A multi-agent approach: To preserve user information privacy for a pervasive and ubiquitous environment

Abstract Cloud user’s data are getting insecure in current technological advancement. This research focuses on proposing a secure model to maintain the secrecy in a cloud environment using intelligent agent. This paper presents an intelligent model to protect user’s valuable personal data. Preserving proprietor’s data and information in cloud is one of the top most challenging missions for cloud provider. Many researches fanatical their valuable time’s to discover some technique, algorithms and protocols to solve secrecy issue and develop a full-fledged cloud computing standard structure as a newest computing to all cloud users. Some researchers came forward with cryptography technique, cyber middle wear technique, noise injection and third party layer technique to preserve privacy about data in cloud. We propose a hybrid authentication technique as an end point lock. It is a composite model coupled with an algorithm for user’s privacy preserving, which is likely to be Hash Diff Anomaly Detection and Prevention (HDAD). This algorithmic protocol acts intelligently as a privacy preserving model and technique to ensure the users data are kept more secretly and develop an endorsed trust on providers. We also explore the highest necessity to maintain the confidentiality of cloud user’s data.

[1]  Nenghai Yu,et al.  A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability , 2011, IEEE Transactions on Knowledge and Data Engineering.

[2]  Walid I. Khedr SRFID: A hash-based security scheme for low cost RFID systems , 2013 .

[3]  Dhavachelvan Ponnurangam,et al.  A survey of keyword spotting techniques for printed document images , 2010, Artificial Intelligence Review.

[4]  Li-Chen Fu,et al.  Toward Reliable Service Management in Message-Oriented Pervasive Systems , 2011, IEEE Transactions on Services Computing.

[5]  P. Dhavachelvan,et al.  HPPC-Hierarchical Petri-Net based Privacy nominal model approach for Cloud , 2012, 2012 Annual IEEE India Conference (INDICON).

[6]  Xiaohui Liang,et al.  A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs , 2012, IEEE Transactions on Intelligent Transportation Systems.

[7]  P. Dhavachelvan,et al.  Hybrid authentication technique to preserve user privacy and protection as an end point lock for the cloud service digital information , 2013, 2013 International Conference on Green High Performance Computing (ICGHPC).

[8]  Mohamed Hashem,et al.  Securing DSR with mobile agents in wireless ad hoc networks , 2011 .

[9]  Yuguang Fang,et al.  An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[10]  Kai Hwang,et al.  Trusted Cloud Computing with Secure Resources and Data Coloring , 2010, IEEE Internet Computing.

[11]  Qun Li,et al.  Snoogle: A Search Engine for Pervasive Environments , 2010, IEEE Transactions on Parallel and Distributed Systems.

[12]  Franco Zambonelli,et al.  Developing pervasive multi-agent systems with nature-inspired coordination , 2015, Pervasive Mob. Comput..

[13]  Ramachandran Baskaran,et al.  An application perspective evaluation of multi-agent system in versatile environments , 2011, Expert Syst. Appl..

[14]  T. Vengattaraman,et al.  MSRCC - Mitigation of Security Risks in Cloud Computing , 2012, ACITY.

[15]  Krishna Asawa,et al.  A secure and efficient cryptographic hash function based on NewFORK-256 , 2012 .

[16]  P. Dhavachelvan,et al.  An agent-based personalized E-learning environment: Effort prediction perspective , 2009, 2009 International Conference on Intelligent Agent & Multi-Agent Systems.

[17]  P. V. G. D. Prasad Reddy,et al.  A Threat Free Architecture for Privacy Assurance in Cloud Computing , 2011, 2011 IEEE World Congress on Services.

[18]  Majid Sarrafzadeh,et al.  Accelerometer-based on-body sensor localization for health and medical monitoring applications , 2011, Pervasive Mob. Comput..

[19]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[20]  Ramachandran Baskaran,et al.  Fewss - Framework to Evaluate the Service Suitability and Privacy in a Distributed Web Service Environment , 2014, Int. J. Model. Simul. Sci. Comput..

[21]  Mohamed M. Abd-Eldayem A proposed security technique based on watermarking and encryption for digital imaging and communications in medicine , 2013 .

[22]  Ya-Fen Chang,et al.  Comments on a Secret-Key-Privacy-Preserving Authentication and Key Agreement Scheme , 2011, 2011 Fifth International Conference on Genetic and Evolutionary Computing.

[23]  Zoran Budimac,et al.  Radigost: Interoperable web-based multi-agent platform , 2014, J. Syst. Softw..

[24]  Reza Azmi,et al.  MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach , 2014, Eng. Appl. Artif. Intell..

[25]  Andrea Bondavalli,et al.  The HIDENETS Holistic Approach for the Analysis of Large Critical Mobile Systems , 2011, IEEE Transactions on Mobile Computing.

[26]  Mohammad Abdollahi Azgomi,et al.  A privacy preserving clustering technique for horizontally and vertically distributed datasets , 2011, Intell. Data Anal..

[27]  Mark Weiser,et al.  Some Computer Science Problems in Ubiquitous Computing , 1993 .

[28]  Ramachandran Baskaran,et al.  QoS enhancements for global replication management in peer to peer networks , 2012, Future Gener. Comput. Syst..

[29]  T. Vengattaraman,et al.  A Generic Privacy Breach Preventing Methodology for Cloud Based Web Service , 2014, Int. J. Grid High Perform. Comput..

[30]  Julian Padget,et al.  Effectiveness of qualitative and quantitative security obligations , 2015, J. Inf. Secur. Appl..

[31]  Xiaolin Gui,et al.  Design of Privacy-Preserving Cloud Storage Framework , 2010, 2010 Ninth International Conference on Grid and Cloud Computing.

[32]  T. Vengattaraman,et al.  Data privacy breach prevention framework for the cloud service , 2015, Secur. Commun. Networks.

[33]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[34]  Stathes Hadjiefthymiades,et al.  Information Dissemination between Mobile Nodes for Collaborative Context Awareness , 2011, IEEE Transactions on Mobile Computing.

[35]  Ji-Feng Zhang,et al.  Distributed practical output tracking of high-order stochastic multi-agent systems with inherent nonlinear drift and diffusion terms , 2014, Autom..

[36]  Tarik Taleb,et al.  A Novel Middleware Solution to Improve Ubiquitous Healthcare Systems Aided by Affective Information , 2010, IEEE Transactions on Information Technology in Biomedicine.

[37]  Ramachandran Baskaran,et al.  A Privacy Preserving Representation for Web Service Communicators' in the Cloud , 2013, QSHINE.

[38]  Hassan H. Soliman,et al.  A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks , 2012 .

[39]  Li Cui,et al.  EasiTia: A Pervasive Traffic Information Acquisition System Based on Wireless Sensor Networks , 2011, IEEE Transactions on Intelligent Transportation Systems.

[40]  Laurence T. Yang,et al.  Enhancing Battery Efficiency for Pervasive Health-Monitoring Systems Based on Electronic Textiles , 2010, IEEE Transactions on Information Technology in Biomedicine.

[41]  C. Chellappan,et al.  Performance analysis of mobile agent failure recovery in e-service applications , 2010, Comput. Stand. Interfaces.