Securing Mobile Agent Using Dummy and Monitoring Mobile Agents
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
Mobile agent is a very important concept for distributed computing & utilizing the resources available on the connected network because of their capability of operation on different environments that is why the approach is used for many network based applications like data crawling, information exchange, distributed system integrity etc. but it lacks the security aspects when applied to open network where nodes cannot be classified as they are malicious or not, hence for the cases where the security of data or reliability of agent became must we need some method to insure the things discussed above. Although many other methods are proposed by many authors but some of them required a pre survey [1], encryption of important data [2] acknowledgement schemes [3], here we are proposing a scheme which not only confirms the security of data but also guarantees the uninterrupted operation of agent by utilizing a dummy agent and composite acknowledgement technique.
Authors and Affiliations
Neelesh Kumar Panthi , Ilyas Khan , Vijay k. Chaudhari
Combined Text Watermarking
There is a vast amount of digital text data exchanged over the internet for the past few years. Such exchanges necessitate a very robust copyright protection mechanism. This paper presents a new idea on how one can effec...
E-Governance and Effective Deliverance of Information and Services to Citizens Architecture
By Progression of information technology resources in India, great opportunity comes to deliver information and services to citizens and business. Proper distribution and delivery of government information and services t...
A NOVEL APPROACH FOR RETRIEVING AN IMAGE USING CBIR
In this paper we mainly focussed on how to retreive the images from large database. Generally in huge databases we will have large number of images with the same name. when we want to retrieve the image by giving a name,...
A Model of MULTI-VERIFIER channel e-mailing system using Steganographic scheme
In this paper, we presented a model of privileged channel e-mailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model a sender can send a secret m...
Jacobi computation using mobile agent
Physical phenomena occur in a wide range of mathematical applications: from fluid to solid mechanics, electromagnetic and electrical engineering. Engineers working toward an optimized modelling must...