J. Zhu, and T. Che, "A Dynamic Trust Model for the Multi-Agent Systems," Proc. IEEE Int'l Symp. Information Processing (ISIP '08), pp. 500-504, 2008.
  8. L. Wen, P. Lingdi, L. Kuijin, and C. Xiaoping, "Trust Model of Users' Behavior in Trustworthy Internet," Proc. IEEE WASE Int'l Conf. Information Eng. (ICIE '09), pp. 403-406, 2009.
  9. Z. Fuguo, "A Survey of Shilling Attacks in Collaborative Filtering Recommender Systems," Proc. International Conference on Computational Intelligence and Software Engineering (CiSE 2009), pp.1-4, 2009.