Secure Multi-Agent Computations

نویسندگان

  • Regine Endsuleit
  • Thilo Mie
چکیده

We propose a security model for open multi-agent systems. Given a user-defined task T , we generate a group of mobile agents which realise a common functionality that solves T . Those agents cooperate with each other and build an autonomous community. Using a scheme for secure distributed computations, this community is able to perform secure computations without requiring interaction with a trusted party. To get some formal security guarantees we incorporate Canetti’s model for secure multi-party computations (see [6]) into the agent setting. Canetti’s model assumes stationary parties and so does not cover the agents’ migration process. But we will present a solution to this. Thus, we yield guarantees for code, data and execution integrity, data privacy and prevention from malicious routing.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hybrid Approach for Secure Mobile Agent Computations

Mobile agent applications are particularly vulnerable to malicious parties and thus require more stringent security measures—benefiting greatly from schemes where cryptographic protocols are utilized. We review and analyze methods proposed for securing agent operations in the face of passive and active adversaries by means of secure multi-party computations. We examine the strengths and weaknes...

متن کامل

A Multi-Agent Model for Secure and Scalable E-Business Transactions

E-business applications require not only effective security mechanisms but also sufficient system resources to make them fast and reliable. We propose an e-business model that is highly decentralized and robust against attacks. The model is well suited for distributed environments like a Grid and is based on a multi-agent system. This underlying multi-agent system relies upon a fully generic ap...

متن کامل

Universally Composable Secure Mobile Agent Computation

We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally composable security for mobile agent computation that is geared toward a complex networking environment where arbitrary protocol instances may be executing concurrently. Our definition provides security for all the parti...

متن کامل

Computationally Sound Abstraction and Verification of Secure Multi-Party Computations

We devise an abstraction of secure multi-party computations in the applied π-calculus. Based on this abstraction, we propose a methodology to mechanically analyze the security of cryptographic protocols employing secure multi-party computations. We exemplify the applicability of our framework by analyzing the SIMAP sugar-beet double auction protocol. We finally study the computational soundness...

متن کامل

A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining

Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate com...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003