Anonymity services for multi-agent systems

Anonymity can be of great importance in distributed agent applications such as e-commerce & auctions. This paper proposes and analyzes a new approach for anonymous communication of agents based on the use of handles as pseudonyms. A novel naming scheme is presented that can be used by agent platforms to provide automatic anonymity of communication for all agents on its platform, or, alternatively, to provide anonymity on demand. The paper furthermore introduces new approaches that provide authentication and anonymous payment schemes for agents. Performance measures for an anonymity service implemented for the AgentScape platform provides some insight in the overhead involved. This paper is an extension and revision of a paper previously presented at the Third International Symposium on Information Assurance and Security [30].

[1]  Giovanni Maria Sacco,et al.  Timestamps in key distribution protocols , 1981, CACM.

[2]  Frances M. T. Brazier,et al.  Security of Distributed Digital Criminal Dossiers , 2008, J. Softw..

[3]  D. Mobach Agent-Based Mediated Service Negotiation , 2007 .

[4]  Agostino Poggi,et al.  Jade - a fipa-compliant agent framework , 1999 .

[5]  Reinout van Schouwen Design and implementation of a secure, decentralized location service for agent platforms , 2006 .

[6]  Amnon Ta-Shma,et al.  On Anonymous Electronic Cash and Crime , 1999, ISW.

[7]  Martijn Warnier,et al.  Organized Anonymous Agents , 2007 .

[8]  L. Jean Camp,et al.  Token and Notational Money in Electronic Commerce , 1995, USENIX Workshop on Electronic Commerce.

[9]  José Meseguer,et al.  Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.

[10]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[11]  André Weimerskirch,et al.  A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.

[12]  Corien Prins,et al.  New Rules for Anonymous Electronic Transactions? An Exploration of the Private Law Implications of Digital Anonymity , 2001, Journal of Information, Law and Technology.

[13]  Flavio D. Garcia,et al.  Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications , 2005, ACNS.

[14]  Frances M. T. Brazier,et al.  Design of a Secure and Decentralized Location Service for Agent Platforms , 2007, AP2PC.

[15]  Frances M. T. Brazier,et al.  A WS-Agreement Based Resource Negotiation Framework for Mobile Agents , 2006, Scalable Comput. Pract. Exp..

[16]  Frances M. T. Brazier,et al.  Anonymity and software agents: An interdisciplinary challenge , 2004, Artificial Intelligence and Law.

[17]  Robert R. Moeller,et al.  Network Security , 1993, Inf. Secur. J. A Glob. Perspect..

[18]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[19]  Rafal Leszczyna,et al.  Untraceability of mobile agents , 2005, AAMAS '05.

[20]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[21]  Ronggong Song,et al.  Anonymous Communications for Mobile Agents , 2002, MATA.

[22]  Frances M. T. Brazier,et al.  Web service access management for integration with agent systems , 2008, SAC '08.

[23]  Michael Luck,et al.  Agent technology: Enabling next generation computing , 2003 .

[24]  Chris J. Mitchell,et al.  Limits to Anonymity When Using Credentials , 2004, Security Protocols Workshop.

[25]  Butler W. Lampson,et al.  A note on the confinement problem , 1973, CACM.

[26]  Frances M. T. Brazier,et al.  A Common Base for Building Secure Mobile Agent Middleware , 2007 .

[27]  Volker Roth,et al.  Concepts and architecture of a security-centric mobile agent server , 2001, Proceedings 5th International Symposium on Autonomous Decentralized Systems.

[28]  Aaron Helsinger,et al.  Cougaar: a scalable, distributed multi-agent architecture , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[29]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[30]  Ziyan Maraikar Resource and Service Discovery for Mobile Agent Platforms , 2006 .

[31]  Andrei Serjantov,et al.  On the anonymity of anonymity systems , 2004 .

[32]  Michael P. Wellman,et al.  The Michigan Internet AuctionBot: a configurable auction server for human and software agents , 1998, AGENTS '98.