Tamper Protection for Dynamic Service Level Agreement in Intelligent Agent Based Mobile Cloud Framework

نویسندگان

  • K. S. Arvind
  • R. Manimegalai
  • K. S. Suganya
چکیده

In utility computing, customer requests varying services from software to infrastructure as and when needed. As a result, there are many mobile cloud providers provide this services on demand basis as per current market needs. To ensure compliance and security, these providers establish a contract popularly known as Service Level Agreement (SLA) which states the services and management aspects. Such SLA is usually managed by third party entities and in some case by intelligent autonomic agents. But owing to the growing needs and demands of customers, dynamic SLA was offered by the service providers. A dynamic SLA is a redefined SLA whenever new services are demanded by the customer after SLA negotiation. Consequently these dynamic SLA need tamper protection from unauthorized users to prevent unnecessary changes which may lead to SLA violation consequently losing the trust of customers. This paper proposes a data integrity protection for the dynamic SLA using visual cryptography and semi-homomorphic encryption in intelligent agent based service level architecture. As a result the autonomous intelligent agents, customers and service providers can modify the SLA without decrypting the encrypted SLA and Sitekey authentication thereby achieving tamper protection. Furthermore this also ensures the multiparty involvement in dynamic SLA management in intelligent agent based service level architecture.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A review of methods for resource allocation and operational framework in cloud computing

The issue of management and allocation of resources in cloud computing environments, according to the breadth of scale and modern technology implementation, is a complicated issue. Issues such as: the heterogeneity of resources, resource dependencies to each other, the dynamics of the environment, virtualization, workload diversity as well as a wide range of management objectives of cloud servi...

متن کامل

Cluster Based Cross Layer Intelligent Service Discovery for Mobile Ad-Hoc Networks

The ability to discover services in Mobile Ad hoc Network (MANET) is a major prerequisite. Cluster basedcross layer intelligent service discovery for MANET (CBISD) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. The cluster basedarchitecture using semantic knowledge provides scalability and accuracy. Also, the mini...

متن کامل

Towards an Efficient Management of Mobile Cloud Computing Services based on Multi Agent Systems

Today, there is an increase of using mobile smart devices. These devices can have an effective access to information and benefit of many applications in the Cloud. Cloud Computing (CC) exploits its full potential with many difficulties due to its inherent problems such as resource scarcity, intermittent network connectivity, and mobility. Mobile Cloud Computing (MCC) can treat these problems by...

متن کامل

Cooperative Trust Framework for Cloud Computing Based on Mobile Agents

Cloud computing opens doors to the multiple, unlimited venues from elastic computing to on demand provisioning to dynamic storage, reduce the potential costs through optimized and efficient computing. To provide secure and reliable services in cloud computing environment is an important issue. One of the security issues is how to reduce the impact of any type of intrusion in this environment. T...

متن کامل

On the Implementation of IMAGO System

Mobile Agents are mainly intended to be used for network computing applications distributed over large-scale computer networks. An intelligent mobile agent is a selfcontained process, dispatched by its principal, roaming the internet to access data and services, and carrying out its assigned decision-making and problem-solving tasks remotely. In this paper, the author will present the design an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017