Trust Model for Hybrid Security Architecture Based on Reputation for Secure Execution of Mobile Agents
نویسنده
چکیده
Mobile Agents (MA) are software programs that live in computer networks, performing their computations and moving from host to host as necessary to fulfill user goals. MA technology has gained popularity in the world of computing for various applications, but securing MAs, as they move from one machine to the other, has been the challenge that hinders full adoption of this technology by organizations. Autonomous behavior of MA and the malicious environment of the internet give rise to various important security issues related with both MA and its host. The major security threats are either threats against the hosts, or threats against the MA. MA security problem is a complex problem and require a multifold solution. This paper presents Hybrid Security Architecture (HAS) inspired by the various existing security techniques including digital signature, encryption, intrusion detections, signed agreement, trust and others. Since all are well studied and experimented techniques, paper does not discuss all in details. This paper explores the trust model based on reputation to provide security to both MA and executing host. Proposed approach divides the network into regions where a centralized component in each region is responsible to compute the Reputation Value (RV) for each incoming and outgoing MAs. Each region maintains a Local Reputation Table for MAs. A Global Reputation Table (GRT) is also maintains which only stores the information about the suspicious or malicious MAs. GRT is concern only when local data are insufficient to make decision about the trust worthiness of MA. Behavior of MA and host are watched during execution and analyzed to update their RV.
منابع مشابه
A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملCryptography Based Hybrid Security Architecture for Mobile Multi Agents
Distributed Computing is the current area of research. Many researchers are working in area of Distributed Computing and trying to find a solution for the security and other issues. In Distributed Computing the mobile agents are the very important thing. When different mobile agents work in the same environment simultaneously it becomes a very important issue. Mobile agents have automatic, pro-...
متن کاملTrust, Reputation and Quality of E-Banking Services (Case Study: Melli Bank Customers)
In today’s very competitive world gaining competitive advantage is bound to arranging products and services of companies and businesses in accordance with customers’ needs. For this purpose, gaining reputation in E-service can be quite helpful. Thus the goal of the present research is studying the effect of E-Banking Service Quality on Bank Reputation. So a coherent collection of structures wer...
متن کاملGGRA: a grouped gossip-based reputation aggregation algorithm
An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...
متن کاملA Framework for Concrete Reputation-Systems
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions about interaction. However, while trust management is a component in security decision-making, few existing reputation-based trustmanagement systems aim to provide any formal security-guarantees. We describe a mathema...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014