Secure Multi-Agent Computations
نویسندگان
چکیده
We propose a security model for open multi-agent systems. Given a user-defined task T , we generate a group of mobile agents which realise a common functionality that solves T . Those agents cooperate with each other and build an autonomous community. Using a scheme for secure distributed computations, this community is able to perform secure computations without requiring interaction with a trusted party. To get some formal security guarantees we incorporate Canetti’s model for secure multi-party computations (see [6]) into the agent setting. Canetti’s model assumes stationary parties and so does not cover the agents’ migration process. But we will present a solution to this. Thus, we yield guarantees for code, data and execution integrity, data privacy and prevention from malicious routing.
منابع مشابه
Hybrid Approach for Secure Mobile Agent Computations
Mobile agent applications are particularly vulnerable to malicious parties and thus require more stringent security measures—benefiting greatly from schemes where cryptographic protocols are utilized. We review and analyze methods proposed for securing agent operations in the face of passive and active adversaries by means of secure multi-party computations. We examine the strengths and weaknes...
متن کاملA Multi-Agent Model for Secure and Scalable E-Business Transactions
E-business applications require not only effective security mechanisms but also sufficient system resources to make them fast and reliable. We propose an e-business model that is highly decentralized and robust against attacks. The model is well suited for distributed environments like a Grid and is based on a multi-agent system. This underlying multi-agent system relies upon a fully generic ap...
متن کاملUniversally Composable Secure Mobile Agent Computation
We study the security challenges faced by the mobile agent paradigm, where code travels and performs computations on remote hosts in an autonomous manner. We define universally composable security for mobile agent computation that is geared toward a complex networking environment where arbitrary protocol instances may be executing concurrently. Our definition provides security for all the parti...
متن کاملComputationally Sound Abstraction and Verification of Secure Multi-Party Computations
We devise an abstraction of secure multi-party computations in the applied π-calculus. Based on this abstraction, we propose a methodology to mechanically analyze the security of cryptographic protocols employing secure multi-party computations. We exemplify the applicability of our framework by analyzing the SIMAP sugar-beet double auction protocol. We finally study the computational soundness...
متن کاملA Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining
Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate com...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003