Open Access Open Access  Restricted Access Subscription or Fee Access

A Model for Mobile Agent based Security in Cloud Computing

L. Venkatakrishnan

Abstract


Cloud computing is a type of computing that is comparable to grid computing. It relies on sharing computing resources rather than having local servers or personal devices to handle application. Cloud Computing gives you the ability to run applications and access data from your PC, Mac or mobile device through internet. Apart from the web browser or user interface, no other local software or data storage is required. Security plays a vital role in an internet world. Secured authentication, confidentiality, privacy, data integrity, etc.., are constraints to ensure security. Cloud computing security is secluded from any other security like network security, information security. Since, it has been rely on the infrastructure where nodes are interconnected for providing cloud services. In this paper we have proposed a model to ensure cloud computing security using mobile agents, best fit algorithm and match making algorithm in an interconnected cloud computing nodes which are used for providing seamless services to client.

Keywords


Cloud Computing, Mobile Agents, Best Fit Algorithm, Matchmaking Algorithm

Full Text:

PDF

References


“ABusiness Per-spective on Technology and Applications” by K. Stanoevska-Slabeva, T.Wozniak, GridandCloudComputing- Springe r-Verlag, Berlin, Heidelberg,2010.

G. Reese, Cloud Application Architectures: Building Applications and Infras-tructure in the Cloud, in: Theory in Practice, O‟Reilly Media, 2009.

B. Rajkumar, C. Yeo, S. Venugopal, S. Malpani, Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems (2009).

“A Matchmaking Algorithm For Resource Discovery On Grid” by Md Rafiqul Islam, Md Zahidul Islam, Nazia Leyla in International Conference On Information And Communication Technology Icict 2007, 7-9 March 2007, Dhaka, Bangladesh.

Cloud Security Alliance. Top Threats To Cloud Computing, 2010. Http://Www.Cloudsecurityalliance.Org [Accessed On: March, [2010].

Heiser J. What You Need To Know About Cloud Computing Security And Compliance, Gartner, Research, Id Number: G00168345, 2009.

“Resource Matching And A Matchmaking Service For An Intelligent Grid” by xin bai, han yu, yongchang ji, and dan c. marinescu in international journal of computing intelligence 1:3,summer 2005.

E. Naone, Technology overview, conjuring clouds, MIT Technology Review, July–August, 2009.

National Institute of Standards and Technology, The NIST Definition of Cloud Computing, Information Technology Laboratory, 2009.

Michael Knapik And Jay Jo-Hnson,Developing Intelligent Agents For Distributed Sys-Tems: Exploring Architectures, Techniques, And Applications, Mcgraw-Hill Professional Publishing, 1997.

Joseph P Bigus, Jennifer Bi-Gus And Joe Bigus, Construct-Ing Intelligent Agents Using Java: Professional Develo-Per‟s Guide, 2nd Edition, John Wiley & Sons, 2001.

William R Cockayne And Mi-Chael Zyda, Mobile Agents, Prentice Hall, 1998.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.