A Pessimistic Approach to Trust in Mobile Agent Platforms

نویسندگان

  • Uwe G. Wilhelm
  • Sebastian Staamann
  • Levente Buttyán
چکیده

Mobile agent technologies such as Aglets 1 and Telescript2 are being deployed on the Internet to support new approaches to distributed computing. In the domain of electronic commerce, a scenario involving these technologies might consist of an agent program that searches a service for its owner by roaming the Internet and visiting the sites of various service (or product) providers. Such an agent is configured by its owner with all the relevant information to describe a desired service, the constraints on an acceptable offer, and a list of potential providers. The agent may also hold confidential information such as data for one or several payment methods to finalize a purchase. The agent should make this data available to a provider only in the event of a purchase. Even then, it should offer only data pertinent to the payment method used in the purchase. Because the agent is vulnerable while it is executing on the service provider’s execution platform, its owner must obtain some guarantees concerning the protection of the agent. Example threats from a malicious service provider include trying to obtain payment data without providing the service or trying to remove information about a better offer from the agent’s memory, thereby tricking it into accepting the malicious provider’s offer. The usual approach to protecting mobile agents is to assume that service providers are trusted principals that behave correctly.3 Although the importance of trust has long been recognized as paramount for the development of secure systems, the meaning associated with trust or a trusted principal is seldom clearly defined. In this article, we address the question of how to base trust on technical reasoning. We present a pessimistic approach to trust, which tries to prevent malicious behavior from occurring in the first place rather than correcting it after it has occurred. Our approach relies on a tamper-resistant hardware device that can be operated safely in an untrusted environment. The ideas presented here are purely conceptual and have yet to be implemented. Nevertheless, we believe that they can have important repercussions on the design of open mobile agent systems, whereby potentially everyone could become a service provider.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introducing Trusted Third Parties to the Mobile Agent Paradigm

The mobile agent paradigm gains ever more acceptance for the creation of distributed applications particularly in the domain of electronic commerce In such applications a mobile agent roams the global Internet in search of services for its owner One of the problems with this approach is that malicious service providers on the agent s itinerary can access con dential information contained in the...

متن کامل

An Authentication Protocol For Mobile Agents Using Bilinear Pairings

A mobile agent is a mobile program capable of maintaining its execution states as it migrates between different execution platforms. A key security problem in the mobile agent paradigm is that of trust: How to ensure that the past itinerary (of execution platforms) claimed by the agent is correct. This is necessary in order to establish a reasonable level of trust for the agent before granting ...

متن کامل

A Novel Solution of Mobile Agent Security:Task-Description-Based Mobile Agent

A new definition and realization of mobile agent was advanced: task-description-based mobile agent, which is a kind of data package describing the tasks needed to perform on the agent platforms. A secure mobile agent system building on this kind of mobile agent was proposed. By way of using Proxy/Manage Agency to create and dispatch agents, Java 2 security model to protect local resources and t...

متن کامل

MASS: A Mobile Agent Security Scheme for the Creation of Virtual Enterprises

This article describes a security scheme, based on cryptographic protocols and SPKI/SDSI chains of trust, for protecting agent platforms and mobile agents in large-scale distributed systems. In addition, it proposes an approach on how trust building in mobile agent-based architectures can be reinforced by using security mechanisms in the process of searching and selecting partners to create a V...

متن کامل

Security Mechanisms for Mobile Agent Platforms Based on SPKI/SDSI Chains of Trust

This work defines a security scheme, based on SPKI/SDSI chains of trust, for protecting mobile agent platforms in large-scale distributed systems. The scheme is composed by a protocol of mutual authentication, a mobile agent authenticator and a mechanism for the generation of protection domain. Due to the flexibility of the SPKI/SDSI certificate delegation infrastructures used, the proposed sch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Internet Computing

دوره 4  شماره 

صفحات  -

تاریخ انتشار 2000