1.Abstract: relevant cloud service and it plays multiple

1.Abstract: In this project, we proposed reliable agentsauthentication based cloud search engine. In our proposed method the agentclient requires service with specific functional and technical requirements.For privacy concern, we provide authentication for each agent in cloud by usingElliptic Curve Cryptography (ECC).

By using authentication id agents discoverthe cloud service based on service engine. Focused Selection Contract NetProtocol is performed to find the relevant cloud service and it plays multipleroles in cloud search engine. The similarity between the agent’s request andcloud service is computed based on service specifications and consumer serviceusing Cloud ontology. Each legitimate agent provides reliable cloud servicesfor agent clients (users).Service capability Table records the list of cloudservice and their corresponding ID and services for reliable cloud discovery.    2.Introduction:Cloudcomputing is a collection of interconnected virtual machines and it is acollection of networks and virtual systems.Cloud computing defined by NIST,such as cloud computing is a paper use model for enabiling available,convinent, on-demand network access to a shared collection of configurablecomputing resources (Examples: Networks, servers, storage, application, service)thatcan be rapidly provisioned and release with minimal management effect (or)service provided intraction.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

The characteristics of cloud computing areon-demand service, pay-per-use model, elastic capacity, self-service interface,resources are abstracted. The roots of cloud computing are Hardwarevirtualization, internet technologies, distributed computing, systemmanagement.    Openvirtualization format is providing some standards there are so many hypervisorswhere each one supports a different VM image format and the formats areincompartable withone another and creating interoperability issues in order tofessillitate packing distribution of software to be run on Vm’s. Severalvendors including Vware, IBM, CISCO, MISROSOFT, Dell, HP have deviced the openvirtualization format(OVF). It aims at begin open, secure, portable, efficientand extensable.ServiceCapability Table records the service capability of the agents and state of theagents. The states of the agents are changed dynamically, when it interactedwith other agents. The state of the agent is addressed as available,unreachable, failed and busy.

Each Consumer Agent (CA) maintains the SCT ofBroker Agent (BA). This is due to the request acceptance by broker agent fromconsumer agent then the BA subcontracts the service request to other BA. Eachbroker agent maintains the SCT of other BA with its state and location and alsomaintains the SCT of Service Provider Agent. Service agent provider maintainstwo SCTs such as, SCT of other service provider agent and the SCT of resourceagent under its administration.Inexisting method, Cloudle is designed for an agent based search engine forsupporting cloud service discovery.

If an agent requested for cloud service tocloud service provider, the similarity between the agent and service provideris compute using cloud ontology by using service specification and consumerservice. If the service is not available in the provider leads to loss ofinformation.In our proposed method, we provide authentication for each agent incloud by using Elliptic Curve Cryptography (ECC).By using authentication idagents discover the cloud service based on service engine. The relevant cloudservice is finding by the multiple role performance of the Focused SelectionContract Net Protocol (FSCNP). The similarity between the agent’s request andcloud service is computed based on service specifications and consumer serviceusing Cloud ontology. Service Capability Table is used for records the cloudservice information such as list of cloud agents, service provided by cloudagent and their corresponding ID.

Each legitimate agent provides reliable cloudservices for agent clients (users).   3.Problem Definition:In cloud servicediscovery, an agent requested for cloud service to cloud service provider, thesimilarity between the agent and service provider is compute using cloudontology by using service specification and consumer service .If the service isnot available in the provider leads to loss of information. It leads to lack ofsecurity in the cloud service system and take more time for discovering thecloud service.

4.Methodologies:4.1.Authentication:Authenticationof each agent in the cloud service system is performed by Elliptic CurveCryptography (ECC).Elliptic Curve Cryptography is based on thealgebraicstructure of elliptic curves over finite fieldand approach to public keycryptography.

ECC requires smaller keys than otherencryption, but provides equivalent security.4.2.Focused Selection Contract NetProtocol:FocusedSelection Contract Net Protocol is performed for satisfying consumer servicerequirements by selecting and subcontracting cloud resources. FSCNP performedservice selection by interacting with agents who provide relevant services tothe requirement service by playing multiple roles such as contractor andmanager.4.

3.Service Capability Table:ServiceCapability table in the cloud service system records the service capability ofagents in the cloud system and states of cloud agents such as available,unreachable, failed and busy. In agent based cloud computing, the states ofagents dynamically change when it is interact with other agents..4.4. Cloud Ontology:CloudOntology is a database of cloud services which consist of set of concepts aboutservices of agents. Cloud ontology mainly used for determining the similaritiesbetween consumer’s service requirements and provider’s service specifications.

Service Discovery Agents consults the cloud ontology and collect theinformation about similarity reasoning, compatibility reasoning and numericalreasoning.       5.Architecture:Fig.1.

cloud service discovery        6. Algorithm Description:6.1. Elliptic Curve Cryptography(ECC):Authenticationis one of the most important security mechanism used to ensure the security ofthe system. In our project, we propose Elliptic Curve Cryptography forauthentication that ensures the reliability, efficiency and resistance to alarge range of attackers.

In ECC, the session key is shared between the agentand the platform to encrypt and decrypt the message. There are three phases inECC such as initialization phase, registration phase and authentication and keyagreement phase. In initialization phase, agent chooses two random numbers andelliptic curve E (FP) over FP. Then agent generatemultiplicative group by bilinear pairing, G1×G1?G2.Nextthe agent chooses the hash function and generate random number as a secret key.

In registration phase the ID is submitted with secret key. Then the ID isverified by agent, if it is valid corresponding timestamp and ephemeral keysare generated by agent. In last phase the key is authenticated by key agreementprocess.Inour project, service reasoning is determined by cloud ontology. The degree ofsimilarity between y and z is measure the number of common features between yand z from the perspective of y as follows, Thedegree of similarity between y and z is measure the number of common featuresbetween y and z from the perspective of z as follows,FocusedSelection Contract Protocol mainly used to specify the interaction of cloudagents. The working process of FSCNP is summarized as follows, Focused selection Playing multiple roles Integrating results and dealing with failures To provide empirical results.Infocused selection an agent sends message to only relevant capability agents.

The interaction among the cloud agents in FSCNP is used to reduce the number ofexchanged messages and focuses on interacting with relevant capability agentonly.Results:7.Conclusion: In cloudenvironment, each client needs the cloud service for satisfies theirrequirements. In this way, we proposed cloud cloud searchengine with improvedsecurity by using Elliptic Curve Cryptography. In our proposed method, eachagents send cloud service requirements to cloud server. Focused SelectionContract Net Protocol is used to find the relevant capacity agent for consumerrequirements.

Cloud ontology measures the similarity between the consumer’srequirements and provider’s requirements. Service Capability Table records thecloud service information. Finally, the cloud service is discovered by agentclient using cloud service engine.     8. Future Work:Infuture, our proposed method focused on, Increasing the Privacy of the cloud service. Improves the energy efficiency of cloud service discovery process.9. References·        1 KwangMongSim, Senior Member, IEEE.

,”Agent-Based Cloud Computing” IEEETransaction on Services Computing,Vol.5,No.4,October-December2012.·        2 K.M. Sim, “Complex and ConcurrentNegotiations for Multiple Interrelated E-Markets,” IEEE Trans. Systems, Man and Cybernetics, Part B, preprint, 2012,doi:10.1109/TSMCB.

2012.2204742.·        3J.O. Gutierrez-Garcia and K.M.Sim,  “Self-Organizing Agents for ServiceComposition in Cloud Computing,” Proc.Second IEEE Int’l Conf.

Cloud Computing Technology and Science, 2010.·        4K.M. Sim, “Towards ComplexNegotiation for Cloud Economy,” Proc.Int’l Conf. Advances in Grid and Pervasive Computing (GPC ’10), R.S.

Chang etal., eds., pp. 395-406, 2010.·        5K.

M. Sim,”Agent-Based CloudCommerce,” Proc. IEEE Int’l Conf.

.Industrial Eng. and Eng. Management, pp. 717-721, 2009.·        6K.P.

Joshi, T. Finin, and Y. Yesha,”Integrated Lifecycle of IT Services in a Cloud Environment,” Proc. Third Int’l Conf. Virtual ComputingInitiative (ICVCI ’09), pp.

475-478, 2009.·        7Foster “Cloud Computing and GridComputing 360-Degree Compared,” Proc.Grid Computing Environments Workshop (GCE ’08), pp. 1-10, Nov. 2008. ·         8K.

M. Sim, “Evolving Fuzzy Rules forRelaxed-Criteria Negotiation,” IEEETrans. Systems, Man and Cybernetics, Part B, vol. 38,no. 6, pp. 1486-1500,Dec.

2008.·        9K.M. Sim, “G-Commerce, Market-DrivenG-Negotiation Agents and Grid Resource Management,” IEEE Trans.

Systems, Man and Cybernetics, Part B, vol. 36, no. 6, pp.1381-1394, Dec. 2006.

·        10K.M. Sim, “Equilibria, PrudentCompromises, and the ‘Waiting’ Game,” IEEETrans. System, Man, Cybernetics B, vol. 35, no. 4, pp.

712-724, Aug. 2005.·       11K.M. Sim and S.Y. Wang, “Flexible NegotiationAgent with Relaxed Decision Rules,” IEEETrans.

Systems, Man and Cybernetics, Part B, vol. 34, no. 3, pp. 1602-1608,June 2004.·       12K.M.

Simand C.Y. Choi, “Agents thatReact to Changing Market Situations,” IEEETrans. System, Man, Cybernetics B, vol. 33, no. 2,pp.

188-201, Apr. 2003.   

x

Hi!
I'm Mary!

Would you like to get a custom essay? How about receiving a customized one?

Check it out