Towards Secure Agent Migration in Mobile Cloud Computing Using JADE Framework

Towards Secure Agent Migration in Mobile Cloud Computing Using JADE Framework

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-11
Year of Publication : 2024
Author : Khadija El miloudi, Yassine Aggagui, Abderrahim Abdellaoui
DOI : 10.14445/22315381/IJETT-V72I11P131

How to Cite?
Khadija El miloudi, Yassine Aggagui, Abderrahim Abdellaoui, "Towards Secure Agent Migration in Mobile Cloud Computing Using JADE Framework," International Journal of Engineering Trends and Technology, vol. 72, no. 11, pp. 322-332, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I11P131

Abstract
Mobile Cloud Computing (MCC) has achieved significant success in recent years by delivering resources to mobile devices and making them available to any device for computation and execution in the cloud. Speaking of computing the execution, the Multi-Agent System (MAS) allows mobile devices to run an agent-based application in which agents can be migrated from one node to another to continue the execution within a system. The goal is to combine the advantages of MCC and MAS to compute application agents between mobiles to reduce power consumption and improve application performance. This paper provides a novel agent migration architecture for mobile cloud computing built on the JADE platform and considers security concerns using the ECDH, ECDSA, and SIMON algorithms.

Keywords
Agent migration, ECDH, ECDSA, JADE, Mobile cloud computing, SIMON.

References
[1] Dijiang Huang, Huijun Wu, Mobile Cloud Computing Taxonomy, Mobile Cloud Computing, pp. 5-29, 2018.
[Google Scholar] [Publisher Link]
[2] Parkavi Ravi, Priyanka Chinnaiah, and Sheik Adullah Abbas, Cloud Computing Technologies for Green Enterprises: Fundamentals of Cloud Computing for Green Enterprises, IGI Global Scientific Publishing Platform, pp. 395-414, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Jason Carolan et al., Introduction to cloud computing architecture, White Paper, 1st ed., 2009.
[Google Scholar] [Publisher Link]
[4] N. Haichun, and L. Yong, “A Mobile Agent-Based Task Seamless Migration Model for Mobile Cloud Computing,” Proceeding 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications (WARTIA), Ottawa, ON, Canada, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Layth Muwafaq et al., “A Survey on Cloudlet Computation Optimization in the Mobile Edge Computing Environment,” International Journal of Advanced Computer Science and Applications (IJACSA), vol. 14, no. 1, PP. 1-13, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Niroshinie Fernando, Seng W. Loke, and Wenny Rahayu, “Mobile Cloud Computing: A Survey,” Future Generation Computer Systems, vol. 29, no. 1, pp. 84-106, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Yousra Berguig et al., “Mobile Agent Security Based on Mutual Authentication and Elliptic Curve Cryptography,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 12, pp. 2509-2517, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Joan Ametller, Sergi Robles, and Joan Borrell, “Agent Migration over FIPA ACL Messages,” Proceedings International Workshop on Mobile Agents for Telecommunication Applications, Springer, Berlin, Heidelberg, vol. 2881, pp. 210-219, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Vedran Vyroubal, and Mario Kušek, “Task Migration of JADE Agents on Android Platform,” Proceedings of the 12th International Conference on Telecommunications, Zagreb, Croatia, pp. 123-130, 2013.
[Google Scholar] [Publisher Link]
[10] P. Angin, and B.K. Bhargava, “An Agent-Based Optimization Framework for Mobile-Cloud Computing,” Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 4, no. 2, pp. 1-17, 2013.
[Google Scholar] [Publisher Link]
[11] Ricky K.K. Ma, and Cho-Li Wang, “Lightweight Application-Level Task Migration for Mobile Cloud Computing,” Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, Fukuoka, Japan, pp. 550-557, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[12] P. Misikangas, and K. Raatikainen, “Agent Migration Between Incompatible Agent Platforms”, In Proceedings of the 20th IEEE International Conference on Distributed Computing Systems, Taipei, Taiwan, pp. 4-10, 2000.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Sophia Alami-Kamouri et al., “Mobile Agent Security Based on Cryptographic Trace and SOS Agent Mechanisms,” Journal of Communications, vol. 15, no. 3, pp. 221-230, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Hind Idrissi, “Anonymous ECC-Authentication and Intrusion Detection Based on Execution Tracing for Mobile Agent Security,” Wireless Personal Communications, vol. 94, no. 3, pp. 1799-1824, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Pelin Angin, Bharat Bhargava, and Rohit Ranchal, “A Self-Protecting Agents Based Model for High-Performance Mobile-Cloud Computing,” Computers & Security, vol. 77, pp. 380-396, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[16] David Grimshaw, JADE Administration Tutorial, Jade Platform, Ryerson University, 2010. [Online]. Available: https://jade.tilab.com/documentation/tutorials-guides/jade-administration-tutorial/ [17] Ashutosh Dhar Dwivedi, and Gautam Srivastava, “Security Analysis of Lightweight IoT Encryption Algorithms: SIMON and SIMECK,” Internet of Things, vol. 21, pp. 1-11, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Ray Beaulieu et al., “The SIMON and SPECK Lightweight Block Ciphers,” Proceedings of the 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, pp. 1-6, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Aldo H.D. Mendes et al., “MAS-Cloud+: A Novel Multi-Agent Architecture With Reasoning Models for Resource Management in Multiple Providers,” Future Generation Computer Systems, vol. 154, pp. 16-34, 2024.
[CrossRef] [Google Scholar] [Publisher Link]