Methods of Protecting the Distributed Computation in Multi-Agent System

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Currently, there are many different approaches for organization of the distributed calculations in computer network technology grid, metacomputing (BOINC, PVM, and others).  The main drawback of most existing approaches is that they are designed to create centralized distributed computing systems. In this article we propose to organize the solution of such problems as multivariate modeling, through the creation of distributed computations in computer networks based on decentralized multi-agent system. When used as a computing environment a computer network on a large scale can cause threats to the security of distributed computing from the intruders. One of these threats is getting the calculation about the result by the attacker. A false result can leads in the modeling process to adopt is not optimal or wrong decisions. We developed a method of protecting distributed computing from the threat of receiving false result.

     

     


  • Keywords


    distributed computing; multi-agent system; protection of results of calculations.

  • References


      [1] Madkour A, Eassa F, Ali A, and Qayyum N. Mobile-Agent-Based Systems Against Malicious Hosts, World Applied Sciences Journal, 2014, 2(29):287–297

      [2] Muñoz A, Pablo A, and Maña A. Multiagent Systems Protection. Advances in Software Engineering. Article, 2011, ID 281517:9–12

      [3] Xudong G, Yiling Ya, and Yinyuan Y. POM-a mobile model against malicious hosts. Proceedings of High Performance Computing in the Asia-Pacific Region 2, 2000, 1165-1166

      [4] Ian Foster, Yong Zhao, Ioan Raicu, Shiyong Lu: Cloud Computing and Grid Computing 360-Degree Compared , http://arxiv.org/pdf/0901.0131.pdf, last accessed 2012/09/14.

      [5] Khovanskova V, Khovanskov S, and Litvinenko V. Algoritm organizacii bezopasnyh raspredelennyh vychislenij na osnove mnogoagentnoj sistemy. Izvestiya YUFU. Tekhnicheskie nauki, 2016, 10(183):146–158


 

View

Download

Article ID: 16320
 
DOI: 10.14419/ijet.v7i3.13.16320




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.