SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
DOI : 10.5121/ijcsit.2014.6102 15
Information Security Approach in Open
Distributed Multi-Agent Virtual Learning
Environment
Dr. Zahi A.M. Abu Sarhan 1
and As'ad Mahmoud As'ad Alnaser2
1
Department of Computer Information Systems, Applied Science Private University,
Amman, Jordan
2
Department of Computer Science, Al-Balqa' Applied University, Ajlun University
College, Ajlun, Jordan
ABSTRACT
This paper presented the main information, security problems and threats in open multi-agent distributed
e-learning information systems and Proposed various approaches to solve information security attacks in
virtual learning environment using service oriented architecture which based on multi-agent information
systems architecture, the solution on the multi-agent learning information system implementation based on
the implementation of two types of systems the first system with the centralized mobile agent information
security management and the second system with decentralized mobile agents security management, and
proposed the migration behavior simulation for their active software components (software agents) .
KEYWORDS
Information security, Distributed multi-agent system, Virtual learning environment. Agent migration.
1. INTRODUCTION
Relevance research in the field of distributed artificial intelligence and multi-agent systems
(MAS), according to [1], on the complexity of modern organizational and technical systems,
variety, tasks distribution and the huge volume information flows and critical information
processing time. The theoretical researches in MAS field mainly carried out in the following
areas: Agents theory, Agents collective behavior, agents and MAS architecture; methods,
languages and agents communication tools, agents implementation languages; agents migration
support tools within network. The greatest difficulty in theoretical studies and practical
implementations of modern MAS are the issues related to agent’s information security and
information resources, which they operate in open multi-agent virtual learning environments.
Providing information security is an important task that must be solved when developing MAS,
focused on the usage in various fields.
Software agent is computer system, which is found in some environment and is capable of
autonomous action in this environment in order to meet its design objectives [2]. Software agents
have characteristics that make them suitable for complex functions. Such features include:
autonomy, interaction, reactivity, activity, intelligence and mobility [3].
E-learning represents the use of electronic media and information and communication
technological innovations in education and learning processes. E-learning is generally
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
16
comprehensive of all forms of academic technological innovation in study and education. E-
learning contains various types of media that deliver text, sound, pictures, computer animation,
and streaming video, and contains technology programs and procedures such as sound or movie
record, computer-based learning, as well as regional intranet/extranet and web-based learning.
Information and interaction systems, whether free-standing or depending on either regional
networks or the Internet in networked learning, underlay many e-learning procedures [4].
E-learning can occur in or out of the classroom. It can be self-paced, asynchronous learning or
may be instructor-led, synchronous learning. E-learning is suited to distance learning and flexible
learning, but it can also be used in conjunction with face-to-face teaching, in such case the term
blended learning is commonly used [4].
Virtual learning environments (VLE) have become a frequent tool in higher education
organizations for supporting and assisting both study and education. They create a platform for
instructors and students to access educational materials, read reports, interacts with others, send
and receive assignments, get involved in conversations and group work. These days, there are
plenty of commercial VLE techniques available in the market. Each of them offers its own
features and performance [5].
2. PROBLEMS AND INFORMATION SECURITY THREATS IN OPEN MAS
Ensuring the information security problem in MAS can be presented in several ways. First, it is
necessary to provide nodes protection against hidden attacks by malicious programs or spyware
agents. Second, we need to protect agents themselves from exposure applications running on the
network nodes. Third, it is necessary to ensure the protection MAS agents from attacks spyware
agents, migrating between network nodes. The first problem can be successfully solved by using
strong authentication methods executable agents code, agents program code integrity monitoring
and access restrictions either by software agents, or information or services that they provide. The
second problem is one of the major unsolved problems today. The reason for this is the existence
of a large set of malware that can unauthorized way affect the agents operation process and
manipulate the confidential information, on which the agents operate. The third problem solution
based is on special security protocols which create exchanging messages between agents in multi-
agent environment.
Security threats in distributed MAS include: passive unauthorized message exchanging
interception within communications process between agents, the integrity breach of the
transmitted data over the network, unauthorized access to the data, denial of service, intercept
requests with their subsequent modification and playback, the rejection of fact receiving or
sending data. The decentralized nature of building distributed MAS, none single center, the
components heterogeneity, the potential communication with any node make multi-agent
environment maximum vulnerable to any kind of these threats [6].
3. EXISTING INFORMATION SECURITY SOLUTIONS IN OPEN MAS
Ensuring information security under consideration class of systems can be organized as complex
of famous solutions. The most efficient and flexible at present solutions for agent’s information
security, and MAS are:
• Agents protected states method [7];
• Mobile cryptography methods [8];
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
17
• Police Office security model[9];
• Buddy Model of security for mobile agents [10];
• Methods of the organization of self-organizing systems trusting relationship [11];
• Methods based on using algorithms for confidential communications and proxy
performing, the functions and limitations of restricting access to resources and services
based on the methods of identification and authentication [12].
Despite such a wide range of existing solutions, none of these approaches provided a
comprehensive solution of agent’s information security problems from harmful sites and spyware
in open MAS.
4. MULTI-AGENT VIRTUAL LEARNING ENVIRONMENT
A virtual learning environment (VLE) is a software system designed to support teaching and
learning. VLEs generally function on the World Wide Web, and, therefore, they can be utilized
both on and off-campus, provided that the users are authorized and can access the Internet. This
surmount over the restriction of traditional face-to-face educating, and guarantees that learning is
neither limited to location nor time. VLEs become more popular and included in many college
organizations all over the world. It is not only because of their versatility, but also because they
provide an extensive range of tools or features, such as content distribution, evaluation, emails
[13].
Based on the learning process components the representation of VLE can be presented as shown
in figure 1.
Learner-Content
Interaction Agent
Techer-Content
Interaction Agent
Learner-Learner Interaction
agent
Learner-Teacher
Interaction Agent
Teacher-Teacher Interaction
agent
Content-Content Interaction
agent
Figure1. Virtual learning environment based on multi-agents architecture.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
18
5. OPEN MULTI-AGENT VIRTUAL LEARNING ENVIRONMENT STRUCTURE AND
FORMAL REPRESENTATION
The main part of this work focuses on solving agents information security problems. As example
of ensuring information security in e-learning systems, OMAVLE (Open Multi-Agent Virtual
Learning Environment).
In terms of overall functioning logic e-learning has a multi-agent realization. Agent-based
orientation is expressed in the fact that in its real subject e-learning activity is represented by one
or more mobile software agents that represent e-Learning-activities and implement procedures for
an automated search agent partners for cooperation.
In general, the model OMAVLE can be assigned as a theoretic-set of relations and can be
represented as the next set of sets:
{ } { } { } { } { } { } { }OMAS S A U VLP IR O ATTR= U U U U U U ;
Where { }S - set the system users (E-Learning subjects); { }A - set of agents in the system,
representing the interests of users in a virtual learning environment; { } { } { }U SH CH= U where U
set of the system nodes, in which agents operate, { }SH - multiple server hosts, { }CH - multiple
client hosts; { }VLP - set of virtual learning-platforms (VLP), within which the combined agents
of joint activities with similar interests and goals; { }IR - set of information system resources;
{ }O - relations between model objects sets; { }ATTR - set of model objects attributes;
There are two main types of operational agents in the system{ } { } { }A MA CA= U , where { }MA -
the migrating mobile agents between network nodes; { }CA - the control agents (moderators), that
operating within the VLP and coordinating the processes of mobile agents interaction and
migration.
On the set of objects model the following relationship, that defines the structure of OMAELS, can
be defined:
{ } { } { } { } { } { }O SMA SHVLP MAVLP CAVLP CAMA= ∪ ∪ ∪ ∪ ;
Where { } { } { }SMA S MA⊂ ×
- the availability relation of each virtual learning subject
representative - agent; { } { } { }SHVLP SH MA⊂ ×
- The existence relation of each system server
node of VLP; { } { } { }MAVLP MA VLP⊂ ×
- The existence relation of each VLP agents of joint
activities with common interest areas; { } { } { }CAVLP CA VLP⊂ ×
The membership relation of each
virtual platform with its control agent (agent-moderator);{ } { } { }CAMA CA MA⊂ ×
- The
membership relation of each control agent from agent joint activities set that it coordinates their
interaction.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
19
Each mobile agent can be described with the following parameters set:
{ } { } { } { } { },MA Id Id ST D SSMPMA MA MA= ∪ ∪ ∪
Where IdMA - The mobile agent unique identifier; IdMP - The server node unique identifier
from which mobile agent migrates, { }STMA - The mobile agent states set; { }DMA - data set,
which mobile agent operates; { } { } { },SS C Pk Sk= ∪ - mobile agent internal security system; { }C -
The set of data encryption cryptographic methods with open and/or private key; Pk - public key
known only by mobile agent and its control agent (the public keys refresh rate determined by the
control agent); Sk - private (secret) key known only by mobile agent (the secret key refresh rate
determined by mobile agent).
6. PROBLEM SOLUTION FOR INFORMATION SECURITY IN OMAVLE
Novelty of what proposed in this paper is problem solving for ensuring information security in
open distributed MAS which is a combination of two approaches to the OMAVLE formation
[14].
The first approach is based on the concept of a closed network lies in the development of a multi-
agent virtual electronic learning environment with independent agent platforms based on the
technology [15], within which agents operate with other agents that have similar interests and
goals (collecting agents with the similar interests private groups), and the using of agents state
protection method in order to prevent hidden malware and spyware agents attacks. Formulation
VLP based on agents consensus where each agent shared information with other agents with the
same interest and same goals, this virtual learning platform can be collected form single node in
network or from multiple nods and this VLP begins allotted platform [16] (private group of
agents with the same interests, implemented on any of the nodes in the system).
The second Proposed approach, based on the idea which described in [14] which involves the
implementation of an open multi-agent environment specialized software component - the mobile
agents security system (MASS), providing the cryptographic techniques and mechanisms
implementation to protect the system agents of various computer attacks types from malicious
software, and using simulation tools for analysis, forecasting and studying the dynamic agents
behavior in the system.
As a simulation tool can be used system-dynamic complexes or agent-based models. For
Extending Multi-Agent Security System (MASS) functionality integrated into MASS structure,
developed specific software components, that provides support for inter-agent (between agents)
interaction and agents self-organization, as well as implementing protection mechanisms that
protect the system agents from various types of computer attacks as malware. These components
include:
• Registry Server;
• Agents Name server;
• Public key encryption Server;
• Data encryption module;
• Special register;
• Agent Control System.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
20
Registry Server contains information about the operated system nodes, and controls the new
nodes and new agent’s connections to the system. Agent Name Server collects information about
all system agents.
Formation and maintenance distributed agents registry carried out on the basis of their binding to
the dendritic domain conceptual models. Public key encryptions Server jointly with data
encryption module are the core of agent’s information security system, agents, agents
representative and system nodes. It implements agent identification and authentication procedure
and information cryptographic protection methods with public key. The key server stores a set of
individual public keys to encrypt the information that system agents operate within each other
interaction and with running applications on the network nodes.
In this paper, as a data encryption with public key method proposed to use classical asymmetric
key cryptographic encryption algorithm with RSA public key [17, 18] and its modifications [19].
For ensuring the integrity and confidentiality of their requests and to protect information about
participations, the agents use electronic signature and known private key encryption methods.
Special register contains full information about all VLP registered in the system, and their
constituent agents coalitions. MASS integrates with agents control system, representing software
components set that implement the agents operation and interaction internal logic, inter-agent
communication protocols.
7. MULTI-AGENT SECURITY SYSTEM MANAGEMENT FUNCTIONING
ALGORITHM.
The study proposed two embodiments of MASSM: the first system with centralized mobile
agent’s security management, and the second system with decentralized mobile agent’s security
management.
When a new learner connects to the system, the system generates for hem his virtual
representative (mobile agent), this mobile agent acting as learner interest. The agent is generated
by the server host and performed the following actions:
• Searching learning application and/or learning partner that satisfies given constraints in the
system data base distributed heterogeneous server hosts;
• Forming the virtual learning structures (agents’ coalition) to implement specific leaning task.
To the agents assigned not only searching and placement information tasks, but also analysis
and processing functions. The agent provides the gathered and formed information to its
owner to make a decision.
After generating a new agent in the system, the information about him and his owner will be
registered in the appropriate system registry. At the time of generating control agent assigned to
each new mobile agent unique identifier and name that will be registered in the agents name
server, and determined the public key for agents data encryption and decryption, private (secret)
key generated by the agent themselves at the registration moment in the system. The public key
is known only by agent manager from the native system host (node) where the mobile agent was
created. Having passed the registration stage created agent starts interacting with other agents
within the agent-based representation of the host where it was generated, the agent begins
improve its knowledge about the system, exactly, the agent begins collect all available
information about already registered agents in the system, system components and virtual
learning platforms, which problem orientation coincides with the agents interests area.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
21
In the case of systems with a centralized mobile agent’s security management in an open multi-
agent virtual learning platform as shown in figure 2 is implemented on a dedicated server, which
functional structure shown in Figure 3.
E-LVE 1 E-LVE N
Internet, Lan,
WAN
MASMS
Request - Response Request - Response
………..
………..
Figure 2. Open multi-agent VLE with the centralized mobile agent’s security system management.
Agents functioning control and analysis system
System agents Public key
encryption Server
Agents Name server Special register
Registry Server
Data encryption module
Agents functioning Control and
Analysis system
Agents control system Simulation subsystem
System Monitor
Agents Destruction Manager
Agents Control Manager Agents Migration Manager
Interaction Manager
Figure 3.The functional structure of Mobile agent security server.
Security Server provides mobile agents centralized information storage about all agents in the
system, accessible hosts, virtual learning platforms, agent’s public keys which can access only the
system control agents. In the security server must be realized data encryption and decryption
module, and the system monitoring, agent’s behavior analysing and modeling in the system,
which is also available for agent control in the system. Let us consider algorithm functioning the
main components OMAVLS utilizing this approach to implement MASS, as in Figure 4.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
22
User Host Server (HS) Mobile Agent (MA) Control Agent (CA) Security Server (SS)
Register
Create MA
Inform CA
Generate Key Pair
Send PK CA
Register MA
Lunch MA
Requist
Encrypt Data MA
Query DB
Neogate with other
MA
Migration Request
Verification
Migration Point
Send Result
Confirm
Migrate To HostInform CA
Send MA id And
HS id
Verify MA id And
HS id
Send Result
Lunch MA
Requist MA PK
Send MA PK
Dencrypt Data MA
Neogate with MA
Encrypt Data MA
Query HS DB
Migrate next host
Return home
Dencrypt Data MA
Response
Generate new Key
Pair
Send new PK CA
Update PK MA
Figure 4. Algorithm interaction main components OMAVLE with centralized mobile agent security system
management.
Suppose that some mobile agent iMA plans to migrate from the virtual learning platform iVLP ,
located on the host iSH , to another virtual learning platform kVLP , which functioning on the host
kSH . iMA agent sends a request to its control agent iCA to carry out migration to kVLP on host
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
23
kSH . When the control agent iCA received a request from the agent iMA , accesses the mobile
agents security server (MASS) acts as the certifying canter lead, MASS requesting information to
verify the existence of kSH and kVLP respectively. In positive response case the control agent
iCA allows the agent iMA to carry out migration to the host kSH and initiates an agent iMA
moving process via Agents Migration Manager. At the entrance to the agent-based representation
of host kSH , is a protected memory area (the agent-based representation environment of the
receiver host), where loads the software code and migratory agent data which is accessible only
by the receiver host kSH control agents, agent iMA imposes his certificate to the control agent
kCA on platform kVLP , in which he wants to be member in. The certificate is an electronic
document that contains an agent electronic key, agent information (The mobile agent unique
identifier MAId ; The server host unique identifier (address) MPId from which he migrated, etc.),
countersignature certificate authority iCA and information about the certificate validity period.
The control agent iCA platform kVLP refers to the central mobile agent security server and checks
the information contained in the agent iMA certificate. If the agent and the host are registered in
the system, and the certificate is authentic, the agent iMA will be loaded into main memory host
kSH , and kSH host resources within the platforms kVLP address space become available for
agent iMA .
Agent iMA can gather all necessary information and can negotiate with agent belonging to host
kVLP . Otherwise, the agent iMA will be blocked, and the access to all resources kSH host will be
prohibited. However, the control agent iCA puts the agent iMA in "black list" and informs all
known agents about presence "foreign" agent in the system.
Since all the operated data by agent iMA which encrypted with private key and unknown to any
agent within the node kSH , the control agent iCA accesses the mobile agent security server and
requests the public key to decrypt the agent iMA data, searching is carried out by agent ID IdMA .
After receiving the public key and decrypt agent iMA data, the agent data become available to all
agents in platform kVLP . Before entering the agent iMA into the node kVLP The control agent iCA
provides it with needed information about all the agents operating within platform kVLP , thereby
the agent iMA knowledge about the system already replenished. After returning agent iMA to his
"native" host, it generates a new key pair ,( )MA MAi i
Sk Pk , and its control agent iCA updates its
public key, which is stored on the mobile agent security server.
In the case of decentralized mobile agents security system management figure 5 MASS in open
multi-agent virtual learning environment was implemented on each server node of the system
(portals), where users register their learning requisites. With this solution, MASS is part of the
agent-based representation on the server node and performs a similar function as the mobile
agents security server: stores information about agents in the system, available hosts, virtual
learning platforms, agents public key which can access only the system control agent,
implementing procedures of agents data encryption and decryption, monitoring, analysing and
modeling agents behavior in the system. Consider the functional structure of mobile agent
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
24
security host figure 6 and the main components interaction principles of OMAVLS with this
implementation approach MASS figure 7.
E-LVE 1 E-LVE N
E-LVE 2
Internet, Lan,
WAN
Request - Response Request - Response
Request - Response
Figure 5.Open multi-agent VLE with the decentralized mobile agent’s security c system.
Agents functioning control and analysis system
System agents Public key
encryption Server
Agents Name server Special register
Registry Server
Data encryption module
Agents functioning Control and
Analysis system
Agents control system Simulation subsystem
System Monitor
Agents Destruction Manager
Agents Control Manager Agents Migration Manager
Interaction Manager
Figure 6. The functional structure of Mobile agent security host.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
25
User Host Server (HS) Mobile Agent (MA) Control Agent (CA) Security system Host
Register
Create MA
Inform CA
Generate Key Pair
Send PK CA
Register MA
Lunch MA
Requist
Encrypt Data MA
Query DB
Neogatiate with
other MA
Migration Request
Verification
Migration Point
Send Result
Confirm
Migrate To HostInform CA
Send MA id And
HS id
Verify MA id And
HS id
Send Result
Lunch MA
Requist MA PK
Send MA PK Dencrypt Data MA
Neogate with MA
Encrypt Data MAQuery HS DB
Migrate next hostReturn home
Dencrypt Data MA
Response
Generate new Key
Pair
Send new PK CA
Update PK MA
Verify CA ID
Figure 7. Algorithm interaction main components OMAVLE with decentralize mobile agent security
system management.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
26
Suppose that some mobile agent iMA plans to migrate from the virtual learning platform iVLP ,
located on the host iSH , to another virtual learning platform kVLP , which functioning on the host
kSH . iMA agent sends a request to its control agent iCA to carry out migration to kVLP on host
kSH . When the control agent iCA received a request from the agent iMA , accesses the mobile
agents security system in agent representation, and request information to verify the existence of
kSH and kVLP respectively. In positive response case the control agent iCA allows the agent
iMA to carry out migration to the host kSH and initiates an agent iMA moving process via Agents
Migration Manager. At the entrance to the agent-based representation of host kSH , agent iMA
imposes his certificate to the control agent kCA on platform kVLP , in which he wants to be
member in. The control agent kCA on platform kVLP based on the information contained in the
certificate checks the existence of node iSH and agent iMA in the local system register and in the
MASS. If the agent and the host are registered in the system, the control agent kCA access the
control agent iCA on the host iSH from which migrated agent iMA this center acts as certificate
center, and prompting to confirm the existence of an agent iMA and the fact that he was permitted
to migrate to the host kSH . If the control agent iCA confirms the existence of agent iMA and the
fact of migration to host kSH , the control agent kCA , the agent iMA will be loaded into host kSH
main memory, and gives him access to all resources within the host kSH address space platforms
kVLP . Agent iMA can gather all necessary information and can negotiate with agent belonging to
host kVLP . Otherwise, the agent iMA will be blocked, and the access to all resources kSH host will
be prohibited. However, the control agent iCA puts the agent iMA in "black list" and informs all
known agents about presence "foreign" agent in the system.
Since all the operated data by agent iMA which encrypted with private key and unknown to any
agent within the host kSH , the control agent kCA accesses the control agent iCA and requests
the public key to decrypt the agent iMA data, control agent iCA provides agent kCA with public
key for agent iMA . After receiving the public key and decrypt agent iMA data, the agent data
become available to all agents in platform kVLP . However, the control agent kCA assigns a
special label to agent iMA and stores information about it in the agents safe registry replicated
within the system. Thus the trust level in the agent iMA by other agents increases. After returning
agent iMA to his "native" host, it generates a new key pair , )( MA MAi i
Sk Pk , and its control agent
iCA updates its public key, which is stored on the mobile agent security server.
Obviously, the implementation of the system OMAVLS with decentralized security management
improves its reliability and resistance to internal and external information security threats, and also
allows to organize effective agents and system components protection from purposeful influence
malware and spyware agents. The advantages of this embodiment of the MASS, despite the
relatively high communication channels loading and redundancy of stored data, are flexibility,
adaptability and balancing information security load between servers, system nodes and the control
agents.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
27
8. CONCLUSIONS
During the study the main challenges and threats to various kinds of information security problem-
oriented in open distributed multi-agent information systems were analyze. The modern
approaches aimed to solve problems related to ensuring agents information security and multi-
agent systems, Develop the operation principles and the general structure of information security in
OMAVLE, Propose various information security approaches in OMAVLE based on the system
implementation with centralized and decentralized security management, as well as the behaviour
simulations of their active components (agents).
The proposed approaches constitute the subsystem information security basis and implemented as
a complex programs within the e-learning activities informational support representing OMAVLE.
Mobile software agents and proposed arrangements for information security management
implemented software tools in development agents environment.
ACKNOWLEDGEMENT
The authors are grateful to the Applied Science University, Amman, Jordan, for the full financial
support granted to this research.
REFERENCES
[1] Bordini, R.H., A.E.F. Seghrouchni, and M. Dastani, Multi-agent programming: Languages, platforms
and applications. 2009: Springer.
[2] Erl, T., et al., Web service contract design and versioning for SOA. 2009: Prentice Hall.
[3] Brooks Jr, F.P., The design of design: Essays from a computer scientist. 2010: Pearson Education.
[4] Tavangarian, D., et al., Is e-learning the Solution for Individual Learning. Electronic Journal of E-
learning, 2004. 2(2): p. 273-280.
[5] Ho, W., et al., Measuring performance of virtual learning environment system in higher education.
Quality Assurance in Education, 2009. 17(1): p. 6-29.
[6] Bijani, S. and D. Robertson, A review of attacks and security approaches in open multi-agent systems.
Artificial Intelligence Review, 2012: p. 1-30.
[7] Song, H.K., et al. Application of genetic algorithm for logistics based on multi-agent system. in
Information Networking (ICOIN), 2013 International Conference on. 2013. IEEE.
[8] Sander, T. and C.F. Tschudin, Protecting mobile agents against malicious hosts, in Mobile agents and
security. 1998, Springer. p. 44-60.
[9] Guan, X., Y. Yang, and J. You. POM-a mobile agent security model against malicious hosts. in High
Performance Computing in the Asia-Pacific Region, 2000. Proceedings. The Fourth International
Conference/Exhibition on. 2000. IEEE.
[10] Page, J., A. Zaslavsky, and M. Indrawan. A buddy model of security for mobile agent communities
operating in pervasive scenarios. in ACM International Conference Proceeding Series. 2004.
[11] Ramchurn, S.D., D. Huynh, and N.R. Jennings, Trust in multi-agent systems. The Knowledge
Engineering Review, 2004. 19(1): p. 1-25.
[12] Lin, M.-H., C.-C. Chang, and Y.-R. Chen, A fair and secure mobile agent environment based on blind
signature and proxy host. Computers & Security, 2004. 23(3): p. 199-212.
[13] Van Raaij, E.M. and J.J. Schepers, The acceptance and use of a virtual learning environment in China.
Computers & Education, 2008. 50(3): p. 838-852.
[14] Kannammal, A. and N. Iyengar, A Framework for Mobile Agent Security in Distributed Agent Based
E-Business Systems. International Journal of Business and Information, 2008. 3(1): p. 129-143.
[15] Karnik, N.M. and A.R. Tripathi, Security in the Ajanta mobile agent system. Software: Practice and
Experience, 2001. 31(4): p. 301-329.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014
28
[16] Wen, G., et al., Consensus in multi‐agent systems with communication constraints. International
Journal of Robust and Nonlinear Control, 2012. 22(2): p. 170-182.
[17] Cao, Y.-y. and C. Fu. An efficient implementation of RSA digital signature algorithm. in Intelligent
Computation Technology and Automation (ICICTA), 2008 International Conference on. 2008. IEEE.
[18] Somani, U., K. Lakhani, and M. Mundra. Implementing digital signature with RSA encryption
algorithm to enhance the Data Security of cloud in Cloud Computing. in Parallel Distributed and Grid
Computing (PDGC), 2010 1st International Conference on. 2010. IEEE.
[19] Rangaswamy, A. and M. Punithkumar, New Symmetric Key Cryptographic Algorithm Using
Combined Bit Manipulation And MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm.
International Journal of Innovative Research and Development, 2013. 2(6).
Authors
Dr. Zahi A. M. Abu Sarhan Received the M.S. and PhD degrees in Computerized
Control Automated Systems and Progressive Information Technologies from Kharkov
National University of Radio Electronics, Kharkov in 1998 and 2004, respectively.
During 2004-2008, I was an Assistant Professor at the Economics and Administrative
science/ MIS Department at Applied Science University. Since 2008, I am an Assistant
Professor at the Faculty of Information technology, Applied Science University in
Jordan. Research interests include: Information system reengineering, Service oriented
architecture, software agents, agents theory, agents behavior.
As'ad Mahmoud As'ad Alnaser received a Ph.D in computer engineering from
National Technical University of Ukraine “Kyiv Polytechnic Institute”. I am currently
an assistant professor of the Department of Computer Science at Al-Balqa' Applied
University, Ajlun University College. My research areas include wireless and mobile
networks, Internet protocols, and Image processing.

Weitere ähnliche Inhalte

Was ist angesagt?

Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceSecured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceIOSR Journals
 
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...ijceronline
 
NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education IJECEIAES
 
Predicting depression using deep learning and ensemble algorithms on raw twit...
Predicting depression using deep learning and ensemble algorithms on raw twit...Predicting depression using deep learning and ensemble algorithms on raw twit...
Predicting depression using deep learning and ensemble algorithms on raw twit...IJECEIAES
 
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsCSCJournals
 
Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...IJCSIS Research Publications
 
ONTOLOGY-ORIENTED INFERENCE-BASED LEARNING CONTENT MANAGEMENT SYSTEM
ONTOLOGY-ORIENTED INFERENCE-BASED LEARNING CONTENT MANAGEMENT SYSTEMONTOLOGY-ORIENTED INFERENCE-BASED LEARNING CONTENT MANAGEMENT SYSTEM
ONTOLOGY-ORIENTED INFERENCE-BASED LEARNING CONTENT MANAGEMENT SYSTEMdannyijwest
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeCSCJournals
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidijwmn
 
Intrusion Detection/ Prevention
Intrusion Detection/ PreventionIntrusion Detection/ Prevention
Intrusion Detection/ PreventionDeris Stiawan
 
Leveraging social media for training object detectors
Leveraging social media for training object detectorsLeveraging social media for training object detectors
Leveraging social media for training object detectorsManish Kumar
 
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...Enhmandah Hemeelee
 
Nabila__proposal4.doc
Nabila__proposal4.docNabila__proposal4.doc
Nabila__proposal4.docbutest
 
Obfuscated computer virus detection using machine learning algorithm
Obfuscated computer virus detection using machine learning algorithmObfuscated computer virus detection using machine learning algorithm
Obfuscated computer virus detection using machine learning algorithmjournalBEEI
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
 
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...eraser Juan José Calderón
 
Development of Intelligent Multi-agents System for Collaborative e-learning S...
Development of Intelligent Multi-agents System for Collaborative e-learning S...Development of Intelligent Multi-agents System for Collaborative e-learning S...
Development of Intelligent Multi-agents System for Collaborative e-learning S...journalBEEI
 

Was ist angesagt? (18)

Secured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld DeviceSecured E-Learning Content on Handheld Device
Secured E-Learning Content on Handheld Device
 
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...
Learner Ontological Model for Intelligent Virtual Collaborative Learning Envi...
 
NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education NLP-based personal learning assistant for school education
NLP-based personal learning assistant for school education
 
Predicting depression using deep learning and ensemble algorithms on raw twit...
Predicting depression using deep learning and ensemble algorithms on raw twit...Predicting depression using deep learning and ensemble algorithms on raw twit...
Predicting depression using deep learning and ensemble algorithms on raw twit...
 
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning AlgorithmsA Behavior Based Intrusion Detection System Using Machine Learning Algorithms
A Behavior Based Intrusion Detection System Using Machine Learning Algorithms
 
Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...Securing Sensitive Digital Data in Educational Institutions using Encryption ...
Securing Sensitive Digital Data in Educational Institutions using Encryption ...
 
earp
earpearp
earp
 
ONTOLOGY-ORIENTED INFERENCE-BASED LEARNING CONTENT MANAGEMENT SYSTEM
ONTOLOGY-ORIENTED INFERENCE-BASED LEARNING CONTENT MANAGEMENT SYSTEMONTOLOGY-ORIENTED INFERENCE-BASED LEARNING CONTENT MANAGEMENT SYSTEM
ONTOLOGY-ORIENTED INFERENCE-BASED LEARNING CONTENT MANAGEMENT SYSTEM
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
 
An educational bluetooth quizzing application in android
An educational bluetooth quizzing application in androidAn educational bluetooth quizzing application in android
An educational bluetooth quizzing application in android
 
Intrusion Detection/ Prevention
Intrusion Detection/ PreventionIntrusion Detection/ Prevention
Intrusion Detection/ Prevention
 
Leveraging social media for training object detectors
Leveraging social media for training object detectorsLeveraging social media for training object detectors
Leveraging social media for training object detectors
 
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
 
Nabila__proposal4.doc
Nabila__proposal4.docNabila__proposal4.doc
Nabila__proposal4.doc
 
Obfuscated computer virus detection using machine learning algorithm
Obfuscated computer virus detection using machine learning algorithmObfuscated computer virus detection using machine learning algorithm
Obfuscated computer virus detection using machine learning algorithm
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
 
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...
The Path and Thinking of Education Reform Driven by Blockchain Technology Lip...
 
Development of Intelligent Multi-agents System for Collaborative e-learning S...
Development of Intelligent Multi-agents System for Collaborative e-learning S...Development of Intelligent Multi-agents System for Collaborative e-learning S...
Development of Intelligent Multi-agents System for Collaborative e-learning S...
 

Andere mochten auch

Websites to increase keek followers
Websites to increase keek followersWebsites to increase keek followers
Websites to increase keek followersmandy365
 
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS ijcsit
 
Clustering of Deep WebPages: A Comparative Study
Clustering of Deep WebPages: A Comparative StudyClustering of Deep WebPages: A Comparative Study
Clustering of Deep WebPages: A Comparative Studyijcsit
 
Websites to get more keek followers
Websites to get more keek followersWebsites to get more keek followers
Websites to get more keek followersmandy365
 
Data mining model for the data retrieval from central server configuration
Data mining model for the data retrieval from central server configurationData mining model for the data retrieval from central server configuration
Data mining model for the data retrieval from central server configurationijcsit
 
Top 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answersTop 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answersjob-interview-questions
 
Website to get more followers on keek for free
Website to get more followers on keek for freeWebsite to get more followers on keek for free
Website to get more followers on keek for freemandy365
 
A novel methodology for constructing rule based naïve bayesian classifiers
A novel methodology for constructing rule based naïve bayesian classifiersA novel methodology for constructing rule based naïve bayesian classifiers
A novel methodology for constructing rule based naïve bayesian classifiersijcsit
 
Systems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature conceptsSystems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature conceptsijcsit
 
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
T OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATELT OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATEL
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATELijcsit
 
SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES
  SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES  SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES
SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIESijcsit
 
How To Create A Scholarly Paper for Start-Up
How To Create A Scholarly Paper for Start-UpHow To Create A Scholarly Paper for Start-Up
How To Create A Scholarly Paper for Start-UpHijjaz Sutriadi
 
Whats the keek app for android
Whats the keek app for androidWhats the keek app for android
Whats the keek app for androidmandy365
 
Top 7 medical receptionist interview questions answers
Top 7 medical receptionist interview questions answersTop 7 medical receptionist interview questions answers
Top 7 medical receptionist interview questions answersjob-interview-questions
 
Analysis of key considerations of the public when choosing recreational activ...
Analysis of key considerations of the public when choosing recreational activ...Analysis of key considerations of the public when choosing recreational activ...
Analysis of key considerations of the public when choosing recreational activ...ijcsit
 
Thong tin Can ho Celadon City Tan Phu. Hotline: 0985 889 990, http://canhosai...
Thong tin Can ho Celadon City Tan Phu. Hotline: 0985 889 990, http://canhosai...Thong tin Can ho Celadon City Tan Phu. Hotline: 0985 889 990, http://canhosai...
Thong tin Can ho Celadon City Tan Phu. Hotline: 0985 889 990, http://canhosai...TTC Land
 

Andere mochten auch (18)

Websites to increase keek followers
Websites to increase keek followersWebsites to increase keek followers
Websites to increase keek followers
 
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS
SENSITIVITY ANALYSIS OF INFORMATION RETRIEVAL METRICS
 
La Reserva China
La Reserva ChinaLa Reserva China
La Reserva China
 
Clustering of Deep WebPages: A Comparative Study
Clustering of Deep WebPages: A Comparative StudyClustering of Deep WebPages: A Comparative Study
Clustering of Deep WebPages: A Comparative Study
 
Websites to get more keek followers
Websites to get more keek followersWebsites to get more keek followers
Websites to get more keek followers
 
Data mining model for the data retrieval from central server configuration
Data mining model for the data retrieval from central server configurationData mining model for the data retrieval from central server configuration
Data mining model for the data retrieval from central server configuration
 
Top 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answersTop 7 housekeeper interview questions answers
Top 7 housekeeper interview questions answers
 
Website to get more followers on keek for free
Website to get more followers on keek for freeWebsite to get more followers on keek for free
Website to get more followers on keek for free
 
A novel methodology for constructing rule based naïve bayesian classifiers
A novel methodology for constructing rule based naïve bayesian classifiersA novel methodology for constructing rule based naïve bayesian classifiers
A novel methodology for constructing rule based naïve bayesian classifiers
 
Systems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature conceptsSystems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature concepts
 
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
T OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATELT OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATEL
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
 
SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES
  SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES  SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES
SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES
 
How To Create A Scholarly Paper for Start-Up
How To Create A Scholarly Paper for Start-UpHow To Create A Scholarly Paper for Start-Up
How To Create A Scholarly Paper for Start-Up
 
Whats the keek app for android
Whats the keek app for androidWhats the keek app for android
Whats the keek app for android
 
Top 7 medical receptionist interview questions answers
Top 7 medical receptionist interview questions answersTop 7 medical receptionist interview questions answers
Top 7 medical receptionist interview questions answers
 
Analysis of key considerations of the public when choosing recreational activ...
Analysis of key considerations of the public when choosing recreational activ...Analysis of key considerations of the public when choosing recreational activ...
Analysis of key considerations of the public when choosing recreational activ...
 
YNC presentation
YNC presentationYNC presentation
YNC presentation
 
Thong tin Can ho Celadon City Tan Phu. Hotline: 0985 889 990, http://canhosai...
Thong tin Can ho Celadon City Tan Phu. Hotline: 0985 889 990, http://canhosai...Thong tin Can ho Celadon City Tan Phu. Hotline: 0985 889 990, http://canhosai...
Thong tin Can ho Celadon City Tan Phu. Hotline: 0985 889 990, http://canhosai...
 

Ähnlich wie Information Security Approach in Open Distributed Multi-Agent Virtual Learning Environments

M-Learning
M-LearningM-Learning
M-Learningbutest
 
M-Learning
M-LearningM-Learning
M-Learningbutest
 
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...IJSEA
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...CSCJournals
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...IJNSA Journal
 
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITS
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITSAN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITS
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITSijistjournal
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYIJITE
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY IJITE
 
Enhancing Mobile Learning Security
Enhancing Mobile Learning SecurityEnhancing Mobile Learning Security
Enhancing Mobile Learning SecurityIJITE
 
Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016Merlec Mpyana
 
Adapting E- learning using Multiagent System
Adapting E- learning using Multiagent SystemAdapting E- learning using Multiagent System
Adapting E- learning using Multiagent SystemAM Publications,India
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organizationMohammed Mahfouz Alhassan
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global softwareijseajournal
 
Mobile Learning Technologies
Mobile Learning TechnologiesMobile Learning Technologies
Mobile Learning TechnologiesIJAAS Team
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTUREIJCNC
 
Defending against label-flipping attacks in federated learning systems using ...
Defending against label-flipping attacks in federated learning systems using ...Defending against label-flipping attacks in federated learning systems using ...
Defending against label-flipping attacks in federated learning systems using ...IAESIJAI
 
Mobile Learning Technologies
Mobile Learning Technologies Mobile Learning Technologies
Mobile Learning Technologies IJECEIAES
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
 

Ähnlich wie Information Security Approach in Open Distributed Multi-Agent Virtual Learning Environments (20)

M-Learning
M-LearningM-Learning
M-Learning
 
M-Learning
M-LearningM-Learning
M-Learning
 
4213ijsea05
4213ijsea054213ijsea05
4213ijsea05
 
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
 
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITS
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITSAN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITS
AN OVERVIEW OF CLOUD COMPUTING FOR E-LEARNING WITH ITS KEY BENEFITS
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITYENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY ENHANCING MOBILE LEARNING SECURITY
ENHANCING MOBILE LEARNING SECURITY
 
Enhancing Mobile Learning Security
Enhancing Mobile Learning SecurityEnhancing Mobile Learning Security
Enhancing Mobile Learning Security
 
Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016
 
Adapting E- learning using Multiagent System
Adapting E- learning using Multiagent SystemAdapting E- learning using Multiagent System
Adapting E- learning using Multiagent System
 
Paper Titled Information Security in an organization
Paper Titled Information Security in an organizationPaper Titled Information Security in an organization
Paper Titled Information Security in an organization
 
820 1961-1-pb
820 1961-1-pb820 1961-1-pb
820 1961-1-pb
 
Secured cloud support for global software
Secured cloud support for global softwareSecured cloud support for global software
Secured cloud support for global software
 
Mobile Learning Technologies
Mobile Learning TechnologiesMobile Learning Technologies
Mobile Learning Technologies
 
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTUREA USER PROFILE BASED ACCESS CONTROL MODEL  AND ARCHITECTURE
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
 
Defending against label-flipping attacks in federated learning systems using ...
Defending against label-flipping attacks in federated learning systems using ...Defending against label-flipping attacks in federated learning systems using ...
Defending against label-flipping attacks in federated learning systems using ...
 
Mobile Learning Technologies
Mobile Learning Technologies Mobile Learning Technologies
Mobile Learning Technologies
 
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESAN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
 

Kürzlich hochgeladen

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 

Kürzlich hochgeladen (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 

Information Security Approach in Open Distributed Multi-Agent Virtual Learning Environments

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 DOI : 10.5121/ijcsit.2014.6102 15 Information Security Approach in Open Distributed Multi-Agent Virtual Learning Environment Dr. Zahi A.M. Abu Sarhan 1 and As'ad Mahmoud As'ad Alnaser2 1 Department of Computer Information Systems, Applied Science Private University, Amman, Jordan 2 Department of Computer Science, Al-Balqa' Applied University, Ajlun University College, Ajlun, Jordan ABSTRACT This paper presented the main information, security problems and threats in open multi-agent distributed e-learning information systems and Proposed various approaches to solve information security attacks in virtual learning environment using service oriented architecture which based on multi-agent information systems architecture, the solution on the multi-agent learning information system implementation based on the implementation of two types of systems the first system with the centralized mobile agent information security management and the second system with decentralized mobile agents security management, and proposed the migration behavior simulation for their active software components (software agents) . KEYWORDS Information security, Distributed multi-agent system, Virtual learning environment. Agent migration. 1. INTRODUCTION Relevance research in the field of distributed artificial intelligence and multi-agent systems (MAS), according to [1], on the complexity of modern organizational and technical systems, variety, tasks distribution and the huge volume information flows and critical information processing time. The theoretical researches in MAS field mainly carried out in the following areas: Agents theory, Agents collective behavior, agents and MAS architecture; methods, languages and agents communication tools, agents implementation languages; agents migration support tools within network. The greatest difficulty in theoretical studies and practical implementations of modern MAS are the issues related to agent’s information security and information resources, which they operate in open multi-agent virtual learning environments. Providing information security is an important task that must be solved when developing MAS, focused on the usage in various fields. Software agent is computer system, which is found in some environment and is capable of autonomous action in this environment in order to meet its design objectives [2]. Software agents have characteristics that make them suitable for complex functions. Such features include: autonomy, interaction, reactivity, activity, intelligence and mobility [3]. E-learning represents the use of electronic media and information and communication technological innovations in education and learning processes. E-learning is generally
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 16 comprehensive of all forms of academic technological innovation in study and education. E- learning contains various types of media that deliver text, sound, pictures, computer animation, and streaming video, and contains technology programs and procedures such as sound or movie record, computer-based learning, as well as regional intranet/extranet and web-based learning. Information and interaction systems, whether free-standing or depending on either regional networks or the Internet in networked learning, underlay many e-learning procedures [4]. E-learning can occur in or out of the classroom. It can be self-paced, asynchronous learning or may be instructor-led, synchronous learning. E-learning is suited to distance learning and flexible learning, but it can also be used in conjunction with face-to-face teaching, in such case the term blended learning is commonly used [4]. Virtual learning environments (VLE) have become a frequent tool in higher education organizations for supporting and assisting both study and education. They create a platform for instructors and students to access educational materials, read reports, interacts with others, send and receive assignments, get involved in conversations and group work. These days, there are plenty of commercial VLE techniques available in the market. Each of them offers its own features and performance [5]. 2. PROBLEMS AND INFORMATION SECURITY THREATS IN OPEN MAS Ensuring the information security problem in MAS can be presented in several ways. First, it is necessary to provide nodes protection against hidden attacks by malicious programs or spyware agents. Second, we need to protect agents themselves from exposure applications running on the network nodes. Third, it is necessary to ensure the protection MAS agents from attacks spyware agents, migrating between network nodes. The first problem can be successfully solved by using strong authentication methods executable agents code, agents program code integrity monitoring and access restrictions either by software agents, or information or services that they provide. The second problem is one of the major unsolved problems today. The reason for this is the existence of a large set of malware that can unauthorized way affect the agents operation process and manipulate the confidential information, on which the agents operate. The third problem solution based is on special security protocols which create exchanging messages between agents in multi- agent environment. Security threats in distributed MAS include: passive unauthorized message exchanging interception within communications process between agents, the integrity breach of the transmitted data over the network, unauthorized access to the data, denial of service, intercept requests with their subsequent modification and playback, the rejection of fact receiving or sending data. The decentralized nature of building distributed MAS, none single center, the components heterogeneity, the potential communication with any node make multi-agent environment maximum vulnerable to any kind of these threats [6]. 3. EXISTING INFORMATION SECURITY SOLUTIONS IN OPEN MAS Ensuring information security under consideration class of systems can be organized as complex of famous solutions. The most efficient and flexible at present solutions for agent’s information security, and MAS are: • Agents protected states method [7]; • Mobile cryptography methods [8];
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 17 • Police Office security model[9]; • Buddy Model of security for mobile agents [10]; • Methods of the organization of self-organizing systems trusting relationship [11]; • Methods based on using algorithms for confidential communications and proxy performing, the functions and limitations of restricting access to resources and services based on the methods of identification and authentication [12]. Despite such a wide range of existing solutions, none of these approaches provided a comprehensive solution of agent’s information security problems from harmful sites and spyware in open MAS. 4. MULTI-AGENT VIRTUAL LEARNING ENVIRONMENT A virtual learning environment (VLE) is a software system designed to support teaching and learning. VLEs generally function on the World Wide Web, and, therefore, they can be utilized both on and off-campus, provided that the users are authorized and can access the Internet. This surmount over the restriction of traditional face-to-face educating, and guarantees that learning is neither limited to location nor time. VLEs become more popular and included in many college organizations all over the world. It is not only because of their versatility, but also because they provide an extensive range of tools or features, such as content distribution, evaluation, emails [13]. Based on the learning process components the representation of VLE can be presented as shown in figure 1. Learner-Content Interaction Agent Techer-Content Interaction Agent Learner-Learner Interaction agent Learner-Teacher Interaction Agent Teacher-Teacher Interaction agent Content-Content Interaction agent Figure1. Virtual learning environment based on multi-agents architecture.
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 18 5. OPEN MULTI-AGENT VIRTUAL LEARNING ENVIRONMENT STRUCTURE AND FORMAL REPRESENTATION The main part of this work focuses on solving agents information security problems. As example of ensuring information security in e-learning systems, OMAVLE (Open Multi-Agent Virtual Learning Environment). In terms of overall functioning logic e-learning has a multi-agent realization. Agent-based orientation is expressed in the fact that in its real subject e-learning activity is represented by one or more mobile software agents that represent e-Learning-activities and implement procedures for an automated search agent partners for cooperation. In general, the model OMAVLE can be assigned as a theoretic-set of relations and can be represented as the next set of sets: { } { } { } { } { } { } { }OMAS S A U VLP IR O ATTR= U U U U U U ; Where { }S - set the system users (E-Learning subjects); { }A - set of agents in the system, representing the interests of users in a virtual learning environment; { } { } { }U SH CH= U where U set of the system nodes, in which agents operate, { }SH - multiple server hosts, { }CH - multiple client hosts; { }VLP - set of virtual learning-platforms (VLP), within which the combined agents of joint activities with similar interests and goals; { }IR - set of information system resources; { }O - relations between model objects sets; { }ATTR - set of model objects attributes; There are two main types of operational agents in the system{ } { } { }A MA CA= U , where { }MA - the migrating mobile agents between network nodes; { }CA - the control agents (moderators), that operating within the VLP and coordinating the processes of mobile agents interaction and migration. On the set of objects model the following relationship, that defines the structure of OMAELS, can be defined: { } { } { } { } { } { }O SMA SHVLP MAVLP CAVLP CAMA= ∪ ∪ ∪ ∪ ; Where { } { } { }SMA S MA⊂ × - the availability relation of each virtual learning subject representative - agent; { } { } { }SHVLP SH MA⊂ × - The existence relation of each system server node of VLP; { } { } { }MAVLP MA VLP⊂ × - The existence relation of each VLP agents of joint activities with common interest areas; { } { } { }CAVLP CA VLP⊂ × The membership relation of each virtual platform with its control agent (agent-moderator);{ } { } { }CAMA CA MA⊂ × - The membership relation of each control agent from agent joint activities set that it coordinates their interaction.
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 19 Each mobile agent can be described with the following parameters set: { } { } { } { } { },MA Id Id ST D SSMPMA MA MA= ∪ ∪ ∪ Where IdMA - The mobile agent unique identifier; IdMP - The server node unique identifier from which mobile agent migrates, { }STMA - The mobile agent states set; { }DMA - data set, which mobile agent operates; { } { } { },SS C Pk Sk= ∪ - mobile agent internal security system; { }C - The set of data encryption cryptographic methods with open and/or private key; Pk - public key known only by mobile agent and its control agent (the public keys refresh rate determined by the control agent); Sk - private (secret) key known only by mobile agent (the secret key refresh rate determined by mobile agent). 6. PROBLEM SOLUTION FOR INFORMATION SECURITY IN OMAVLE Novelty of what proposed in this paper is problem solving for ensuring information security in open distributed MAS which is a combination of two approaches to the OMAVLE formation [14]. The first approach is based on the concept of a closed network lies in the development of a multi- agent virtual electronic learning environment with independent agent platforms based on the technology [15], within which agents operate with other agents that have similar interests and goals (collecting agents with the similar interests private groups), and the using of agents state protection method in order to prevent hidden malware and spyware agents attacks. Formulation VLP based on agents consensus where each agent shared information with other agents with the same interest and same goals, this virtual learning platform can be collected form single node in network or from multiple nods and this VLP begins allotted platform [16] (private group of agents with the same interests, implemented on any of the nodes in the system). The second Proposed approach, based on the idea which described in [14] which involves the implementation of an open multi-agent environment specialized software component - the mobile agents security system (MASS), providing the cryptographic techniques and mechanisms implementation to protect the system agents of various computer attacks types from malicious software, and using simulation tools for analysis, forecasting and studying the dynamic agents behavior in the system. As a simulation tool can be used system-dynamic complexes or agent-based models. For Extending Multi-Agent Security System (MASS) functionality integrated into MASS structure, developed specific software components, that provides support for inter-agent (between agents) interaction and agents self-organization, as well as implementing protection mechanisms that protect the system agents from various types of computer attacks as malware. These components include: • Registry Server; • Agents Name server; • Public key encryption Server; • Data encryption module; • Special register; • Agent Control System.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 20 Registry Server contains information about the operated system nodes, and controls the new nodes and new agent’s connections to the system. Agent Name Server collects information about all system agents. Formation and maintenance distributed agents registry carried out on the basis of their binding to the dendritic domain conceptual models. Public key encryptions Server jointly with data encryption module are the core of agent’s information security system, agents, agents representative and system nodes. It implements agent identification and authentication procedure and information cryptographic protection methods with public key. The key server stores a set of individual public keys to encrypt the information that system agents operate within each other interaction and with running applications on the network nodes. In this paper, as a data encryption with public key method proposed to use classical asymmetric key cryptographic encryption algorithm with RSA public key [17, 18] and its modifications [19]. For ensuring the integrity and confidentiality of their requests and to protect information about participations, the agents use electronic signature and known private key encryption methods. Special register contains full information about all VLP registered in the system, and their constituent agents coalitions. MASS integrates with agents control system, representing software components set that implement the agents operation and interaction internal logic, inter-agent communication protocols. 7. MULTI-AGENT SECURITY SYSTEM MANAGEMENT FUNCTIONING ALGORITHM. The study proposed two embodiments of MASSM: the first system with centralized mobile agent’s security management, and the second system with decentralized mobile agent’s security management. When a new learner connects to the system, the system generates for hem his virtual representative (mobile agent), this mobile agent acting as learner interest. The agent is generated by the server host and performed the following actions: • Searching learning application and/or learning partner that satisfies given constraints in the system data base distributed heterogeneous server hosts; • Forming the virtual learning structures (agents’ coalition) to implement specific leaning task. To the agents assigned not only searching and placement information tasks, but also analysis and processing functions. The agent provides the gathered and formed information to its owner to make a decision. After generating a new agent in the system, the information about him and his owner will be registered in the appropriate system registry. At the time of generating control agent assigned to each new mobile agent unique identifier and name that will be registered in the agents name server, and determined the public key for agents data encryption and decryption, private (secret) key generated by the agent themselves at the registration moment in the system. The public key is known only by agent manager from the native system host (node) where the mobile agent was created. Having passed the registration stage created agent starts interacting with other agents within the agent-based representation of the host where it was generated, the agent begins improve its knowledge about the system, exactly, the agent begins collect all available information about already registered agents in the system, system components and virtual learning platforms, which problem orientation coincides with the agents interests area.
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 21 In the case of systems with a centralized mobile agent’s security management in an open multi- agent virtual learning platform as shown in figure 2 is implemented on a dedicated server, which functional structure shown in Figure 3. E-LVE 1 E-LVE N Internet, Lan, WAN MASMS Request - Response Request - Response ……….. ……….. Figure 2. Open multi-agent VLE with the centralized mobile agent’s security system management. Agents functioning control and analysis system System agents Public key encryption Server Agents Name server Special register Registry Server Data encryption module Agents functioning Control and Analysis system Agents control system Simulation subsystem System Monitor Agents Destruction Manager Agents Control Manager Agents Migration Manager Interaction Manager Figure 3.The functional structure of Mobile agent security server. Security Server provides mobile agents centralized information storage about all agents in the system, accessible hosts, virtual learning platforms, agent’s public keys which can access only the system control agents. In the security server must be realized data encryption and decryption module, and the system monitoring, agent’s behavior analysing and modeling in the system, which is also available for agent control in the system. Let us consider algorithm functioning the main components OMAVLS utilizing this approach to implement MASS, as in Figure 4.
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 22 User Host Server (HS) Mobile Agent (MA) Control Agent (CA) Security Server (SS) Register Create MA Inform CA Generate Key Pair Send PK CA Register MA Lunch MA Requist Encrypt Data MA Query DB Neogate with other MA Migration Request Verification Migration Point Send Result Confirm Migrate To HostInform CA Send MA id And HS id Verify MA id And HS id Send Result Lunch MA Requist MA PK Send MA PK Dencrypt Data MA Neogate with MA Encrypt Data MA Query HS DB Migrate next host Return home Dencrypt Data MA Response Generate new Key Pair Send new PK CA Update PK MA Figure 4. Algorithm interaction main components OMAVLE with centralized mobile agent security system management. Suppose that some mobile agent iMA plans to migrate from the virtual learning platform iVLP , located on the host iSH , to another virtual learning platform kVLP , which functioning on the host kSH . iMA agent sends a request to its control agent iCA to carry out migration to kVLP on host
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 23 kSH . When the control agent iCA received a request from the agent iMA , accesses the mobile agents security server (MASS) acts as the certifying canter lead, MASS requesting information to verify the existence of kSH and kVLP respectively. In positive response case the control agent iCA allows the agent iMA to carry out migration to the host kSH and initiates an agent iMA moving process via Agents Migration Manager. At the entrance to the agent-based representation of host kSH , is a protected memory area (the agent-based representation environment of the receiver host), where loads the software code and migratory agent data which is accessible only by the receiver host kSH control agents, agent iMA imposes his certificate to the control agent kCA on platform kVLP , in which he wants to be member in. The certificate is an electronic document that contains an agent electronic key, agent information (The mobile agent unique identifier MAId ; The server host unique identifier (address) MPId from which he migrated, etc.), countersignature certificate authority iCA and information about the certificate validity period. The control agent iCA platform kVLP refers to the central mobile agent security server and checks the information contained in the agent iMA certificate. If the agent and the host are registered in the system, and the certificate is authentic, the agent iMA will be loaded into main memory host kSH , and kSH host resources within the platforms kVLP address space become available for agent iMA . Agent iMA can gather all necessary information and can negotiate with agent belonging to host kVLP . Otherwise, the agent iMA will be blocked, and the access to all resources kSH host will be prohibited. However, the control agent iCA puts the agent iMA in "black list" and informs all known agents about presence "foreign" agent in the system. Since all the operated data by agent iMA which encrypted with private key and unknown to any agent within the node kSH , the control agent iCA accesses the mobile agent security server and requests the public key to decrypt the agent iMA data, searching is carried out by agent ID IdMA . After receiving the public key and decrypt agent iMA data, the agent data become available to all agents in platform kVLP . Before entering the agent iMA into the node kVLP The control agent iCA provides it with needed information about all the agents operating within platform kVLP , thereby the agent iMA knowledge about the system already replenished. After returning agent iMA to his "native" host, it generates a new key pair ,( )MA MAi i Sk Pk , and its control agent iCA updates its public key, which is stored on the mobile agent security server. In the case of decentralized mobile agents security system management figure 5 MASS in open multi-agent virtual learning environment was implemented on each server node of the system (portals), where users register their learning requisites. With this solution, MASS is part of the agent-based representation on the server node and performs a similar function as the mobile agents security server: stores information about agents in the system, available hosts, virtual learning platforms, agents public key which can access only the system control agent, implementing procedures of agents data encryption and decryption, monitoring, analysing and modeling agents behavior in the system. Consider the functional structure of mobile agent
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 24 security host figure 6 and the main components interaction principles of OMAVLS with this implementation approach MASS figure 7. E-LVE 1 E-LVE N E-LVE 2 Internet, Lan, WAN Request - Response Request - Response Request - Response Figure 5.Open multi-agent VLE with the decentralized mobile agent’s security c system. Agents functioning control and analysis system System agents Public key encryption Server Agents Name server Special register Registry Server Data encryption module Agents functioning Control and Analysis system Agents control system Simulation subsystem System Monitor Agents Destruction Manager Agents Control Manager Agents Migration Manager Interaction Manager Figure 6. The functional structure of Mobile agent security host.
  • 11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 25 User Host Server (HS) Mobile Agent (MA) Control Agent (CA) Security system Host Register Create MA Inform CA Generate Key Pair Send PK CA Register MA Lunch MA Requist Encrypt Data MA Query DB Neogatiate with other MA Migration Request Verification Migration Point Send Result Confirm Migrate To HostInform CA Send MA id And HS id Verify MA id And HS id Send Result Lunch MA Requist MA PK Send MA PK Dencrypt Data MA Neogate with MA Encrypt Data MAQuery HS DB Migrate next hostReturn home Dencrypt Data MA Response Generate new Key Pair Send new PK CA Update PK MA Verify CA ID Figure 7. Algorithm interaction main components OMAVLE with decentralize mobile agent security system management.
  • 12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 26 Suppose that some mobile agent iMA plans to migrate from the virtual learning platform iVLP , located on the host iSH , to another virtual learning platform kVLP , which functioning on the host kSH . iMA agent sends a request to its control agent iCA to carry out migration to kVLP on host kSH . When the control agent iCA received a request from the agent iMA , accesses the mobile agents security system in agent representation, and request information to verify the existence of kSH and kVLP respectively. In positive response case the control agent iCA allows the agent iMA to carry out migration to the host kSH and initiates an agent iMA moving process via Agents Migration Manager. At the entrance to the agent-based representation of host kSH , agent iMA imposes his certificate to the control agent kCA on platform kVLP , in which he wants to be member in. The control agent kCA on platform kVLP based on the information contained in the certificate checks the existence of node iSH and agent iMA in the local system register and in the MASS. If the agent and the host are registered in the system, the control agent kCA access the control agent iCA on the host iSH from which migrated agent iMA this center acts as certificate center, and prompting to confirm the existence of an agent iMA and the fact that he was permitted to migrate to the host kSH . If the control agent iCA confirms the existence of agent iMA and the fact of migration to host kSH , the control agent kCA , the agent iMA will be loaded into host kSH main memory, and gives him access to all resources within the host kSH address space platforms kVLP . Agent iMA can gather all necessary information and can negotiate with agent belonging to host kVLP . Otherwise, the agent iMA will be blocked, and the access to all resources kSH host will be prohibited. However, the control agent iCA puts the agent iMA in "black list" and informs all known agents about presence "foreign" agent in the system. Since all the operated data by agent iMA which encrypted with private key and unknown to any agent within the host kSH , the control agent kCA accesses the control agent iCA and requests the public key to decrypt the agent iMA data, control agent iCA provides agent kCA with public key for agent iMA . After receiving the public key and decrypt agent iMA data, the agent data become available to all agents in platform kVLP . However, the control agent kCA assigns a special label to agent iMA and stores information about it in the agents safe registry replicated within the system. Thus the trust level in the agent iMA by other agents increases. After returning agent iMA to his "native" host, it generates a new key pair , )( MA MAi i Sk Pk , and its control agent iCA updates its public key, which is stored on the mobile agent security server. Obviously, the implementation of the system OMAVLS with decentralized security management improves its reliability and resistance to internal and external information security threats, and also allows to organize effective agents and system components protection from purposeful influence malware and spyware agents. The advantages of this embodiment of the MASS, despite the relatively high communication channels loading and redundancy of stored data, are flexibility, adaptability and balancing information security load between servers, system nodes and the control agents.
  • 13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 27 8. CONCLUSIONS During the study the main challenges and threats to various kinds of information security problem- oriented in open distributed multi-agent information systems were analyze. The modern approaches aimed to solve problems related to ensuring agents information security and multi- agent systems, Develop the operation principles and the general structure of information security in OMAVLE, Propose various information security approaches in OMAVLE based on the system implementation with centralized and decentralized security management, as well as the behaviour simulations of their active components (agents). The proposed approaches constitute the subsystem information security basis and implemented as a complex programs within the e-learning activities informational support representing OMAVLE. Mobile software agents and proposed arrangements for information security management implemented software tools in development agents environment. ACKNOWLEDGEMENT The authors are grateful to the Applied Science University, Amman, Jordan, for the full financial support granted to this research. REFERENCES [1] Bordini, R.H., A.E.F. Seghrouchni, and M. Dastani, Multi-agent programming: Languages, platforms and applications. 2009: Springer. [2] Erl, T., et al., Web service contract design and versioning for SOA. 2009: Prentice Hall. [3] Brooks Jr, F.P., The design of design: Essays from a computer scientist. 2010: Pearson Education. [4] Tavangarian, D., et al., Is e-learning the Solution for Individual Learning. Electronic Journal of E- learning, 2004. 2(2): p. 273-280. [5] Ho, W., et al., Measuring performance of virtual learning environment system in higher education. Quality Assurance in Education, 2009. 17(1): p. 6-29. [6] Bijani, S. and D. Robertson, A review of attacks and security approaches in open multi-agent systems. Artificial Intelligence Review, 2012: p. 1-30. [7] Song, H.K., et al. Application of genetic algorithm for logistics based on multi-agent system. in Information Networking (ICOIN), 2013 International Conference on. 2013. IEEE. [8] Sander, T. and C.F. Tschudin, Protecting mobile agents against malicious hosts, in Mobile agents and security. 1998, Springer. p. 44-60. [9] Guan, X., Y. Yang, and J. You. POM-a mobile agent security model against malicious hosts. in High Performance Computing in the Asia-Pacific Region, 2000. Proceedings. The Fourth International Conference/Exhibition on. 2000. IEEE. [10] Page, J., A. Zaslavsky, and M. Indrawan. A buddy model of security for mobile agent communities operating in pervasive scenarios. in ACM International Conference Proceeding Series. 2004. [11] Ramchurn, S.D., D. Huynh, and N.R. Jennings, Trust in multi-agent systems. The Knowledge Engineering Review, 2004. 19(1): p. 1-25. [12] Lin, M.-H., C.-C. Chang, and Y.-R. Chen, A fair and secure mobile agent environment based on blind signature and proxy host. Computers & Security, 2004. 23(3): p. 199-212. [13] Van Raaij, E.M. and J.J. Schepers, The acceptance and use of a virtual learning environment in China. Computers & Education, 2008. 50(3): p. 838-852. [14] Kannammal, A. and N. Iyengar, A Framework for Mobile Agent Security in Distributed Agent Based E-Business Systems. International Journal of Business and Information, 2008. 3(1): p. 129-143. [15] Karnik, N.M. and A.R. Tripathi, Security in the Ajanta mobile agent system. Software: Practice and Experience, 2001. 31(4): p. 301-329.
  • 14. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 1, February 2014 28 [16] Wen, G., et al., Consensus in multi‐agent systems with communication constraints. International Journal of Robust and Nonlinear Control, 2012. 22(2): p. 170-182. [17] Cao, Y.-y. and C. Fu. An efficient implementation of RSA digital signature algorithm. in Intelligent Computation Technology and Automation (ICICTA), 2008 International Conference on. 2008. IEEE. [18] Somani, U., K. Lakhani, and M. Mundra. Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing. in Parallel Distributed and Grid Computing (PDGC), 2010 1st International Conference on. 2010. IEEE. [19] Rangaswamy, A. and M. Punithkumar, New Symmetric Key Cryptographic Algorithm Using Combined Bit Manipulation And MSA Encryption Algorithm: NJJSAA Symmetric Key Algorithm. International Journal of Innovative Research and Development, 2013. 2(6). Authors Dr. Zahi A. M. Abu Sarhan Received the M.S. and PhD degrees in Computerized Control Automated Systems and Progressive Information Technologies from Kharkov National University of Radio Electronics, Kharkov in 1998 and 2004, respectively. During 2004-2008, I was an Assistant Professor at the Economics and Administrative science/ MIS Department at Applied Science University. Since 2008, I am an Assistant Professor at the Faculty of Information technology, Applied Science University in Jordan. Research interests include: Information system reengineering, Service oriented architecture, software agents, agents theory, agents behavior. As'ad Mahmoud As'ad Alnaser received a Ph.D in computer engineering from National Technical University of Ukraine “Kyiv Polytechnic Institute”. I am currently an assistant professor of the Department of Computer Science at Al-Balqa' Applied University, Ajlun University College. My research areas include wireless and mobile networks, Internet protocols, and Image processing.