Mobile Agents: Preserving Privacy and Anonymity
The mobile agent systems have been well known for years, but recent developments in the mobile technology (mobile phones, middleware) and the artificial intelligence created new research directions. Currently being widely used for the e-commerce and network management are entering into more personal areas of our life, e.g., booking airline tickets, doing shopping, making an appointment at the dentist. Future agents are becoming more like our representatives in the Internet than simple software. To operate efficiently in their new role they need to have the same capabilities as we do, showing their credentials when required and being anonymous when needed. Still they have to fulfill all security requirements for agent systems, including confidentiality, integrity, accountability, and availability. This paper focuses on providing mobile agents with anonymity and privacy. The proposed schemes are based on different cryptographic primitives: the secret sharing scheme and the zero-knowledge proof. The paper also includes a discussion of security of the proposed schemes.
Unable to display preview. Download preview PDF.
- 4.Cachin, C., Camenisch, J., Kilian, J., Muller, J.: One-Round Secure Computation and Secure Autonomous Agents, Automata, Languages and Programming, pp. 512–523 (2000)Google Scholar
- 6.Chan, P.K., Fan, D.W., Lee, W., Prodromidis, A.L., Stolfo, S.J., Tselepis, S.: Jam: Java agents for meta-learning over distributed databases. In: Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining (1997)Google Scholar
- 8.Guillou, L., Quisquater, J.-J.: A Practical Zero-knowledge Protocol Fitted to Security Microprocessor Minimizing both Transmission and Memory. In: Proceedings of Eurocrypt 1988, pp. 123–128. Springer, Heidelberg (1988)Google Scholar
- 9.Jansen, W.: Determining Privileges of Mobile Agents, NIST, http://www.nist.gov
- 10.Jansen, W., Karygiannis, T.: NIST Special Publication 800–19 – Mobile Agents SecurityGoogle Scholar
- 11.Chrissikopoulos, V., Katsirelos, G., Kotzanikolaou, P.: Mobile Agents for Secure Electronic Transactions. In: Mastorakis, N.E. (ed.) Recent Advances in Signal Processing and Communications, pp. 363–368. World Scientific Engineering Society (1999)Google Scholar
- 12.Kulesza, K., Kotulski, Z., Kulesza, K.: On Mobile Agents Anonymity; Formulating Traffic Analysis Problems. In: Advanced Computer Systems, Proceedings of the 10th International Conference, ACS 2003, Miedzyzdroje, October 22–24, pp. 15–21 (2003)Google Scholar
- 13.Kulesza, K., Kotulski, Z.: Decision Systems in Distributed Environments: Mobile Agents and Their Role in Modern E-Commerce. In: Lapinska, A. (ed.) Information in 21st Century Society, University of Warmia and Mazury Edition, Olsztyn, pp. 271–282 (2003) ISBN 83-89112-60-4Google Scholar
- 14.Margasinski, I., Szczypiorski, K.: VAST: Versatile Anonymous System for Web Users. In: Tenth International Multi-Conference on Advanced Computer Systems ACS 2003, Miedzyzdroje, Poland, October 2003. Springer, Heidelberg (2004)Google Scholar
- 15.Merkle, R.: Secure Communications over Insecure Channels. Communications of the ACM, 294–299 (April 1978)Google Scholar
- 17.Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)Google Scholar
- 18.Reyes, A., Sanchez, E., Barba, A.: Routing Management Application Based on Mobile Agents on the INTERNET2. In: EUNICE 2000, Holland (2000)Google Scholar
- 20.Zwierko, A., Kotulski, Z.: A new protocol for group authentication providing partial anonymity. In: NGI 2005- Proc of The First EuroNGI Conference – Traffic Engineering for the Next Generation Internet, Rome, Italy, April 18-20 (2005) (accepted)Google Scholar