Shielding security sensitive parts of mobile agent
2016
Distributed computing is an emerging area of today's internet era. Mobile agent is one of the paradigms used in applications of distributed computing. When a mobile agent arrives on a particular host, the host provides the environment to the mobile agent for execution, during this period the mobile agent is under full control of the host. Executing host can harm the agent in many ways such as it can alter the code of the agent, it can tamper the data collected by the agent up to this point and also it can change the itinerary of the agent etc. This paper focuses on the area of securing the code and data collected by the agent. Code security proposal is an integration of obfuscation and encryption/decryption technique, whereas for providing secure data, dual layer of encryption/decryption is applied.
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
8
References
0
Citations
NaN
KQI