A Mobile Agent based Computing Model for Enhancing Privacy in Multi-party Collaborative Problem solving
نویسندگان
چکیده
Privacy is an important issue in multi-party collaborative problems that are conventionally dealt with distributed algorithms. To get the solution, the participants need to share their private information, resulting in privacy loss. Several multiagent algorithms try to reduce privacy loss by reducing the amount of shared private information among the agents. To address the privacy issue in multi-party collaborative computing, we propose a mobile agent based computing model and the architecture and functional components of a trusted agent, which is used in the proposed model. The participating mobile agents are trapped into the agent server, which is controlled by a service provider. The agents can interact locally from within the agent server platform and can utilize any algorithm to solve their problem, but are restricted to disclose any data to the outside world. A trusted service agent along with the participating agents carries out security analysis on the computational result to detect hidden personal data in it, if any, and sends the signed computational result to the users. Analytical result shows the effectiveness of the proposed mobile agent based computing model in terms of privacy protection and also shows the computational cost as compared with conventional distributed model.
منابع مشابه
Dynamic configuration and collaborative scheduling in supply chains based on scalable multi-agent architecture
Due to diversified and frequently changing demands from customers, technological advances and global competition, manufacturers rely on collaboration with their business partners to share costs, risks and expertise. How to take advantage of advancement of technologies to effectively support operations and create competitive advantage is critical for manufacturers to survive. To respond to these...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملMobile Agent Security Through Multi-Agent Cryptographic Protocols
We consider the problem of keeping sensitive data and algorithms contained in a mobile agent from discovery and exploitation by a malicious host. The focus in this paper is on rigorous techniques based on cryptographic protocols. Algesheimer, Cachin, Camenisch, and Karjoth (IEEE Security and Privacy, 2001) devised a secure agent protocol in such a setting, where agents and hosts are mutually di...
متن کاملEnhancing Privacy in Mobile Collaborative Applications By Enabling End-User Tailoring Of The Distributed Architecture
Nowadays, supporting social interaction and multi-user requirements with mobile applications becomes indispensable. Thereby, security and privacy are of major concern due to the frequent scandals related to misusage of end-users data or various threats such as different kinds of man-in-the-middle attacks based on inferring interaction traces. Preserving the end-users’ privacy, especially in mob...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کامل