Abstract
The mobile agent systems have been well known for years, but recent developments in the mobile technology (mobile phones, middleware) and the artificial intelligence created new research directions. Currently being widely used for the e-commerce and network management are entering into more personal areas of our life, e.g., booking airline tickets, doing shopping, making an appointment at the dentist. Future agents are becoming more like our representatives in the Internet than simple software. To operate efficiently in their new role they need to have the same capabilities as we do, showing their credentials when required and being anonymous when needed. Still they have to fulfill all security requirements for agent systems, including confidentiality, integrity, accountability, and availability. This paper focuses on providing mobile agents with anonymity and privacy. The proposed schemes are based on different cryptographic primitives: the secret sharing scheme and the zero-knowledge proof. The paper also includes a discussion of security of the proposed schemes.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ashley, P., Au, R., Looi, M., Seet, L.T.: Secure authorisation agent for cross-domain access control in a mobile computing environment. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 369–381. Springer, Heidelberg (2002)
Beimel, A., Dolev, S.: Buses for Anonymous Message Delivery. Journal of Cryptology 16(1), 25–39 (2003)
Berkovits, S., Guttman, J.D., Swarup, V.: Authentication for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 114–136. Springer, Heidelberg (1998)
Cachin, C., Camenisch, J., Kilian, J., Muller, J.: One-Round Secure Computation and Secure Autonomous Agents, Automata, Languages and Programming, pp. 512–523 (2000)
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)
Chan, P.K., Fan, D.W., Lee, W., Prodromidis, A.L., Stolfo, S.J., Tselepis, S.: Jam: Java agents for meta-learning over distributed databases. In: Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining (1997)
Corradi, A., Cremonini, M., Montanari, R., Stefanelli, C.: Mobile Agents Integrity for Electronic Commerce Applicatons. Information Systems 24(6), 519–533 (1999)
Guillou, L., Quisquater, J.-J.: A Practical Zero-knowledge Protocol Fitted to Security Microprocessor Minimizing both Transmission and Memory. In: Proceedings of Eurocrypt 1988, pp. 123–128. Springer, Heidelberg (1988)
Jansen, W.: Determining Privileges of Mobile Agents, NIST, http://www.nist.gov
Jansen, W., Karygiannis, T.: NIST Special Publication 800–19 – Mobile Agents Security
Chrissikopoulos, V., Katsirelos, G., Kotzanikolaou, P.: Mobile Agents for Secure Electronic Transactions. In: Mastorakis, N.E. (ed.) Recent Advances in Signal Processing and Communications, pp. 363–368. World Scientific Engineering Society (1999)
Kulesza, K., Kotulski, Z., Kulesza, K.: On Mobile Agents Anonymity; Formulating Traffic Analysis Problems. In: Advanced Computer Systems, Proceedings of the 10th International Conference, ACS 2003, Miedzyzdroje, October 22–24, pp. 15–21 (2003)
Kulesza, K., Kotulski, Z.: Decision Systems in Distributed Environments: Mobile Agents and Their Role in Modern E-Commerce. In: Lapinska, A. (ed.) Information in 21st Century Society, University of Warmia and Mazury Edition, Olsztyn, pp. 271–282 (2003) ISBN 83-89112-60-4
Margasinski, I., Szczypiorski, K.: VAST: Versatile Anonymous System for Web Users. In: Tenth International Multi-Conference on Advanced Computer Systems ACS 2003, Miedzyzdroje, Poland, October 2003. Springer, Heidelberg (2004)
Merkle, R.: Secure Communications over Insecure Channels. Communications of the ACM, 294–299 (April 1978)
Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Berlin (2003)
Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)
Reyes, A., Sanchez, E., Barba, A.: Routing Management Application Based on Mobile Agents on the INTERNET2. In: EUNICE 2000, Holland (2000)
Wangham, M.S., da Silva Fraga, J., Obelheiro, R.R.: A security scheme for mobile agent platforms in large-scale systems. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 104–116. Springer, Heidelberg (2003)
Zwierko, A., Kotulski, Z.: A new protocol for group authentication providing partial anonymity. In: NGI 2005- Proc of The First EuroNGI Conference – Traffic Engineering for the Next Generation Internet, Rome, Italy, April 18-20 (2005) (accepted)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zwierko, A., Kotulski, Z. (2005). Mobile Agents: Preserving Privacy and Anonymity. In: Bolc, L., Michalewicz, Z., Nishida, T. (eds) Intelligent Media Technology for Communicative Intelligence. IMTCI 2004. Lecture Notes in Computer Science(), vol 3490. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558637_25
Download citation
DOI: https://doi.org/10.1007/11558637_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29035-3
Online ISBN: 978-3-540-31738-8
eBook Packages: Computer ScienceComputer Science (R0)