scispace - formally typeset
Open AccessJournal ArticleDOI

Multi Agent System Architecture Oriented Prometheus Methodology Design to Facilitate Security of Cloud Data Storage

Reads0
Chats0
TLDR
The main purpose of this paper is to design MAS architecture that can be used to facilitate confidentiality, correctness assurance, availability and integrity of Cloud Data Storage (CDS) or cloud data center.
Abstract
Security plays an important role in the development of Multi Agent Systems (MAS). However, a careful analysis of software development processes shows that the definition of security requirements is, usually, considered after the design of the system. This is, mainly, due to the fact that agent oriented software engineering methodologies have not integrated security concerns throughout their developing stages. Designing a team of agents that can work together toward a common goal is one of the challenges in the research area of agent-oriented software engineering. Prometheus is an agent-oriented software engineering methodology. The Prometheus Design Tool (PDT) is a graphical editor which supports the design tasks specified within the Prometheus methodology for designing agent systems. The tool propagates information where possible and ensures consistency between various parts of the design. The main purpose of this paper is to design MAS architecture that can be used to facilitate confidentiality, correctness assurance, availability and integrity of Cloud Data Storage (CDS) or cloud data center. The proposed MAS architecture includes five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA).

read more

Content maybe subject to copyright    Report

Multi agent system architecture oriented Prometheus methodology design to facilitate
security of cloud data storage
ABSTRACT
Security plays an important role in the development of Multi Agent Systems (MAS).
However, a careful analysis of software development processes shows that the definition of
security requirements is, usually, considered after the design of the system. This is, mainly,
due to the fact that agent oriented software engineering methodologies have not integrated
security concerns throughout their developing stages. Designing a team of agents that can
work together toward a common goal is one of the challenges in the research area of agent-
oriented software engineering. Prometheus is an agent-oriented software engineering
methodology. The Prometheus Design Tool (PDT) is a graphical editor which supports the
design tasks specified within the Prometheus methodology for designing agent systems. The
tool propagates information where possible and ensures consistency between various parts of
the design. The main purpose of this paper is to design MAS architecture that can be used to
facilitate confidentiality, correctness assurance, availability and integrity of Cloud Data
Storage (CDS) or cloud data center. The proposed MAS architecture includes five types of
agents: Cloud Service Provider Agent (CSPA), Cloud Data Confidentiality Agent (CDConA),
Cloud Data Correctness Agent (CDCorA), Cloud Data Availability Agent (CDAA) and
Cloud Data Integrity Agent (CDIA).
Keyword: Agent-oriented methodology; Cloud computing; Cloud data storage; Multi agent
system; Prometheus design tool; Prometheus methodology; Security
Citations
More filters
Proceedings ArticleDOI

Security framework of cloud data storage based on Multi Agent system architecture - A pilot study

TL;DR: A security framework based on MAS architecture to facilitate confidentiality, correctness assurance, availability and integrity of collaborative cloud data storage (CDS) environment is proposed and a pilot study is conducted using a questionnaire survey.
Journal ArticleDOI

A Systematic Literature Review on Secure Software Development using Feature Driven Development (FDD) Agile Model

TL;DR: Agile as discussed by the authors : Agile (Agile) is an extension of FDD (FDD) to improve the performance of the DSDM framework and has been successfully used in scrum games.
Proceedings ArticleDOI

Mapping and Analyzing Process of Cloud-based Education as a Service (CEaaS) Model for Cloud Computing Adoption in Higher Education Institutions

TL;DR: A model is proposed with a mapping matrix of its constructs based on the four dominant theories in the field of this adopted technology, the theories are: Technology-organization-environment (TOE) theory, The Fit-Viability Model (FVM), Diffusion of Innovation (DOI) Theory, and Institutional (INT) theory.
Journal ArticleDOI

Analyzing Continuance of Cloud Computing in Higher Education Institutions: Should We Stay, or Should We Go?

TL;DR: In this paper, the authors developed a conceptual framework by integrating the IS success model and the IS discontinuance model through the lens of the TOE framework, and analyzed the decision-makers of Malaysian Higher Education Institutions that have adopted CC services using Structural equation Modelling (SEM) based on Partial Least Squares (PLS).
References
More filters
Book ChapterDOI

Security ontology for annotating resources

TL;DR: The NRL Security Ontology is more comprehensive and better organized than existing security ontologies, capable of representing more types of security statements and can be applied to any electronic resource.
Proceedings ArticleDOI

A Systematic Review and Comparison of Security Ontologies

TL;DR: This paper identifies, extracting and analyzing the main proposals for security ontologies and concludes by stating their early state of development and the need of additional research efforts.
Journal ArticleDOI

MOBMAS: A methodology for ontology-based multi-agent systems development

TL;DR: This paper presents an ontology-based methodology, MOBMAS, for the analysis and design of multi-agent systems and identifies and implements the various ways in which ontologies can be used in the MAS development process and integrated into the MAS model definitions.
Journal ArticleDOI

Security in the Semantic Web using OWL

TL;DR: An ontological approach to enhancing the Semantic Web with security by providing declarative policy representation languages and ontologies together with algorithms to reason about policies.
Journal ArticleDOI

A security-aware metamodel for multi-agent systems (MAS)

TL;DR: The adopted MBS approach is underpinned by a metamodel independent of any specific methodology which allows for security considerations to be embedded within any situated agent methodology which then prescribes security considerations within its work products.
Related Papers (5)
Frequently Asked Questions (1)
Q1. What are the contributions in this paper?

The main purpose of this paper is to design MAS architecture that can be used to facilitate confidentiality, correctness assurance, availability and integrity of Cloud Data Storage ( CDS ) or cloud data center. The proposed MAS architecture includes five types of agents: Cloud Service Provider Agent ( CSPA ), Cloud Data Confidentiality Agent ( CDConA ), Cloud Data Correctness Agent ( CDCorA ), Cloud Data Availability Agent ( CDAA ) and Cloud Data Integrity Agent ( CDIA ).