Abstract
Recently, several community-based systems have been developed; however, almost all such systems have been developed as Web-server-based systems. Thus, server administrator can easily eavesdrop on user communications, since they have to send/receive information through the server. Therefore, we propose multi-agent-based peer-to-peer (P2P) system wherein each peer manages his/her information and exchanges it with other peers directly. This, thus, resolves the problems posed by Web-server-based systems; however, we have to consider attacks from malicious third parties. This study designs and implements security protocols/mechanisms for a hierarchical community-based multi-agent system. Furthermore, if we consider a practical use case, we should be able to demonstrate that the proposed system can be implemented by combining it with existing security techniques for more reliable and rapid deployment. Finally, we evaluate the performance of the proposed security system and present an example application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Berket, K., Essiari, A., Muratas, A.: PKI-Based Security for Peer-to-Peer Information Sharing. In: Proc. of 4th International Conference on Peer-to-Peer Computing, pp. 45–52 (2004)
Business Mall, http://www.b-mall.ne.jp/
Detsch, A., Gaspary, L., Barcellos, M., Cavalheiro, G.: Towards a Flexible Security Framework for Peer-to-Peer based Grid Computing. In: Proc. of the 2nd workshop on Middleware for grid computing, pp. 52–56 (2004)
FIPA MAS Security white paper, http://www.fipa.org/index.html
Groove, http://www.groove.net/
GT Security (GSI), http://www.globus.org/toolkit/security/
Gunupudi, V., Tate, S.R.: SAgent: A Security Framework for JADE. In: Proc. of 5th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1116–1118 (2006)
Java Cryptography Extension (JCE), http://java.sun.com/products/jc
Jetro TTPP, https://www3.jetro.go.jp/ttppoas/indexj.html
McDonald, T., Yasinsac, A.: Application Security Models for Mobile Agent Systems. In: Proc. of International Workshop on Security and Trust Management, pp. 38–53 (2005)
Mine, T., Matsuno, D., Kogo, A., Amamiya, M.: Design and implementation of agent community based peer-to-peer information retrieval method. In: Klusch, M., Ossowski, S., Kashyap, V., Unland, R. (eds.) CIA 2004. LNCS (LNAI), vol. 3191, pp. 31–46. Springer, Heidelberg (2004)
mixi, http://mixi.jp/
Poslad, S., Calisti, M., Charlton, P.: Specifying standard security mechanisms in multi-agent systems. In: Falcone, R., Barber, S., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS, vol. 2631, pp. 227–237. Springer, Heidelberg (2003)
Project JXTA, http://www.jxta.org/
Tian, H., Zou, S., Wang, W., Cheng, S.: A group based reputation system for P2P networks. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds.) ATC 2006. LNCS, vol. 4158, pp. 342–351. Springer, Heidelberg (2006)
Tsai, J., Ma, L.: Security Modeling of Mobile Agent Systems. J. of Ubiquitous Computing and Intelligence 1, 73–85 (2007)
Wallach, D.: A survey of peer-to-peer security issues. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 253–258. Springer, Heidelberg (2003)
Zhong, G., Amamiya, S., Takahashi, K., Mine, T., Amamiya, M.: The Design and Implementation of KODAMA System. IEICE Transactions INF. & SYST. E85-D(4), 637–646 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K., Amamiya, M. (2009). Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System. In: Ghose, A., Governatori, G., Sadananda, R. (eds) Agent Computing and Multi-Agent Systems. PRIMA 2007. Lecture Notes in Computer Science(), vol 5044. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01639-4_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-01639-4_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-01638-7
Online ISBN: 978-3-642-01639-4
eBook Packages: Computer ScienceComputer Science (R0)