Efficient Key Management Scheme for Hierarchical Access Control in Mobile Agents

نویسندگان

  • Hsing-Bai Chen
  • Chun-Wei Liao
  • Chang-Kuo Yeh
چکیده

Mobile agents have great potential for increasing the realized benefit for a variety of e-commerce applications. However, enabling the mobile agent to safely travel over the open and uncontrollable Internet is necessary to protect the contents of a mobile agent. Recently, many agent structures that manage the keys needed to provide the access control mechanism for mobile agents have been developed. Nevertheless, these structures require either large amount of mobile codes or heavy computation loads. In this paper, a lightweight key management method for hierarchical access control in mobile agent environments is proposed. This method not only provides access control for mobile agents but also reduces the agent size as well as cuts down the computations cost. Key-Words: Access control, Information security, Key management, Mobile agent

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Id-based Access Control in a Hierarchical Key Management for Mobile Agent

The related techniques and applications on e-commerce have been concerned by a great number of researchers. The use of a mobile agent, in particular, is an important breakthrough on the e-commerce applications. With the abilities of higher autonomy and mobility, a mobile agent can move freely among different execution environments, can automatically detect its resided environment, and can react...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

An Improved Key-Management Scheme for Hierarchical Access Control

Now, most institutions share the data through the Internet. With the rapid development of the Internet and the cloud storage, data-sharing becomes so easy that the data was stolen or destroyed easier than before. Therefore, accessing data should strictly control to avoid unauthorized access. In this paper, we propose the more efficient key management scheme for hierarchical access control than ...

متن کامل

Efficient Date-constraint Access Control and Key Management Scheme for Mobile Agents

A mobile agent has become a competent software nowadays because of its significant abilities. It can roam freely in different Internet environments, adapt itself to various types of online servers totally associated to the characteristics of said server, and detect its environment and automatic adaptation to the environment while executing the assigned tasks by users. Due to these competencies,...

متن کامل

An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC

In a key management scheme for hierarchy based access control, each security class having higher clearance can derive the cryptographic secret keys of its other security classes having lower clearances. In 2006 Jeng-Wang proposed an efficient scheme on access control in user hierarchy based on elliptic curve cryptosystem. Their scheme provides solution of key management efficiently for dynamic ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009