Homomorphic Encryption Scheme & Its Application for Mobile Agent Security
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 11
Abstract
Mobile agents (MA) are autonomous software entities that are able to migrate across heterogeneous network execution environments. Protection of Mobile agents is one of the most difficult problems in the area of mobile agent’s security. A security issues with mobile agents have not been solved and are becoming obstacles for the application of mobile agents. Four threat categories are identified for mobile agent: threats stemming from an agent attacking an agent platform, an agent platform attacking an agent, an agent attacking another agent on the agent platform, and other entities attacking the agent system Homomorphic encryption are a technique in which the encrypted mobile codes can be executed directly on different platforms without decryption. In this paper section introduce the basic part of cryptosystem. In next section explain theory related Homomorphic Encryption. Section III contain the application view of Homomorphic Encryption used for mobile agent security and last conclude the paper.
Authors and Affiliations
Sachin Upadhye , P. G. Khot
RIP (Resin Impregnated Paper) Bushing for EHV Class Power Transformer
The overall reliability of a power transformer depends to a great extent on the sound operation of bushing. The OIP (Oil Impregnated Paper) Bushing is conventionally used in power transformer. Now a days a new technology...
A Review: Comparative Analysis Of Routing Protocols In Wireless Sensor Network
Wireless Sensor networks are recently rapidly growing research area in wireless communications and distributed network. Wireless Sensor Network consists of a large number of low-cost, low-power, and multifunctional...
Cloud Computing: A Responsibility data sharing in the cloud computing
Cloud computing provides highly efficient services to be easily accessed or used over the Internet on as needed basis. An important feature of the cloud services is that users’ data are usually processed remotely i...
Towards an Efficient Usage of UbiSOAP Middleware for Ubiquitous Networks
With the drastic evolution of wireless technologies, software services can become truly ubiquitous, being not solely accesses but also hosted by wirelessly networked portable gadgets. As a result, legacy applicatio...
Strategizing Power Utilization within Intelligent Tags
Power management within intelligent Tags is one of the most important issues that must be given with utmost importance as the Tags are driven by battery power and the longevity of the battery must be increased so as to r...