{"title":"基于公钥加密和水印的移动代理完整性保证","authors":"Noor-ul-Qayyum, Farooq Ahmad","doi":"10.1109/ICDIM.2008.4746769","DOIUrl":null,"url":null,"abstract":"Mobile agents are autonomous complex software entities with the ability to travel across different nodes in the network to carry out computations on behalf of the user. Although mobile agents have proven to be very useful approach for distributed computation, yet in practice there are several technical challenges involved to implement them on a large scale. Most of these challenges involve security aspect in one way or the other. Protecting mobile agents against the eavesdropping attacks by malicious hosts is considered the most difficult security problem to solve. The approach that is presented here secures the agentpsilas data against eavesdropping attacks and detects the malicious hosts. Our approach is based on public-key encryption to convert the executing host results into cipher text. The ciphered results are then represented by a dynamic watermark graph structure that aids to detect the manipulation attacks performed on the agentpsilas data by the malicious hosts. Our proposed twofold technique ensures the integrity of the agentpsilas data.","PeriodicalId":415013,"journal":{"name":"2008 Third International Conference on Digital Information Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Integrity assurance of mobile agents through public-key encryption and watermarking\",\"authors\":\"Noor-ul-Qayyum, Farooq Ahmad\",\"doi\":\"10.1109/ICDIM.2008.4746769\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Mobile agents are autonomous complex software entities with the ability to travel across different nodes in the network to carry out computations on behalf of the user. Although mobile agents have proven to be very useful approach for distributed computation, yet in practice there are several technical challenges involved to implement them on a large scale. Most of these challenges involve security aspect in one way or the other. Protecting mobile agents against the eavesdropping attacks by malicious hosts is considered the most difficult security problem to solve. The approach that is presented here secures the agentpsilas data against eavesdropping attacks and detects the malicious hosts. Our approach is based on public-key encryption to convert the executing host results into cipher text. The ciphered results are then represented by a dynamic watermark graph structure that aids to detect the manipulation attacks performed on the agentpsilas data by the malicious hosts. Our proposed twofold technique ensures the integrity of the agentpsilas data.\",\"PeriodicalId\":415013,\"journal\":{\"name\":\"2008 Third International Conference on Digital Information Management\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Third International Conference on Digital Information Management\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDIM.2008.4746769\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Conference on Digital Information Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDIM.2008.4746769","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrity assurance of mobile agents through public-key encryption and watermarking
Mobile agents are autonomous complex software entities with the ability to travel across different nodes in the network to carry out computations on behalf of the user. Although mobile agents have proven to be very useful approach for distributed computation, yet in practice there are several technical challenges involved to implement them on a large scale. Most of these challenges involve security aspect in one way or the other. Protecting mobile agents against the eavesdropping attacks by malicious hosts is considered the most difficult security problem to solve. The approach that is presented here secures the agentpsilas data against eavesdropping attacks and detects the malicious hosts. Our approach is based on public-key encryption to convert the executing host results into cipher text. The ciphered results are then represented by a dynamic watermark graph structure that aids to detect the manipulation attacks performed on the agentpsilas data by the malicious hosts. Our proposed twofold technique ensures the integrity of the agentpsilas data.