Title: Shielding security sensitive parts of mobile agent
Authors: Preeti; Praveena Chaturvedi; Rahul Hans
Addresses: Department of Computer Science, Gurukul Kangri Vishwavidyalaya, Haridwar, India ' Department of Computer Science, Gurukul Kangri Vishwavidyalaya, Haridwar, India ' Department of Information Technology, D.A.V. University, Jalandhar, India
Abstract: Distributed computing is an emerging area of today's internet era. Mobile agent is one of the paradigms used in applications of distributed computing. When a mobile agent arrives on a particular host, the host provides the environment to the mobile agent for execution, during this period the mobile agent is under full control of the host. Executing host can harm the agent in many ways such as it can alter the code of the agent, it can tamper the data collected by the agent up to this point and also it can change the itinerary of the agent etc. This paper focuses on the area of securing the code and data collected by the agent. Code security proposal is an integration of obfuscation and encryption/decryption technique, whereas for providing secure data, dual layer of encryption/decryption is applied.
Keywords: distributed computing; mobile agent; security; dual layer; aglets; obfuscation; fragmentation; integrity; cryptography; blowfish.
International Journal of Computational Intelligence Studies, 2016 Vol.5 No.3/4, pp.289 - 302
Received: 15 Sep 2015
Accepted: 09 Jan 2016
Published online: 11 Apr 2017 *