An Agent System Protection Mechanism for Secure Action of Mobile Agent in Open Network Systems

Open Network 시스템에서 이동에이전트의 안전한 역할 수행을 위한 에이전트 보호메커니즘

  • Published : 2002.04.01

Abstract

In the resent years, the term mobile agent is probably one of the most overused words in many appliable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very different meanings in the area of artificial intelligence, network management, or distributed systems. However, the use of mobile agent adds significant problems, primarily in the area of EC/EDI. Therefore it is very important to control the roaming agents to keep one's privacy or property in distributed open networks. The surge in secure intranets for commercial applications provides a robust, secure environment to which trading partners can increasingly entrust their interactions to some mobile agents. In this paper, we introduce a mechanism to protect mobile agent itself from the malicious server he is visiting and also we introduce a mechanism to protect vital resources of the open systems as internet.

최근 몇 년간 이동에이전트는 분산시스템의 전자상거래와 전자데이터의 교환과 인공지능, 네트웍관리와 같은 여러 응용분야에서 많이 이용되고 있는 분야중 하나이다. 특히 EC/EDI의 영역에서 본래의 이동에이전트 서명 문제를 추가하여 사용되어야 한다. 그러므로 분산네트웍에서 이동하는 에이전트의 프라이버시와 속성을 보호하는 것은 매우 중요하다. 상거래에 응용되기 위해서는 각각의 이동에이전트들 상호간에 거래의 신뢰성을 향상할 수 있는 안전한 인트라넷 환경이 필요하다. 본 연구에서는 이동에이전트를 악의적인 서버로부터 이동에이전트를 자신을 보호하고 인터넷과 같은 오픈시스템의 자원들을 보호하는 안전한 이동에이전트 역할을 수행하도록 하는 에이전트 보호 메커니즘을 설계하여 신뢰하는 실행환경을 제안한다.

Keywords

References

  1. B.C. Neuman. proxy-based authorization and accounting for distributed systems. In Proceedings of the Thirteenth International Conference on Distributed Computing Systems, pages 283-291, May 1993
  2. Colin G. Harrison, David M. Chess, and Aaron Kershen, baum. Mobile Agents: Are they a good idea? Technical report, IBM Research Division, T.J.Watson Research Center, March 1995. http://www.research.ibm.com/massdist/mobag.ps
  3. Dag Johansen, Robbert van Renesse, and Fred B. Schneider. Operating System Support for Mobile Agents. In Proceedings of the 5th IEEE Workshop on Hot Topics in Operating Systems, pages 42-45, May 1995
  4. H. Van Dyke Parunak. Practical and Industrial Applications of Agent-Based Systems. http://www.iti.org/, Industrial Technology Institute, 1998
  5. Hong-sang Yoon. Thesis: A Security Mechanism of Mobile Agent on the Distributed Communication Networks. Dec. 1999
  6. Robert S. Gray. Agent Tcl: A flexible and secure mobile-agent system. In Proceedings of the Fourth Annual Tcl/Tk Workshop(TCL '96), July 1996
  7. Tomas Sander and Christian F. Tschudin. Towards Mobile Cryptography. Technical Report TR­97­049, International Computer Science Institute, Berkeley, California, November 1997
  8. William M. Farmer, Joshua D. Guttman, and Vipin Swarup. Security for Mobile Agents: Issues and Requirements. In Proceedings of the 19th National Information Systems Security Conference, pages 591--597, October 1996
  9. W. Stallings. Network and Internetwork Security Principles and Practice. Prentice Hall, Inc. Englewood Cliffs, New Jersey,