A Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols

Mobile agents raise security issues such as the protection of platform/host that runs the mobile agent against attacks which can harm or use its resources without permission, and another is the need for protection to guard mobile agents and their supporting systems against the malicious attacks from a variety of intervening sources that might alter information it carries and processes when it visits the hosts in its transactions itineraries. In this article, the authors propose a framework which includes safe, secure, trusted and auditable services, as well as forensic mechanisms to provide audit trails for digital evidence of transactions and protection against illegal activities. The proposed framework and protocols provide a secure communication for mobile agents when they move to different security environments to deal with e-marketplace activities such as search information, negotiation and payments. This article is concluded by highlighting and discussing further research work to build viable systems. [Article copies are available for purchase from InfoSci-on-Demand.com]

[1]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[2]  A. Kuznetsov Synthetic Biology as a Proof of Systems Biology , 2009 .

[3]  Mahbubur Rahman Syed Multimedia technologies : concepts, methodologies, tools, and applications / Syed Mahbubur Rahman [editor]. , 2008 .

[4]  Wei Liang-fen A Migration Mechanism of Mobile Agent System Supporting Security and Fault-Tolerance , 2007 .

[5]  Matthew Thompson,et al.  A secure marketplace for mobile Java agents , 1998, AGENTS '98.

[6]  Mei-Ling Shyu,et al.  Weighted Association Rule Mining for Video Semantic Detection , 2010, Int. J. Multim. Data Eng. Manag..

[7]  N. Ch. S. N. Iyengar,et al.  A Model for Mobile Agent Security in E-Business Applications , 2007 .

[8]  Zbigniew Hulicki Multimedia Communication Services on Digital TV Platforms , 2005 .

[9]  Yannis Manolopoulos,et al.  Building Tag-Aware Groups for Music High-Order Ranking and Topic Discovery , 2010, Int. J. Multim. Data Eng. Manag..

[10]  T. Kidd Investing in Multimedia Agents for E-Learning Solutions , 2009 .

[11]  M. Amin,et al.  Defining new markets for intelligent agents , 2000 .

[12]  Ismail Khalil,et al.  Handbook of Research on Mobile Multimedia , 2006 .

[13]  Leon Sterling,et al.  Privacy and forensics investigation process: The ERPINA protocol , 2008, Comput. Stand. Interfaces.

[14]  Lin Chen Security model of mobile agent in e-commerce , 2005 .

[15]  Peter J. Natale Media Channel Preferences of Mobile Communities , 2009 .

[16]  Michela Bertolotto,et al.  Using Multimedia and Virtual Reality for Web-Based Collaborative Learning on Multiple Platforms , 2008 .

[17]  Mazliza Othman,et al.  Secure and auditable agent-based e-marketplace framework for mobile users , 2008, Comput. Stand. Interfaces.

[18]  Liu Wei-feng Research of Mobile Agent-based Security in the E-commerce , 2004 .

[19]  Yi Chen,et al.  Synthetic Video Generation for Evaluation of Sprite Generation , 2010, Int. J. Multim. Data Eng. Manag..

[20]  Sun Ling-fang A Secure Technology of E-Commerce Based On SET , 2007 .

[21]  Xin Luo,et al.  Encyclopedia of Multimedia Technology and Networking , 2008 .

[22]  Touradj Ebrahimi,et al.  Robust Duplicate Detection of 2D and 3D Objects , 2010, Int. J. Multim. Data Eng. Manag..

[23]  Pattie Maes,et al.  Agents that buy and sell , 1999, CACM.

[24]  Elaine B. Barker,et al.  SP 800-57. Recommendation for Key Management, Part 1: General (revised) , 2007 .

[25]  S. Kittitornkun,et al.  Optimizing RSA encryption for ARM microprocessor , 2008, 2008 5th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[26]  Saad Harous Routing Algorithms for Mobile Ad Hoc Networks , 2009 .