An Id-based Access Control in a Hierarchical Key Management for Mobile Agent
نویسندگان
چکیده
The related techniques and applications on e-commerce have been concerned by a great number of researchers. The use of a mobile agent, in particular, is an important breakthrough on the e-commerce applications. With the abilities of higher autonomy and mobility, a mobile agent can move freely among different execution environments, can automatically detect its resided environment, and can react itself accordingly. Besides, a mobile agent itself can complete the tasks assigned by the users. Because of these characteristics, a mobile agent becomes the most suitable application for e-commerce. However, it is always a risk to transfer confidential information over an open Internet environment. When a mobile agent roams itself among the servers over Internet or the mobile agents exchange information with each other, the users would concern whether the mobile agent was attacked by some manipulated servers or the carried confidential information is stolen or tampered by the others. All these worries make the safety of a mobile agent on the Internet be an important issue. Thus, this paper will propose a suitable and secure scheme for the mobile agent. The scheme, based on the bilinear pairing over elliptic curves, takes the concept of identity-based access control on a hierarchical key management. This paper also aims to increase improvements on the scheme presented by Volker and Mehrdad to resolve the problem of storage waste in their scheme because of storing the overlapping decryption keys of a mobile agent. From the results of the security and performance analysis in this paper, the proposed scheme is proven to protect the mobile agent in an efficient and secure way.
منابع مشابه
Efficient Key Management Scheme for Hierarchical Access Control in Mobile Agents
Mobile agents have great potential for increasing the realized benefit for a variety of e-commerce applications. However, enabling the mobile agent to safely travel over the open and uncontrollable Internet is necessary to protect the contents of a mobile agent. Recently, many agent structures that manage the keys needed to provide the access control mechanism for mobile agents have been develo...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملEfficient migration for mobile computing in distributed networks
The speed and convenience of the Internet makes it advantageous to online applications. Basing on the elliptic curve cryptosystem, this study proposes a hierarchical mobile agent framework for handling key management and access control problems between mobile agent and host. It raises the security of key management, and also controls access to distributed environment in non-specific network. Th...
متن کاملEfficient group key management for multi-privileged groups
Multi-privileged group communications containing multiple data streams have been studied in the traditional wired network environment and the Internet. With the rapid development of mobile and wireless networks and in particular mobile ad-hoc networks (MANETs), the traditional Internet has been integrated with mobile and wireless networks to form the mobile Internet. The multi-privileged group ...
متن کاملAn Overview of Group Key Management Issues in IEEE 802.16e Networks
The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...
متن کامل