A two‐layer cryptographic scheme for a service framework based on mobile agents

Abstract In recent years, a new computation model, referred to as Service‐On‐Demand, has come into being gradually. This concept can be summarized as: the whole Net is a computer and one can have his/her tasks served using resources scattered around the Net. One technique that uses a similar concept is Web Service, which has been applied to many networks. However, Web Service is still confined to the Client‐Server paradigm and, in our opinion, does not wholly tally with the spirit of Service‐On‐Demand. Besides, there have not been many effective security schemes proposed for Web Services. This paper presents a mobile agent service framework, designed in reference to the service‐on‐demand concept, for the next generation of service‐based Internet applications. A two‐layer cryptographic security infrastructure is laid in the service framework to offer secured services. By separating the service functionality from its operating medium, the framework successfully prevents many security problems from happening. It also offers a most desirable benefit to both service providers and users. For service providers, deployment of a service is as easy as inserting a plug‐n‐play interface card and for service users, using a service is as easy as filling out a downloaded form. The main goal of this framework is to offer a total solution for providing secured services easily instead of doing difficult programming for services.

[1]  Vijay Varadharajan Security enhanced mobile agents , 2000, CCS.

[2]  Panayiotis Kotzanikolaou,et al.  Secure Transactions with Mobile Agents in Hostile Environments , 2000, ACISP.

[3]  Munindar P. Singh,et al.  Agents on the Web: Mobile Agents , 1997, IEEE Internet Comput..

[4]  Robbert van Renesse,et al.  An Introduction to the TACOMA Distributed System , 2006 .

[5]  Luís Valente,et al.  Mobile agent security and Telescript , 1996, COMPCON '96. Technologies for the Information Superhighway Digest of Papers.

[6]  Hartmut Vogler,et al.  An approach for mobile agent security and fault tolerance using distributed transactions , 1997, Proceedings 1997 International Conference on Parallel and Distributed Systems.

[7]  David Wong,et al.  Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.

[8]  Giovanni Vigna,et al.  Cryptographic Traces for Mobile Agents , 1998, Mobile Agents and Security.

[9]  Tadanori Mizuno,et al.  A model of mobile agent services enhanced for resource restrictions and security , 1998, Proceedings 1998 International Conference on Parallel and Distributed Systems (Cat. No.98TB100250).

[10]  George Cybenko,et al.  AGENT TCL: Targeting the Needs of Mobile Computers , 1997, IEEE Internet Comput..

[11]  Danny B. Lange,et al.  A Security Model for Aglets , 1997, IEEE Internet Comput..

[12]  Tzone-I Wang A Mobile Agent Carrier Environment for Mobile Information Retrieval , 2000, DEXA.

[13]  Keith D. Kotay,et al.  Transportable Agents , 1994 .

[14]  Stefan Covaci,et al.  Java-based intelligent mobile agents for open system management , 1997, Proceedings Ninth IEEE International Conference on Tools with Artificial Intelligence.

[15]  Kwang-Hui Lee A distributed network management system , 1994, 1994 IEEE GLOBECOM. Communications: The Global Bridge.

[16]  Tzone-I Wang,et al.  Mobile Agents for Distributed Transactions of a Distributed Heterogeneous Database System , 2002, DEXA.

[17]  Sim Heng Ong,et al.  A secure approach for mobile agent migration control , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.