Multi-domain Public Key Infrastructure for Information Security with Use of a Multi-Agent System

  • Nilar Aye
  • Hlaing Su Khin
  • Toe Toe Win
  • Tayzar KoKo
  • MoMo Zin Than
  • Fumio Hattori
  • Kazuhiro Kuwabara
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7802)

Abstract

We propose a multi-agent based common framework for interoperability among CAs (Certificate Authorities) from multiple PKI (Public Key Infrastructure) domains to build trust and secure for electronic transactions. Most of the countries recognize PKI as a powerful technique for security services and implemented their own PKI for online user. Several trust models have been used in PKI, and achieving interoperability between them is a major issue which requires recognition of certificates from different domains in order to perform transactions confidently in a cross border application. In our system, User Agent, Trust Agent and Management Agent are created. These software agents co-operate each other for user authentication and authorization processes autonomously in multiple PKI domains within the ASEAN region to encourage the recognition of digital signature to enhance regional market. Our system intended to facilitate not only for matured e-commerce but also for individual start up entrepreneur for secure trading by taking into consideration of regional needs.

Keywords

Public Key Infrastructure (PKI) Multi-Agent System (MAS) PKI interoperability Certification Authority (CA) Digital Certificate 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Adams, C., Lloyd, S.: Understanding PKI: Concept, Standards, and Deployment Considerations, 2nd edn. Addison-Wesley (2002)Google Scholar
  2. 2.
    More, V.N.: Authentication and Authorization Models. International Journal of Computer Science and Security (IJCSS) 5(1), 72–84 (2011)MathSciNetGoogle Scholar
  3. 3.
    Zhou, H.Q., Dai, S.H.: PKI-based E-Business Security System. In: The 3rd International Conference on Innovative Computing Information and Control, ICICIC 2008 (2008)Google Scholar
  4. 4.
    Liping, H., Lei, S.: Research on Trust Model of PKI. In: Fourth International Conference on Intelligent Computation Technology and Automation, pp. 232–235 (2011)Google Scholar
  5. 5.
    Achieving PKI Interoperability, Results of the JKS-IWG Interoperability project, Japan PKI Forum, Korea PKI Forum, PKI Forum Singapore (2002) Google Scholar
  6. 6.
    Lloyd, S., Fillingham, D., Lampard, R., Orlowski, S., Weigelt, J.: CA-CA Interoperability, White Paper (March 2001)Google Scholar
  7. 7.
    Guo, Z., Okuyama, T., Marion Jr., R.F.: A New Trust Model for PKI Interoperability. In: Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services, ICAS/ICNS 2005 (2005)Google Scholar
  8. 8.
    Finin, T., Fritzson, R., McKay, D., McEntire, R.: KQML as an agent communication language. In: Proceedings of the Third International Conference on Information and Knowledge Management, CIKM 1994, pp. 456–463 (1994)Google Scholar
  9. 9.
    He, Q., Sycara, K.P., Finin, T.W.: Personal Security Agent: KQML-based PKI. In: Proceedings of the Second International Conference on Autonomous Agents, AGENTS 1998, pp. 377–384 (1998)Google Scholar
  10. 10.
    Hu, Y.J., Tang, C.W.: Agent-Oriented Public Key Infrastructure for Multi-Agent E-service. In: Palade, V., Howlett, R.J., Jain, L. C. (eds.) KES 2003. LNCS, vol. 2773, pp. 1215–1221. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Hu, Y.J.: Trusted Agent-Mediated E-Commerce Transaction Services via Digital Certificate Management. Electronic Commerce Research 3, 221–243 (2003)CrossRefGoogle Scholar
  12. 12.
    Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: Multi-Application Authentication based on Multi-Agent System. IAENG International Journal of Computer Science J 33(2), 1316–1321 (2007)Google Scholar
  13. 13.
    Fugkeaw, S., Manpanpanich, P., Juntapremjitt, S.: A Robust Sign-On Model based on Multi-Agent System and PKI. In: Proceedings of the Sixth International Conference on Networking, ICN 2007 (2007)Google Scholar
  14. 14.
    Randy, C.M., Joseph, G.T.: E-Commerce Security Issues. In: Proceedings of the 35th Hawaii International Conference on System Sciences (2002)Google Scholar
  15. 15.
    Zhang, Z., Zhang, C.: Basics of Agents and Multi-agent Systems. In: Zhang, Z., Zhang, C. (eds.) Agent-Based Hybrid Intelligent Systems. LNCS (LNAI), vol. 2938, pp. 29–39. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  16. 16.
    Yannis, L., Finin, T., Yun, P.: Agent Communication Languages: The Current Land-scape. IEEE Intelligent System 14(2), 45–52 (1999)CrossRefGoogle Scholar
  17. 17.
    Foundation for Intelligent Physical Agents: FIPA specifications, http://www.fipa.org/ (accessed October 31, 2012)
  18. 18.
    Shimaoka, M., Hastings, N., Nielsen, R.: Network Working Group Request for Comments: 5217 Category: Informational, http://www.ietf.org/rfc/rfc5217.txt (accessed November 1, 2012)
  19. 19.
    Perlman, R.: An Overview of PKI Trust Models. IEEE Network, 38–43 (November/December 1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Nilar Aye
    • 1
  • Hlaing Su Khin
    • 1
  • Toe Toe Win
    • 1
  • Tayzar KoKo
    • 1
  • MoMo Zin Than
    • 1
  • Fumio Hattori
    • 2
  • Kazuhiro Kuwabara
    • 2
  1. 1.Yatanarpon Teleport Co., LtdYangonMyanmar
  2. 2.College of Information Science and EngineeringRitsumeikan UniversityKusatsuJapan

Personalised recommendations