CFP last date
20 December 2024
Reseach Article

Security on Mobile Agent Based Crawler (SMABC)

by Nisha Pahal, Sunil Kumar, Ashu Bhardwaj, Naresh Chauhan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 15
Year of Publication: 2010
Authors: Nisha Pahal, Sunil Kumar, Ashu Bhardwaj, Naresh Chauhan
10.5120/330-501

Nisha Pahal, Sunil Kumar, Ashu Bhardwaj, Naresh Chauhan . Security on Mobile Agent Based Crawler (SMABC). International Journal of Computer Applications. 1, 15 ( February 2010), 5-11. DOI=10.5120/330-501

@article{ 10.5120/330-501,
author = { Nisha Pahal, Sunil Kumar, Ashu Bhardwaj, Naresh Chauhan },
title = { Security on Mobile Agent Based Crawler (SMABC) },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 15 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 5-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number15/330-501/ },
doi = { 10.5120/330-501 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:42:20.856102+05:30
%A Nisha Pahal
%A Sunil Kumar
%A Ashu Bhardwaj
%A Naresh Chauhan
%T Security on Mobile Agent Based Crawler (SMABC)
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 15
%P 5-11
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile agents are active objects that can autonomously migrate in a network to perform tasks on behalf of their owners. Current web crawler uses the concept of Mobile Agent to enhance their crawling speed. In mobile crawling, mobile agents are dispatched to remote web severs for local crawling and processing of web documents. After crawling a specific web server, they dispatch themselves either back at the search engine machine, or at the next web server for further crawling. It gives a complete distributed crawling strategy by utilizing the mobile agent's technology but it suffers with the problem of security. In this paper, a security solution has been proposed, which protects both the mobile agent itself and the host resources that encrypt the data before passing it to mobile agent and decrypt it on the visited host sides. The method of "computing with encryption function" has been used. The proposed approach solves the problem of malicious host that can harm mobile agent or the information it contain.

References
  1. Wayne Jansen and Tom Karygiannis, "Privilege Management Mobile Agents,Twenty-third National Information Systems Security Conference, pp.362-370, October 2006 .
  2. Giacomo Cabri, Letizia Leonardi, Franco Zambonelli, "The Impact of the Coordination Model in the Design ofMobile Agent Applications," Twenty-second Computer Software and Applications Conference (COMPSAC), August 1998.
  3. Huhns, M., Singh, M. 1999, "Readings in AGENTS , Morgan Kaufman Publishers, San Francisco, California.
  4. James Riordan and Bruce Schneier. Environmental key generation towards clueless agents. In G. Vigna,editor, Mobile Agents and Security, volume 1419 in LNCS, pages 15-24. Springer-Verlag, Berlin, 1998.
  5. C. Kr¨ugel and T. Toth. Sparta - a security policy reinforcement tool for large networks. In submitted to I-NetSec 01, 2001.
  6. Niklas Borselius, Namhyun Hur, Marek Kaprynski and Chris J. Mitchell. A security architecture for agent-based mobile systems. In Proceedings of the Third International Conference on Mobile Communications Technologies - 3G2002, London, UK, May 2002, IEE Conference Publication 489, pages 312-318, IEE, London, 2002.
  7. "Building Secure Mobile Agents: The Supervisor-Worker Framework," Diploma Thesis, Technical University of Vienna, Feb. 2004
  8. W. Jansen and T. Karygiannis, "Mobile Agent Security," NIST Special Publication 800-19, National Institute of Standard and Technology, 2000.
  9. Pahal, Nisha. Chauhan, N. Sharma, A.K. "Context-Ontology Driven Focused Crawling of Web Documents". In proceedings of Third International Conference on Wireless Communication and Sensor Networks, 13-15 Dec 2007 IEEE Conference Publication page: 121-124, IIIT Allahabad.
  10. Groot, D.R.A. De, Boonk, M.L., Brazier, F.M.T, Oskamp, A, " Issues in a Mobile Agent-based Multimedia Retrieval Scenario" , Proc. The Third European Workshop on Multi-Agent Systems (EUMAS'05), pp. 103-113.
  11. Srilekha Mudumbai, Abdeliah Essiari, William Johnston, "Anchor Toolkit: A Secure Mobile Agent System," Proceedings of Mobile Agents '99 Conference, October 1999.
  12. William Farmer, Joshua Guttman, Vipin Swarup, "Security for Mobile Agents: Authentication and State Appraisal," Proceedings of the Fourth European Symposium on Research in Computer Security (ESORICS '96), September 1996, pp. 118-130.
  13. K.Satya Sai Prakash, S. V. Raghavan, "DIAPANGSE :Distributed Intelligent Agent based Parallel Architecture for Next Generation Search Engines", Dept. of Computer Science & Engineering, Indian Institute of Technology Madras, India, 2001.
  14. F. Gasparetti, A. Micarelli, "Swarm Intelligence: Agents for Adaptive Web Search", Dept. of Information, University of ROMA TRE, Rome, Italy, 2000.
  15. Potok, T., Elmore, M., Reed, J., and Samatova, N. 2002, "An Ontology-based HTML to XML Conversion Using Intelligent Agents", Proceedings of the Hawaii International Conference On System Sciences.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Agents crawler