Introducing Trusted Third Parties to the Mobile Agent Paradigm
نویسندگان
چکیده
The mobile agent paradigm gains ever more acceptance for the creation of distributed applications particularly in the domain of electronic commerce In such applications a mobile agent roams the global Internet in search of services for its owner One of the problems with this approach is that malicious service providers on the agent s itinerary can access con dential information contained in the agent or tamper with the agent In this article we identify trust as a major issue in this context and propose a pessimistic approach to trust that tries to prevent malicious behaviour rather than correcting it The approach relies on a trusted and tamper resistant hardware device that provides the mobile agent with the means to protect itself Finally we show that the approach is not limited to protecting the mobile agents of a user but can also be extended to protect the mobile agents of a trusted third party in order to take full advantage of the mobile agent paradigm
منابع مشابه
Secret Sharing With Trusted Third Parties Using Piggy Bank Protocol
This paper presents a new scheme to distribute secret shares using two trusted third parties to increase security and eliminate the dependency on single trusted third party. This protocol for communication between a device and two trusted third parties uses the piggy bank cryptographic paradigm. We also present a protocol to give law enforcing agencies access to sensitive information present on...
متن کاملMobile Agent Protection Mechanisms, and the Trusted Agent Proxy Server (TAPS) Architecture
Autonomous mobile agents have been purported as a promising new alternative to traditional distributed computing approaches, bringing many advantageous features. Notwithstanding this, mobile agent technology has yet to see wide deployment in open networks like the Internet. The lack of interoperability between agent systems has impaired such progress. Moreover, fears of security breaches by mal...
متن کاملThe Secure Trusted Agent Proxy Server Architecture
Concerns of malicious platform hosting of mobile agents has been a significant factor in the absence of investment in agent technologies for e-commerce in the greater Internet. However, as in other distributed systems, appropriately applying traditional distributed systems security techniques and incorporating trusted third-parties can discourage bad behaviour by remote systems. The concept and...
متن کاملDistributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks
One of the major security aspects in mobile communication networks concerns information about the localization of the (mobile) network user. This information may be protected by establishing a trusted third party that is responsible for creating suitable pseudonyms for the user identity. Distributing the maintenance of pseudonyms among n independent trusted parties allows to increase further th...
متن کاملAn Authentication Protocol For Mobile Agents Using Bilinear Pairings
A mobile agent is a mobile program capable of maintaining its execution states as it migrates between different execution platforms. A key security problem in the mobile agent paradigm is that of trust: How to ensure that the past itinerary (of execution platforms) claimed by the agent is correct. This is necessary in order to establish a reasonable level of trust for the agent before granting ...
متن کامل