Title: Shielding security sensitive parts of mobile agent

Authors: Preeti; Praveena Chaturvedi; Rahul Hans

Addresses: Department of Computer Science, Gurukul Kangri Vishwavidyalaya, Haridwar, India ' Department of Computer Science, Gurukul Kangri Vishwavidyalaya, Haridwar, India ' Department of Information Technology, D.A.V. University, Jalandhar, India

Abstract: Distributed computing is an emerging area of today's internet era. Mobile agent is one of the paradigms used in applications of distributed computing. When a mobile agent arrives on a particular host, the host provides the environment to the mobile agent for execution, during this period the mobile agent is under full control of the host. Executing host can harm the agent in many ways such as it can alter the code of the agent, it can tamper the data collected by the agent up to this point and also it can change the itinerary of the agent etc. This paper focuses on the area of securing the code and data collected by the agent. Code security proposal is an integration of obfuscation and encryption/decryption technique, whereas for providing secure data, dual layer of encryption/decryption is applied.

Keywords: distributed computing; mobile agent; security; dual layer; aglets; obfuscation; fragmentation; integrity; cryptography; blowfish.

DOI: 10.1504/IJCISTUDIES.2016.083575

International Journal of Computational Intelligence Studies, 2016 Vol.5 No.3/4, pp.289 - 302

Received: 15 Sep 2015
Accepted: 09 Jan 2016

Published online: 06 Apr 2017 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article