Multi-agent Security Architecture for a Sharia Compliant E-auction

نویسندگان

  • NORLEYZA JAILANI
  • ROSSILAWATI SULAIMAN
  • ZURAIDAH ABDULLAH
چکیده

Electronic auction has introduced new processes in the way auction is conducted which require investigation to ensure compliancy to Sharia (Islamic principles that are based on Qur’an and Sunnah) rules. The use of mobile software agent in electronic auction marketplaces adds ubiquity power to the bidders. In particular it allows agents to quicker respond to local changes in auction marketplaces and make bidding strategy decisions faster than remote agents or human participants could. Nevertheless, mobile agent raises issues concerning malicious attacks from a variety of intervening sources that might alter the sensitive information it carries. A multi-agent based e-auction must fit the concept of halal trade and address the problems resulting from fraud activities in online auction. Most auction frauds such as bid shilling and bid shielding also violate Sharia transaction law. If an attacker gains information on sensitive data such as the maximum bid for the bidders, the information can be manipulated to artificially increase prices through bid shilling. A Sharia compliant e-auction must comply with Islamic business law and offer secure and trustworthy trading environment. This paper discusses findings of non-compliances to Sharia rules found in the case studies conducted on a number of major online auction systems. This paper focuses on addressing the bid shilling problem by proposing multi-agent security architecture for Sharia compliant e-auction which encompasses security protocols for mobile agent authentication and confidentiality of sensitive information. Mobile agents are used to carry bidders’ and sellers’ data. Cryptography protocol such as encryption/decryption, digital signature and hash function are used and applied on identified high and low risk data.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Linkage factors optimization of Multi-outputs of compliant mechanism using Response Surface

This paper presents a linkage factors synthesis and multi-level optimization technique for bi-stable compliant mechanism. The linkage synthesis problem is modeled as multiple level factors and responses optimization problem with constraints. The bi-stable compliant mechanism is modeled as a crank slider mechanism using pseudo-rigid-body model (PRBM). The model exerts the large deflection of fle...

متن کامل

A Comparative Study of Multi-Attribute Continuous Double Auction Mechanisms

Auctions have been as a competitive method of buying and selling valuable or rare items for a long time. Single-sided auctions in which participants negotiate on a single attribute (e.g. price) are very popular. Double auctions and negotiation on multiple attributes create more advantages compared to single-sided and single-attribute auctions. Nonetheless, this adds the complexity of the auctio...

متن کامل

Information Security Approach in Open Distributed Multi-Agent Virtual Learning Environment

This paper presented the main information, security problems and threats in open multi-agent distributed e-learning information systems and Proposed various approaches to solve information security attacks in virtual learning environment using service oriented architecture which based on multi-agent information systems architecture, the solution on the multi-agent learning information system im...

متن کامل

Nformation S Ecurity a Pproach in O Pen D Istributed M Ulti - a Gent V

This paper presented the main information, security problems and threats in open multi-agent distributed e-learning information systems and Proposed various approaches to solve information security attacks in virtual learning environment using service oriented architecture which based on multi-agent information systems architecture, the solution on the multi-agent learning information system im...

متن کامل

Considerations on Secure Fipa Compliant Agent Architecture

In the paper proposed secure architecture is FIPA compliant in the sense that every common FIPA compliant agent should be able to interact with agents having this extended architecture even not knowing the security mechanisms. On the other hand, agents demanding for security can, of course, refuse plain, non secured communication with non authenticated agents, etc. The security mechanisms can u...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014