Securing Mobile Agents Through Evaluation of Encrypted Functions∗
نویسندگان
چکیده
The mobile agent technology is a new paradigm of distributed computing that can replace the conventional client-server model. However, it has not become popular due to some problems such as security. The fact that computers have complete control over all the programs makes it very hard to protect mobile agents from untrusted hosts. In this paper we propose a security approach for mobile agents, which protects mobile agents from malicious hosts. Our new approach prevents privacy attacks and integrity attacks to mobile agents from malicious hosts. Many people have proposed good security approaches, but most of them do not prevent both integrity and privacy attacks. We review a few security approaches for mobile agents, discuss their weaknesses and strengths, and propose a new approach that can fix many of their problems. One interesting approach is mobile cryptography proposed by Sander and Tschudin. It encrypts mobile agents and the encrypted mobile agents are executable without decryption. Implementing mobile cryptography requires an interesting types of cryptosystem called homomorphic encryption scheme, which allows direct computation on encrypted data, but none of such a homomorphic encryption scheme is known yet. Our new security approach is an extension of mobile cryptography, and it removes many problems found in the original idea of mobile cryptography while preserving most of the benefits. Although the original idea of mobile cryptography allowed direct computations without decryptions on encrypted mobile agents, it did not provide any practical ways of implementation due to the fact that no homomorphic encryption schemes are found for their approach. ∗This research was supported by research grants from DARPA under the contract number DMA972− 00− 1− 0001 and Air Force Research Laboratory under the contract number F30602− 02− 1− 0178. †Corresponding Author: TEL +82 31 200 3354, FAX +82 31 200 3350 Our approach provides a practical idea for implementing mobile cryptography by suggesting a hybrid method that mixes a function composition technique and a homomorphic encryption scheme that we have found. Like the original mobile cryptography, our approach will encrypt both code and data including state information in a way that enables direct computation on encrypted data without decryption. We believe that our approach is a viable and practical means to address security problems such as integrity and privacy attacks to mobile agents.
منابع مشابه
Security of mobile agents: a new concept of the integrity protection
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The proposed mechanisms not only secure the compiled program, but also the data, that can be gathered during its"journey". The oldest and the simplest methods are more concentrated on integrity of the code itself and on the detection...
متن کاملCryptographic Security for Mobile Code
This paper addresses the protection of mobile code against cheating and potentially malicious hosts. We point out that the recent approach based on computing with “encrypted functions” is limited to the case where only the code originator learns the result of the computation and the host running the code must not notice anything at all. We argue that if the host is to receive some output of the...
متن کاملTowards Securing Network Management Agent Distribution and Communication
Network Management applications using distributed software agents require secure techniques for agent distribution and communication. Although there are several popular mobile agent environments written in the Java programming language that contend to offer these functions, these packages are generally heavy weight and do not provide a framework for authenticating agent responsibilities within ...
متن کاملPreventing Attacks on Mobile Agents by Malicious Hosts
The security concerns that come with using mobile agents is the main reason why the mobile agent paradigm has not been widely adopted. A number of new security problems are introduced with the use of mobile agents. Both, the host computer that executes an agent and the agent, need security mechanisms to protect against the threats posed by malicious agents and hosts. The issue of protecting a m...
متن کاملSecure Transactions with Mobile Agents in Hostile Environments
A major problem of mobile agents is their apparent inability to authenticate transactions in hostile environments. In this paper, we consider a framework for the prevention of agent tampering without compromising the mobility or autonomy of the agent. Our approach uses encrypted functions. We present an RSA implementation which answers affirmatively the open problem on undetachable signatures o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003