Skip to main content

A Java Middleware for Guaranteeing Privacy of Distributed Tuple Spaces

  • Conference paper
  • First Online:
Scientific Engineering for Distributed Java Applications (FIDJI 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2604))

Abstract

The tuple space communication model, such as the one used in Linda, provides great flexibility for modeling concurrent, distributed and mobile processes. In a distributed setting with mobile agents, particular attention is needed for protecting sites and information. We have designed and developed a Java middleware, Klava, for implementing distributed tuple spaces and operations to support agent interaction and mobility. In this paper, we extend the Klava middleware with cryptographic primitives that enable encryption and decryption of tuple fields. We describe the actual implementation of the new primitives and provide a few examples. The proposed extension is general enough to be applied to similar Java frameworks using multiple distributed tuples spaces possibly dealing with mobility.

This work has been partially supported by EU within the FET - Global Computing initiative project MIKADO IST-2001-32222, by MIUR project NAPOLI and by Microsoft project NAPI. The funding bodies are not responsible for any use that might be made of the results presented here.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Arnold, E. Freeman, and S. Hupfer. JavaSpaces Principles, Patterns and Practice. Addison-Wesley, 1999.

    Google Scholar 

  2. K. Arnold, B. O’sullivan, R. Scheifler, J. Waldo, and A. Wollrath. The Jini Specification. Addison-Wesley, 1999.

    Google Scholar 

  3. L. Bettini. Linguistic Constructs for Object-Oriented Mobile Code Programming & their Implementations. PhD thesis, Dip. di Matematica, Università di Siena, 2003. forthcoming.

    Google Scholar 

  4. L. Bettini, R. De Nicola, and R. Pugliese. Klava: a Java package for distributed and mobile applications. Software-Practice and Experience, 32(14):1365–1394, 2002.

    Article  MATH  Google Scholar 

  5. C. Bryce, M. Oriol, and J. Vitek. A Coordination Model for Agents Based on Secure Spaces. In P. Ciancarini and A. Wolf, editors, Proc. 3rd Int. Conf. on Coordination Models and Languages, number 1594 in LNCS, pages 4–20. Springer-Verlag, 1999.

    Google Scholar 

  6. N. Busi, R. Gorrieri, R. Lucchi, and G. Zavattaro. SecSpaces: a Data-driven Coordination Model for Environments Open to Untrusted Agents. In Proc. of FOCLASA’02, ENTCS. Elsevier, 2002.

    Google Scholar 

  7. P. Ciancarini and D. Rossi. Jada-Coordination and Communication for Java Agents. In J. Vitek and C. Tschudin, editors, Mobile Object Systems-Towards the Programmable Internet, number 1222 in LNCS, pages 213–228. Springer, 1997.

    Google Scholar 

  8. R. De Nicola, G. Ferrari, and R. Pugliese. Klaim: a Kernel Language for Agents Interaction and Mobility. IEEE Transactions on Software Engineering, 24(5):315–330, 1998.

    Article  Google Scholar 

  9. D. Deugo. Choosing a Mobile Agent Messaging Model. In Proc. of ISADS 2001, pages 278–286. IEEE, 2001.

    Google Scholar 

  10. D. Ford, T. Lehman, S. McLaughry, and P. Wycko.. T Spaces. IBM Systems Journal, pages 454–474, August 1998.

    Google Scholar 

  11. D. Gelernter. Generative Communication in Linda. ACM Transactions on Programming Languages and Systems, 7(1):80–112, 1985.

    Article  MATH  Google Scholar 

  12. G. Picco, A. Murphy, and G.-C. Roman. Lime: Linda Meets Mobility. In D. Garlan, editor,Proc. ICSE’99, pages 368–377. ACM Press, 1999.

    Google Scholar 

  13. T. Sander and C. Tschudin. Protecting Mobile Agents Against Malicious Hosts. In Vigna [15].

    Google Scholar 

  14. Sun Microsystems. Java Cryptography Extension (JCE), Refence Guide, 2001.

    Google Scholar 

  15. G. Vigna, editor. Mobile Agents and Security. Number 1419in LNCS. Springer, 1998.

    Google Scholar 

  16. J. Vitek and C. Jensen, editors. Secure Internet Programming: Security Issues for Mobile and Distributed Objects, number 1603 in LNCS. Springer-Verlag, 1999.

    Google Scholar 

  17. B. Yee. A Sanctuary For Mobile Agents. In Vitek and Jensen [16], pages 261–273.

    Google Scholar 

  18. P. Zimmermann. The Official PGP User’s Guide. MIT Press, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bettini, L., De Nicola, R. (2003). A Java Middleware for Guaranteeing Privacy of Distributed Tuple Spaces. In: Guelfi, N., Astesiano, E., Reggio, G. (eds) Scientific Engineering for Distributed Java Applications. FIDJI 2002. Lecture Notes in Computer Science, vol 2604. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36520-6_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-36520-6_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00679-4

  • Online ISBN: 978-3-540-36520-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics