首页> 外文OA文献 >A security architecture for protecting dynamic components of mobile agents
【2h】

A security architecture for protecting dynamic components of mobile agents

机译:一种用于保护移动代理的动态组件的安全体系结构

摘要

New techniques,languages and paradigms have facilitated the creation of distributed applications in several areas. Perhaps the most promising paradigm is the one that incorporates the mobile agent concept. A mobile agent in a large scale network can be viewed as a software program that travels through a heterogeneous network, crossing various security domains and executing autonomously in its destination.Mobile agent technology extends the traditional network communication model by including mobile processes, which can autonomously migrate to new remote servers. This basic idea results in numerous benefits including flexible, dynamiccustomisation of the behavior of clients and servers and robust interaction over unreliable networks.In spite of its advantages, widespread adoption of the mobile agent paradigm is being delayed due to various security concerns. Currently available mechanisms for reducing the security risks of this technology do not e±ciently cover all the existing threats.Due to the characteristics of the mobile agent paradigm and the threats to which it is exposed, security mechanisms must be designed to protect both agent hosting servers and agents. Protection to agent-hosting servers' security is a reasonably well researched issue, and many viable mechanisms have been developed to address it. Protecting agents is technically more challenging and solutions to do so are far less developed. The primary added complication is that, as an agent traverses multiple servers that are trusted to different degrees, the agent's owner has no control over the behaviors of the agent-hosting servers. Consequently thehosting servers can subvert the computation of the passing agent. Since it is infeasible to enforce the remote servers to enact the security policy that may prevent the server from corrupting agent's data, cryptographic mechanisms defined by the agent's owner may be one of the feasible solutions to protect agent's data.Hence the focus of this thesis is the development and deployment of cryptographicmechanisms for securing mobile agents in an open environment.Firstly, requirements for securing mobile agents' data are presented. For a sound mobile agent application, the data in an agent that is collected from each visiting server must be provided integrity. In some applications where servers intend to keep anonymous and will reveal their identities only under certain cir-cumstances, privacy is also necessitated.Aimed at these properties, four new schemes are designed to achieve different security levels: two schemes direct at preserving integrity for the agent's data, the other two focus on attaining data privacy.There are four new security techniques designed to support these new schemes. The first one is joint keys to discourage two servers from colluding to forge a victim server's signature. The second one is recoverable key commitment to enable detection of any illegal operation of hosting servers on an agent's data. The thirdone is conditionally anonymous digital signature schemes, utilising anonymous public-key certificates, to allow any server to digitally sign a document without leaking its identity. The fourth one is servers' pseudonyms that are analogues of identities, to enable servers to be recognised as legitimate servers while their identities remain unknown to anyone. Pseudonyms can be deanonymised with the assistance of authorities. Apart from these new techniques, other mechanisms such as hash chaining relationship and mandatory verification process are adopted in the new schemes.To enable the inter-operability of these mechanisms, a security architecture is therefore developed to integrate compatible techniques to provide a generic solution for securing an agent's data. The architecture can be used independently of the particular mobile agent application under consideration. It can be used for guiding and supporting developers in the analysis of security issues during the design and implementation of services and applications based on mobile agents technology.
机译:新技术,语言和范例促进了在多个领域中分布式应用程序的创建。也许最有前途的范例是结合了移动代理概念的范例。大型网络中的移动代理可以看作是穿越异构网络,跨越各种安全域并在其目的地中自主执行的软件程序。移动代理技术通过包括移动过程来扩展了传统的网络通信模型,该过程可以自主迁移到新的远程服务器。这个基本思想带来了许多好处,包括灵活,动态地自定义客户端和服务器的行为以及在不可靠的网络上进行可靠的交互。尽管有其优点,但由于各种安全问题,移动代理范式的广泛采用仍被延迟。当前用于降低此技术安全风险的机制无法有效地涵盖所有现有威胁。由于移动代理范式的特征及其所面临的威胁,必须设计安全机制来保护两个代理托管服务器和代理。保护代理托管服务器的安全是一个经过充分研究的问题,并且已经开发出许多可行的机制来解决此问题。保护剂在技术上更具挑战性,而解决方案还远远不够。最主要的复杂之处在于,随着代理遍历不同程度受信任的多个服务器,代理的所有者无法控制代理托管服务器的行为。因此,主机服务器可以破坏通过代理的计算。由于强制实施远程服务器以实施可能阻止服务器破坏代理数据的安全策略是不可行的,因此由代理所有者定义的加密机制可能是保护代理数据的可行解决方案之一。因此,本文的重点是首先,介绍了保护移动代理数据的要求。对于健全的移动代理程序应用程序,必须提供从每个访问服务器收集的代理程序中的数据的完整性。在某些服务器打算保持匿名并仅在某些情况下才公开其身份的应用程序中,也需要隐私。针对这些属性,设计了四种新方案来实现不同的安全级别:两种方案直接维护了应用程序的完整性。代理的数据,另外两个则集中在获得数据隐私上。有四种旨在支持这些新方案的新安全技术。第一个是联合密钥,以防止两个服务器串通以伪造受害者服务器的签名。第二项是可恢复的关键承诺,以实现对代理数据上托管服务器的任何非法操作的检测。第三者是有条件的匿名数字签名方案,利用匿名的公共密钥证书,以允许任何服务器对文档进行数字签名而不会泄漏其身份。第四个是服务器的假名,类似于身份,可以使服务器在任何人都不知道其身份的情况下被识别为合法服务器。假名可以在当局的协助下被取消匿名。除了这些新技术之外,新方案还采用了其他机制,例如哈希链关系和强制验证过程。为了使这些机制具有互操作性,因此开发了一种安全体系结构,以集成兼容技术以提供通用解决方案。保护代理的数据。该体系结构可以独立于所考虑的特定移动代理应用程序使用。它可用于指导和支持开发人员在基于移动代理技术的服务和应用程序的设计和实现过程中分析安全问题。

著录项

  • 作者

    Yao Ming;

  • 作者单位
  • 年度 2004
  • 总页数
  • 原文格式 PDF
  • 正文语种 {"code":"en","name":"English","id":9}
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号