Subcategory:
Category:
Words:
438Pages:
2Views:
288To implement trust policies is a major concern while designing trusted environment In the proposed approach the trust is maintained at the initial phase when a new node joins the distributed network We have embodied the traditional security model with services as client has to authenticate before making a request We have assumed that in every organization there are some trustworthy nodes which perform coordination and management The entire system is controlled by such trustworthy central coordinator which keeps the information about all nodes including number of nodes number of resources and services present in the system The proposed approach enhances the performance of complete system by sharing the authentication workload among all other nodes To accomplish this goal we have devised an agent based system with various functionalities as monitoring the servers balancing the load of service providers and service request in case of unavailability of servers The agent system in the proposed approach has reliability autonomy reactivity proactiveness social ability and rationality features It receives the client's request checks its database for the requested service and the load status of the service providers and responds according to the status It interacts with the clients and servers and according to their requirements it behaves It has a goal directed behavior that is servicing other nodes in the system
The agent system is also designed to achieve the goal of improving the performance over time For example if agent notices the unavailability of service providers it can itself serve the client's request To maintain the trust each node is required to register itself to SuperHost which is a trustworthy system with highest trust level Registering of a node does not mean that it is authorize to obtain all the services and resources of the distributed system A client has to authenticate itself with KDC to get the reference of Agent system The agent system is another trustworthy system which is authorized by the SuperHost The security of the distributed system is enhanced by observing the activities and location of the client by SuperHost The client may be a perfidious client who has joined the distributed system and wants to occupy more and more resources and services by behaving as a group of multiple users A SuperHost system keeps the track of such clients and regulates their uncontrolled behavior 2 1 1 Features of Proposed Approach 2 1 1 1 Assumptions
A few limitations are utilized for joining the customer in the conveyed framework like customer must need to share a few assets for example processor some fundamental administrations and so on keeping in mind the end goal to get to the current assets and administrations of the conveyed framework Customer needs to illuminate about span of its accessibility in the dispersed framework to SuperHost The heap list of server is accepted as far as number of customers related with it 2 1 1 2 Load Balancing In the proposed demonstrate a specialist framework is utilized to adjust the heap of specialist organizations Specialist records the administration registries and most extreme load that a server can deal with as far as customers Operator assigns the rundown of underneath stacked servers to customer At whatever point a customer demands for an administration operator gives the references of servers as per their heap status On account of inaccessibility of server for an asked for benefit the specialist gives benefit by itself on the off chance that it has any Additionally if every one of the servers are over burden for the asked for benefit the specialist framework can assume the part of server without anyone else 2 1 1 3 Life time of Client and Server The life time of customer and server is controlled by SuperHost However the customer and server can likewise make an express taking off demand to SuperHost In the previous case at the season of joining the framework SuperHost educates customer about its life time