Advertisement

Mobile Agents: Preserving Privacy and Anonymity

  • Aneta Zwierko
  • Zbigniew Kotulski
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3490)

Abstract

The mobile agent systems have been well known for years, but recent developments in the mobile technology (mobile phones, middleware) and the artificial intelligence created new research directions. Currently being widely used for the e-commerce and network management are entering into more personal areas of our life, e.g., booking airline tickets, doing shopping, making an appointment at the dentist. Future agents are becoming more like our representatives in the Internet than simple software. To operate efficiently in their new role they need to have the same capabilities as we do, showing their credentials when required and being anonymous when needed. Still they have to fulfill all security requirements for agent systems, including confidentiality, integrity, accountability, and availability. This paper focuses on providing mobile agents with anonymity and privacy. The proposed schemes are based on different cryptographic primitives: the secret sharing scheme and the zero-knowledge proof. The paper also includes a discussion of security of the proposed schemes.

Keywords

Mobile Agent Agent System Secret Sharing Scheme Authentication Phase Agent Platform 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ashley, P., Au, R., Looi, M., Seet, L.T.: Secure authorisation agent for cross-domain access control in a mobile computing environment. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 369–381. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Beimel, A., Dolev, S.: Buses for Anonymous Message Delivery. Journal of Cryptology 16(1), 25–39 (2003)MATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Berkovits, S., Guttman, J.D., Swarup, V.: Authentication for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 114–136. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  4. 4.
    Cachin, C., Camenisch, J., Kilian, J., Muller, J.: One-Round Secure Computation and Secure Autonomous Agents, Automata, Languages and Programming, pp. 512–523 (2000)Google Scholar
  5. 5.
    Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  6. 6.
    Chan, P.K., Fan, D.W., Lee, W., Prodromidis, A.L., Stolfo, S.J., Tselepis, S.: Jam: Java agents for meta-learning over distributed databases. In: Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining (1997)Google Scholar
  7. 7.
    Corradi, A., Cremonini, M., Montanari, R., Stefanelli, C.: Mobile Agents Integrity for Electronic Commerce Applicatons. Information Systems 24(6), 519–533 (1999)CrossRefGoogle Scholar
  8. 8.
    Guillou, L., Quisquater, J.-J.: A Practical Zero-knowledge Protocol Fitted to Security Microprocessor Minimizing both Transmission and Memory. In: Proceedings of Eurocrypt 1988, pp. 123–128. Springer, Heidelberg (1988)Google Scholar
  9. 9.
    Jansen, W.: Determining Privileges of Mobile Agents, NIST, http://www.nist.gov
  10. 10.
    Jansen, W., Karygiannis, T.: NIST Special Publication 800–19 – Mobile Agents SecurityGoogle Scholar
  11. 11.
    Chrissikopoulos, V., Katsirelos, G., Kotzanikolaou, P.: Mobile Agents for Secure Electronic Transactions. In: Mastorakis, N.E. (ed.) Recent Advances in Signal Processing and Communications, pp. 363–368. World Scientific Engineering Society (1999)Google Scholar
  12. 12.
    Kulesza, K., Kotulski, Z., Kulesza, K.: On Mobile Agents Anonymity; Formulating Traffic Analysis Problems. In: Advanced Computer Systems, Proceedings of the 10th International Conference, ACS 2003, Miedzyzdroje, October 22–24, pp. 15–21 (2003)Google Scholar
  13. 13.
    Kulesza, K., Kotulski, Z.: Decision Systems in Distributed Environments: Mobile Agents and Their Role in Modern E-Commerce. In: Lapinska, A. (ed.) Information in 21st Century Society, University of Warmia and Mazury Edition, Olsztyn, pp. 271–282 (2003) ISBN 83-89112-60-4Google Scholar
  14. 14.
    Margasinski, I., Szczypiorski, K.: VAST: Versatile Anonymous System for Web Users. In: Tenth International Multi-Conference on Advanced Computer Systems ACS 2003, Miedzyzdroje, Poland, October 2003. Springer, Heidelberg (2004)Google Scholar
  15. 15.
    Merkle, R.: Secure Communications over Insecure Channels. Communications of the ACM, 294–299 (April 1978)Google Scholar
  16. 16.
    Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Berlin (2003)MATHGoogle Scholar
  17. 17.
    Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)Google Scholar
  18. 18.
    Reyes, A., Sanchez, E., Barba, A.: Routing Management Application Based on Mobile Agents on the INTERNET2. In: EUNICE 2000, Holland (2000)Google Scholar
  19. 19.
    Wangham, M.S., da Silva Fraga, J., Obelheiro, R.R.: A security scheme for mobile agent platforms in large-scale systems. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 104–116. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  20. 20.
    Zwierko, A., Kotulski, Z.: A new protocol for group authentication providing partial anonymity. In: NGI 2005- Proc of The First EuroNGI Conference – Traffic Engineering for the Next Generation Internet, Rome, Italy, April 18-20 (2005) (accepted)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Aneta Zwierko
    • 1
  • Zbigniew Kotulski
    • 1
    • 2
  1. 1.Institute of TelecommunicationsWarsaw University of Technology, Faculty of Electronics and Information Technology 
  2. 2.Institute of Fundamental Technological ResearchPolish Academy of Sciences 

Personalised recommendations