SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Multi Agent Based De-Centralized
               Knowledge Discovery and Agent
                      Security: A Review

                                      Presentation by:
                                      Aman Kumar
                                      M.tech -CSE (2nd Sem)
                                     Graphic Era University,
                                      Dehradun,India
May 26, 2012                                                   1
Agenda
    Introduction
    Data Mining Vs. De-Centralized Data Mining
    Agent, Why Agent?
    Agent Based De-Centralized Data Mining
    MADM Systems-An Architectural Approach
    Advantages of MADM
    Agents Security Issues
    Security measures for agent
    Future Scope
    Summary
    References

May 26, 2012                                      2
Introduction

    Data Mining-KDD
    De-Centralized Environment
    De-Centralized KDD(DDM)
    An Agent
    Multi Agent System




May 26, 2012                      3
Data Mining
      General   Data Mining Model


                       Data Mining   Data
                       Tools         Warehouse




May 26, 2012                                     4
Distributed Data Mining
       De-Centralized        Data Mining model


                         Local Model Aggregation                 Final Model



               Local                                Local         Local
               Model                                Model         Model




               Data Mining                         Data Mining   Data Mining
               Algorithm                           Algorithm     Algorithm




May 26, 2012                                                                   5
                Site k                               Site 2        Site 1
Agent , Why Agent?
   An Software Agent is as user’s personal
    assistant .
   Agent can be programmed as compact as
    possible.
   Light weight agent can transmitted across the
    network rather than data that is more bulky.
   The Designing of DDM Systems Deals With
        Great Details of Algorithms used
        Reusability
        Extensibility
        Robustness

   Hence , the agent characteristics are desirable
    to use in DDM.
May 26, 2012                                          6
Agent Based DDM
              ADDM system concerns three keys characteristics

                    Interoperability
                    Dynamic Configuration
                    Performance Aspects

              Application’s of distributed data mining include credit card
               Authentication, intrusion detection and all this type general
               and security related applications.
              Into this a novel Data Mining Technique inherits the
               properties of agents.
              The DDM applications can be further enhanced with agents.
              Better Integration policy with the communication protocols
              Provide a view of online parallel processing


May 26, 2012                                                                   7
Basic Components of ADDM
              An ADDM system can be generalized into a set of
               components




                                                   Application
                                                   Layer


                                                  Data Mining
                                                  Layer



                                                  Agent Grid
                                                  Infrastructure
                                                  Layer

                   Fig. Overview of ADDM
May 26, 2012                                                       8
MADM Systems-
 An Architectural Approach
         MADM is the ADDM but equipped with several agents which
          have particular goal of functionality as:

         Resource Agent: Maintaining Meta Data Information
         Local Task Agent: Located at the local site
         Broker Agent: Working as Advisor agent
         Query Agent: KDD System Agent
         Pre-Processing Agent: Preparing data for mining
         Post Data Agent: Evaluates the performance and accuracy
         Result Agent: Aggregate the all local results
         Interface Agent: Provide Interface to the real world
          applications
         Mobile Agent: Migrate based on Request and Response

May 26, 2012                                                        9
MADM Systems-An Architectural
Approach contd….




                       Data Source
                       On Different
May 26, 2012
                       Sites          10
Agent Security Issues
    Identification and authentication
    Authorization and delegation
    Communication
     • confidentiality: assurance that communicated information is not
        accessible to unauthorised parties;
     • data integrity: assurance that communicated information cannot be
     manipulated by unauthorised parties without being detected;
     • availability: assurance that communication reaches its intended
     recipient in a timely fashion;
     • non-repudiation: assurance that the originating entity can be held
     responsible for its communications.
    Mobility
    Situated ness
    Autonomy
    Agent Execution

May 26, 2012                                                                11
Security Measures for agent
    Protecting agents
    Trusted hardware
    Trusted nodes
    Co-operating agents
    Execution tracing
    Encrypted payload
    Environmental key generation
    Computing with encrypted functions
    Un-detachable signatures




May 26, 2012                              12
Security Measures ……
    Protecting the agent platform

    Sandboxing and safe code interpretation
    Proof carrying code
    Signed code
    Path histories

     State appraisal




May 26, 2012                                   13
Future Scope
        Data Mining and web mining is the hot area of research
        Integration of KDD and Agent technology can provide a new
         way to both
        For several network security researchers it can provide
         several new way to find the fraud in the network as provide
         fast discovery
         Real time confidential transaction can be make secure by
         the integration of Agent Technology




May 26, 2012                                                           14
Summary

         This presentation presented an overview of :-
            Data Mining

            Distributed Data Mining

            Agent Based DDM

            MADM systems as survey based on the information that
             are exist today.
            common components between these systems and gives a
             description to their strategies and architecture.
            Security Measures For Agents

         This presentation shows the integrated architectural model
         of distributed data mining and the agent technology, which
         provide a optimized performance to the knowledge
         discovery when the data is not resides in a central site or
         scattered over the network.
May 26, 2012                                                           15
References
          [1] IJRIC ISSN: 2076-3328 www.ijric.org E-ISSN: 2076-3336 “. Agent based distributed data
          mining: AN OVER VIEW “VUDA SREENIVASA RAO, 2009-2010
         [2] M. Klusch, S. Lodi, G. Moro. Agent-based Distributed Data Mining: The KDEC Scheme.
          Intelligent Information Agents - The AgentLink Perspective. Lecture Notes in Computer Science 2586
          Springer 2003.
         [3] “Distributed Data Mining and Agents” Josenildo C. da Silva, Chris Giannella, Ruchita Bhargava,
          Hillol Kargupta1;, and Matthias Klusch
         [4] Y. Xing, M.G. Madden, J. Duggan, G. Lyons. A Multi-Agent System for Context-based Distributed
          Data Mining. Technical Report Number NUIG-IT-170503, Department of Information Technology,
          NUI, Galway, 2003.
         [5] “Agent-Based Data-Mining” Winton Davies 15 August 1994
         [6] Priyanka Makkar et. al. / (IJCSE) International Journal on Computer Science and Engineering
          Vol. 02, No. 04, 2010, 1237-1244 DISTRIBUTED DATA MINING AND MINING MULTI-AGENT
          DATA ,Vuda Sreenivasa Rao, Dr. S Vidyavathi
         [7] V. Gorodetsky and I. Kotenko. “The Multiagent Systems for Computer Network Security
          Assurance: frameworks and case studies.” In IEEE International Conference on Artificial Intelligence
          Systems, 2002, pages 297–302, 2002.
         [8] International Journal of Computer Applications (0975 – 8887) Volume 4– No.12, August 2010
         23 “A Comparative study of Multi Agent Based and High- Performance Privacy Preserving Data
          Mining”, Md Faizan Farooqui, Md Muqeem, Dr. Md Rizwan Beg
         [9] Future Generation Computer Systems 23 (2007) 61–68 ,www.elsevier.com/locate/fgcs
          “Distributed data mining on Agent Grid: Issues, platform and development toolkit” Jiewen Luoa,b,_,
          Maoguang Wangc, Jun Hud, Zhongzhi Shia
         [10] Sung W. Baik, Jerzy W. Bala, and Ju S. Cho. Agent based distributed data mining. Lecture
          Notes in Computer Science, 3320:42–45, 2004.
         [11]Xining Li and Jingbo Ni. Deploying mobile agents in distributed data mining. Lecture Notes in
          Computer Science 4819:322–331, 2007 .
May 26, 2012                                                                                                     16
    [12]“Mobile agent security” Niklas Borselius Mobile VCE Research Group Information Security Group,
    Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK ,Niklas.Borselius@rhul.ac.uk
Thank You



May 26, 2012               17

Weitere ähnliche Inhalte

Was ist angesagt?

AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Agent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningAgent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningEditor IJCATR
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsEswar Publications
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework forIJCNCJournal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd Iaetsd
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...AIRCC Publishing Corporation
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
Incentive based DDoS defense
Incentive based DDoS defenseIncentive based DDoS defense
Incentive based DDoS defenseG Prachi
 

Was ist angesagt? (16)

AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
 
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsProposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
 
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREA SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTURE
 
Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Agent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningAgent-Driven Distributed Data Mining
Agent-Driven Distributed Data Mining
 
SAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS CloudsSAFETY: A Framework for Secure IaaS Clouds
SAFETY: A Framework for Secure IaaS Clouds
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
An interoperability framework for
An interoperability framework forAn interoperability framework for
An interoperability framework for
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...Top 10 Download Article in Computer Science & Information Technology: October...
Top 10 Download Article in Computer Science & Information Technology: October...
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
Incentive based DDoS defense
Incentive based DDoS defenseIncentive based DDoS defense
Incentive based DDoS defense
 

Ähnlich wie Distributed Datamining and Agent System,security

Agent based frameworks for distributed association rule mining an analysis
Agent based frameworks for distributed association rule mining  an analysis  Agent based frameworks for distributed association rule mining  an analysis
Agent based frameworks for distributed association rule mining an analysis ijfcstjournal
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGIJCI JOURNAL
 
Distributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent dataDistributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent dataIRJET Journal
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issuesAleem Mohammed
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...AJASTJournal
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Associate Professor in VSB Coimbatore
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
 

Ähnlich wie Distributed Datamining and Agent System,security (20)

11 vol3
11 vol311 vol3
11 vol3
 
Agent based frameworks for distributed association rule mining an analysis
Agent based frameworks for distributed association rule mining  an analysis  Agent based frameworks for distributed association rule mining  an analysis
Agent based frameworks for distributed association rule mining an analysis
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNINGDDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
DDOS DETECTION IN SOFTWARE-DEFINED NETWORK (SDN) USING MACHINE LEARNING
 
Distributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent dataDistributed Data mining using Multi Agent data
Distributed Data mining using Multi Agent data
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...
 
Challenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud ForensicChallenges and Proposed Solutions for Cloud Forensic
Challenges and Proposed Solutions for Cloud Forensic
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
IJSRED-V2I1P2
IJSRED-V2I1P2IJSRED-V2I1P2
IJSRED-V2I1P2
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...
 

Kürzlich hochgeladen

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Kürzlich hochgeladen (20)

4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

Distributed Datamining and Agent System,security

  • 1. Multi Agent Based De-Centralized Knowledge Discovery and Agent Security: A Review Presentation by: Aman Kumar M.tech -CSE (2nd Sem) Graphic Era University, Dehradun,India May 26, 2012 1
  • 2. Agenda  Introduction  Data Mining Vs. De-Centralized Data Mining  Agent, Why Agent?  Agent Based De-Centralized Data Mining  MADM Systems-An Architectural Approach  Advantages of MADM  Agents Security Issues  Security measures for agent  Future Scope  Summary  References May 26, 2012 2
  • 3. Introduction  Data Mining-KDD  De-Centralized Environment  De-Centralized KDD(DDM)  An Agent  Multi Agent System May 26, 2012 3
  • 4. Data Mining General Data Mining Model Data Mining Data Tools Warehouse May 26, 2012 4
  • 5. Distributed Data Mining De-Centralized Data Mining model Local Model Aggregation Final Model Local Local Local Model Model Model Data Mining Data Mining Data Mining Algorithm Algorithm Algorithm May 26, 2012 5 Site k Site 2 Site 1
  • 6. Agent , Why Agent?  An Software Agent is as user’s personal assistant .  Agent can be programmed as compact as possible.  Light weight agent can transmitted across the network rather than data that is more bulky.  The Designing of DDM Systems Deals With  Great Details of Algorithms used  Reusability  Extensibility  Robustness  Hence , the agent characteristics are desirable to use in DDM. May 26, 2012 6
  • 7. Agent Based DDM  ADDM system concerns three keys characteristics  Interoperability  Dynamic Configuration  Performance Aspects  Application’s of distributed data mining include credit card Authentication, intrusion detection and all this type general and security related applications.  Into this a novel Data Mining Technique inherits the properties of agents.  The DDM applications can be further enhanced with agents.  Better Integration policy with the communication protocols  Provide a view of online parallel processing May 26, 2012 7
  • 8. Basic Components of ADDM  An ADDM system can be generalized into a set of components Application Layer Data Mining Layer Agent Grid Infrastructure Layer Fig. Overview of ADDM May 26, 2012 8
  • 9. MADM Systems- An Architectural Approach  MADM is the ADDM but equipped with several agents which have particular goal of functionality as:  Resource Agent: Maintaining Meta Data Information  Local Task Agent: Located at the local site  Broker Agent: Working as Advisor agent  Query Agent: KDD System Agent  Pre-Processing Agent: Preparing data for mining  Post Data Agent: Evaluates the performance and accuracy  Result Agent: Aggregate the all local results  Interface Agent: Provide Interface to the real world applications  Mobile Agent: Migrate based on Request and Response May 26, 2012 9
  • 10. MADM Systems-An Architectural Approach contd…. Data Source On Different May 26, 2012 Sites 10
  • 11. Agent Security Issues  Identification and authentication  Authorization and delegation  Communication • confidentiality: assurance that communicated information is not accessible to unauthorised parties; • data integrity: assurance that communicated information cannot be manipulated by unauthorised parties without being detected; • availability: assurance that communication reaches its intended recipient in a timely fashion; • non-repudiation: assurance that the originating entity can be held responsible for its communications.  Mobility  Situated ness  Autonomy  Agent Execution May 26, 2012 11
  • 12. Security Measures for agent  Protecting agents  Trusted hardware  Trusted nodes  Co-operating agents  Execution tracing  Encrypted payload  Environmental key generation  Computing with encrypted functions  Un-detachable signatures May 26, 2012 12
  • 13. Security Measures ……  Protecting the agent platform  Sandboxing and safe code interpretation  Proof carrying code  Signed code  Path histories  State appraisal May 26, 2012 13
  • 14. Future Scope  Data Mining and web mining is the hot area of research  Integration of KDD and Agent technology can provide a new way to both  For several network security researchers it can provide several new way to find the fraud in the network as provide fast discovery  Real time confidential transaction can be make secure by the integration of Agent Technology May 26, 2012 14
  • 15. Summary  This presentation presented an overview of :-  Data Mining  Distributed Data Mining  Agent Based DDM  MADM systems as survey based on the information that are exist today.  common components between these systems and gives a description to their strategies and architecture.  Security Measures For Agents  This presentation shows the integrated architectural model of distributed data mining and the agent technology, which provide a optimized performance to the knowledge discovery when the data is not resides in a central site or scattered over the network. May 26, 2012 15
  • 16. References  [1] IJRIC ISSN: 2076-3328 www.ijric.org E-ISSN: 2076-3336 “. Agent based distributed data mining: AN OVER VIEW “VUDA SREENIVASA RAO, 2009-2010  [2] M. Klusch, S. Lodi, G. Moro. Agent-based Distributed Data Mining: The KDEC Scheme. Intelligent Information Agents - The AgentLink Perspective. Lecture Notes in Computer Science 2586 Springer 2003.  [3] “Distributed Data Mining and Agents” Josenildo C. da Silva, Chris Giannella, Ruchita Bhargava, Hillol Kargupta1;, and Matthias Klusch  [4] Y. Xing, M.G. Madden, J. Duggan, G. Lyons. A Multi-Agent System for Context-based Distributed Data Mining. Technical Report Number NUIG-IT-170503, Department of Information Technology, NUI, Galway, 2003.  [5] “Agent-Based Data-Mining” Winton Davies 15 August 1994  [6] Priyanka Makkar et. al. / (IJCSE) International Journal on Computer Science and Engineering Vol. 02, No. 04, 2010, 1237-1244 DISTRIBUTED DATA MINING AND MINING MULTI-AGENT DATA ,Vuda Sreenivasa Rao, Dr. S Vidyavathi  [7] V. Gorodetsky and I. Kotenko. “The Multiagent Systems for Computer Network Security Assurance: frameworks and case studies.” In IEEE International Conference on Artificial Intelligence Systems, 2002, pages 297–302, 2002.  [8] International Journal of Computer Applications (0975 – 8887) Volume 4– No.12, August 2010  23 “A Comparative study of Multi Agent Based and High- Performance Privacy Preserving Data Mining”, Md Faizan Farooqui, Md Muqeem, Dr. Md Rizwan Beg  [9] Future Generation Computer Systems 23 (2007) 61–68 ,www.elsevier.com/locate/fgcs “Distributed data mining on Agent Grid: Issues, platform and development toolkit” Jiewen Luoa,b,_, Maoguang Wangc, Jun Hud, Zhongzhi Shia  [10] Sung W. Baik, Jerzy W. Bala, and Ju S. Cho. Agent based distributed data mining. Lecture Notes in Computer Science, 3320:42–45, 2004.  [11]Xining Li and Jingbo Ni. Deploying mobile agents in distributed data mining. Lecture Notes in Computer Science 4819:322–331, 2007 . May 26, 2012 16 [12]“Mobile agent security” Niklas Borselius Mobile VCE Research Group Information Security Group, Royal Holloway, University of London Egham, Surrey, TW20 0EX, UK ,Niklas.Borselius@rhul.ac.uk
  • 17. Thank You May 26, 2012 17