Skip to main content

Security in a Mobile Agent Based DDM Infrastructure

  • Conference paper
Autonomous Intelligent Systems: Multi-Agents and Data Mining (AIS-ADM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4476))

Abstract

Mobile agent technology offers a new approach to mining information from data sources distributed over the Internet. However, the potential benefits of mobile agents must be weighted against the real security threats. An agent based Distributed Data Mining (DDM) system must cope with exposed data services and insecure communication channels in the Internet to protect the privacy, integrity and availability of agents and distributed resources. In this paper, we present the design of a mobile agent infrastructure for DDM applications and discuss the implementation of security mechanism that has been effectively integrated with the mobile agent virtual machine.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Klusch, M., Lodi, S., Moro, G.: The Role of Agents in Distributed Data Mining: Issues and Benefits. In: IEEE/WIC International Conference on Intelligent Agent Technology (IAT’03) (2003)

    Google Scholar 

  2. Park, B., Kargupta, H.: Distributed Data Mining: Algorithms, Systems, and Applications. In: Ye, N. (ed.) Data Mining Handbook (2002)

    Google Scholar 

  3. Krishnaswamy, S., Zaslasvky, A., Loke, S.W.: Internet Delivery of Distributed Data Mining Services: Architectures, Issues and Prospects. In: Murthy, V.K., Shi, N. (eds.) Architectural Issues of Web-enabled Electronic Business, pp. 113–127. Idea Group Publishing, Hershey (2003)

    Google Scholar 

  4. Borselius, N.: Mobile Agent Security. Electronic & Communication Engineering Journal 10, 211–218 (2002)

    Article  Google Scholar 

  5. Karnik, N., Tripathi, A.: Security in the Ajanta mobile agent system. Software Practice and Experience 31(4), 301–329 (2001)

    Article  MATH  Google Scholar 

  6. Gray, R., et al.: D’Agents: Security in a Multiple Language Mobile-agent System. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 154–187. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Li, X.: On the Implementation of IMAGO System. International Journal of Computer Science and Network Security 6(2a) 107–118 (2006)

    Google Scholar 

  8. Bettstetter, C., Renner, C.: A Comparison of Service Discovery Protocols and Implementation of the Service Location Protocol. In: Proc. of EUNICE 2000, sixth EUNICE Open European Summer School, pp. 13–15 (2000)

    Google Scholar 

  9. Salutation Consortium: Salutation Architecture Overview. White Paper (1998), http://www.salutation.org/whitepaper

  10. Guttman, E., et al.: Service Location Protocol, Version 2, White Paper. In: IETF, RFC 2608 (1999)

    Google Scholar 

  11. OASIS UDDI, UDDI White Paper (2005), http://www.uddi.org

  12. Song, L., Li, X., Ni, J.: A Database Service Discovery Model for Mobile Agents. International Journal of Intelligent Information Technologies 2(2), 16–29 (2006)

    Google Scholar 

  13. MySQL AB MySQL Reference Manual, user’s manual (2005), http://dev.mysql.com/doc/mysql/en/

  14. Li, X., Autran, G.: Inter-agent Communication in IMAGO Prolog. In: Bordini, R.H., et al. (eds.) PROMAS 2004. LNCS (LNAI), vol. 3346, pp. 163–180. Springer, Heidelberg (2005)

    Google Scholar 

  15. FIPA ACL, Agent Communication Language Specifications, FIPA (2005), http://www.fipa.org

  16. OpenSSL, http://www.openssl.org/

  17. Greenberg, M., Byington, J., Harper, D.: Mobile Agents and Security. IEEE Communication Magazine 36(7), 76–85 (1998)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vladimir Gorodetsky Chengqi Zhang Victor A. Skormin Longbing Cao

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Li, X. (2007). Security in a Mobile Agent Based DDM Infrastructure. In: Gorodetsky, V., Zhang, C., Skormin, V.A., Cao, L. (eds) Autonomous Intelligent Systems: Multi-Agents and Data Mining. AIS-ADM 2007. Lecture Notes in Computer Science(), vol 4476. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72839-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72839-9_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72838-2

  • Online ISBN: 978-3-540-72839-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics