Security Framework of Cloud Data Storage Based on Multi Agent System Architecture: Semantic Literature Review

The purpose of this literature review is to provide the information about illustrating the usage of Multi-Agent System (MAS) techniques that can be beneficial in cloud computing platform to facilitate security of cloud data storage (CDS) among it. MAS are often distributed and agents have proactive and reactive features which are very useful for cloud data storage security (CDSS). The architecture of the system is formed from a set of agent’s communities. This paper of literature review described on the theoretical concept and approach of a security framework as well as a MAS architecture that could be implemented in cloud platform in order to facilitate security of CDS, on how the MAS technology could be utilized in a cloud platform for serving the security that is developed by using a collaborative environment of Java Agent DEvelopment (JADE). In order to facilitate the huge amount of security, our MAS architecture offered eleven security attributes generated from four main security policies of correctness, integrity, confidentially and availability of users’ data in the cloud. This paper of literature review also describes an approach that allows us to build a security cloud platform using MAS architecture and this architecture tends to use specialized autonomous agents for specific security services and allows agents to interact to facilitate security of CDS.

[1]  A. Poggi,et al.  Multi-User and Security Support for Multi-Agent Systems , 2001, WOA.

[2]  Timothy W. Finin,et al.  Developing Secure Agent Systems Using Delegation Based Trust Management , 2002, AAMAS 2002.

[3]  Ari Juels,et al.  Pors: proofs of retrievability for large files , 2007, CCS '07.

[4]  David Wright,et al.  Towards Operational Measures of Computer Security , 1993, J. Comput. Secur..

[5]  Somesh Jha,et al.  Minimization and Reliability Analyses of Attack Graphs , 2002 .

[6]  Rusli Abdullah,et al.  A framework of multi-agent system to facilitate security of cloud data storage , 2010 .

[7]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[8]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[9]  Reza Curtmola,et al.  MR-PDP: Multiple-Replica Provable Data Possession , 2008, 2008 The 28th International Conference on Distributed Computing Systems.

[10]  George Cybenko,et al.  D'Agents: Security in a Multiple-Language, Mobile-Agent System , 1998, Mobile Agents and Security.

[11]  Daniel W. Manchala E-Commerce Trust Metrics and Models , 2000, IEEE Internet Comput..

[12]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .

[13]  José M. Vidal,et al.  Multiagent network security system using FIPA-OS , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).

[14]  Idit Keidar,et al.  Trusting the cloud , 2009, SIGA.

[15]  William J. Buchanan,et al.  An intelligent agent security intrusion system , 2002, Proceedings Ninth Annual IEEE International Conference and Workshop on the Engineering of Computer-Based Systems.

[16]  Ami Marowka,et al.  The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..

[17]  Ian T. Foster,et al.  GangSim: a simulator for grid scheduling studies , 2005, CCGrid 2005. IEEE International Symposium on Cluster Computing and the Grid, 2005..

[18]  Hovav Shacham,et al.  Compact Proofs of Retrievability , 2008, Journal of Cryptology.

[19]  Ian Foster,et al.  The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.

[20]  Aladdin Ayesh,et al.  Framework of multi-agents internet security system , 2000 .

[21]  Henri Casanova,et al.  Scheduling distributed applications: the SimGrid simulation framework , 2003, CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings..

[22]  Pierre Bieber,et al.  Design and implementation of a distributed interactive simulation security architecture , 1999, Proceedings 3rd IEEE International Workshop on Distributed Interactive Simulation and Real-Time Applications.

[23]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[24]  Paulo S. L. M. Barreto,et al.  Demonstrating data possession and uncheatable data transfer , 2006, IACR Cryptol. ePrint Arch..

[25]  Laura Painton Swiler,et al.  A graph-based network-vulnerability analysis system , 1997, S&P 1998.

[26]  Ari Juels,et al.  HAIL: a high-availability and integrity layer for cloud storage , 2009, CCS.

[27]  Denis Gracanin,et al.  Security issues in High Level Architecture based distributed simulation , 2001, Proceeding of the 2001 Winter Simulation Conference (Cat. No.01CH37304).

[28]  Edmund H. Durfee,et al.  Trends in Cooperative Distributed Problem Solving , 1989, IEEE Trans. Knowl. Data Eng..

[29]  Rajkumar Buyya,et al.  GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing , 2002, Concurr. Comput. Pract. Exp..

[30]  James E. Smith,et al.  Virtual machines - versatile platforms for systems and processes , 2005 .

[31]  Nicolas Lhuillier,et al.  FOUNDATION FOR INTELLIGENT PHYSICAL AGENTS , 2003 .

[32]  Cong Wang,et al.  Ensuring data storage security in Cloud Computing , 2009, 2009 17th International Workshop on Quality of Service.

[33]  Pedro A. C. Sousa,et al.  Dealing with Security within the DEEPSIA Project , 2002 .

[34]  Mary Baker,et al.  Auditing to Keep Online Storage Services Honest , 2007, HotOS.

[35]  Leonid Sheremetov,et al.  An authentication protocol for agent platform security manager , 2003, EFTA 2003. 2003 IEEE Conference on Emerging Technologies and Factory Automation. Proceedings (Cat. No.03TH8696).

[36]  Stuart McClure,et al.  Hacking Exposed; Network Security Secrets and Solutions , 1999 .

[37]  Michael N. Huhns,et al.  Making Agents Secure on the Semantic Web , 2002, IEEE Internet Comput..

[38]  Stefan Poslad,et al.  Towards improved trust and security in FIPA agent platforms , 2004 .

[39]  Ethan L. Miller,et al.  Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[40]  Rusli Abdullah,et al.  Formulating a security layer of cloud data storage framework based on multi agent system architecture. , 2010 .

[41]  Richard M. Fujimoto,et al.  The DoD High Level Architecture: an update , 1998, 1998 Winter Simulation Conference. Proceedings (Cat. No.98CH36274).