An Agent-Based Secure Transaction Protocol with Fair Privacy

To reduce mobile users' dependence on effective network availability, this paper proposes mobile agent technology in mobile computing applications. This allows mobile users to perform data collection and electronic transactions in a wireless network environment. In an agent-based transaction protocol, mobile agents carry information provided by the user and are able to migrate between hosts to execute tasks. The issue of safety i.e. ensuring the information carried by mobile agents is not modified or eavesdropped on becomes important and cannot be ignored. This paper proposes a secure transaction protocol; mobile agents help users gather information on goods. Since the protocol is tailored to the user's needs, the security of the application system is comprehensively enhanced. The issues addressed include preserving the privacy of the user's identity, the integrity of transaction information, non-repudiation and fairness of transactions, and the confidentiality of information exchange.

[1]  Danny B. Lange,et al.  Dispatch Your Agents; Shut Off Your Machine , 1999 .

[2]  Yu-Yi Chen,et al.  A secure negotiable on-demand services model for cloud environment , 2011, 2011 IEEE EUROCON - International Conference on Computer as a Tool.

[3]  Joonsang Baek,et al.  Secret Computation with Secrets for Mobile Agent using One-time Proxy Signature , 2001 .

[4]  Matt Henricksen,et al.  Offer Privacy in Mobile Agents Using Conditionally Anonymous Digital Signatures , 2004, TrustBus.

[5]  Panayiotis Kotzanikolaou,et al.  Secure Transactions with Mobile Agents in Hostile Environments , 2000, ACISP.

[6]  Matt Henricksen,et al.  A Mobile Agent System Providing Offer Privacy , 2004, ACISP.

[7]  Evaggelia Pitoura,et al.  Business models and transactions in mobile electronic commerce: requirements and properties , 2001, Comput. Networks.

[8]  Tharam S. Dillon,et al.  Secure E-Transactions Protocol using Intelligent Mobile Agents with Fair Privacy , 2007, E-Service Intelligence.

[9]  Danny B. Lange,et al.  Seven good reasons for mobile agents , 1999, CACM.

[10]  James A. Senn,et al.  The Emergence of M-Commerce , 2000, Computer.

[11]  Ed Dawson,et al.  An Improved Forward Integrity Protocol for Mobile Agents , 2003, WISA.

[12]  Ho-fung Leung,et al.  Mobile agents for secure electronic commerce transactions with privacy protection of the customers , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.

[13]  Yang Shi,et al.  A security scheme of electronic commerce for mobile agents uses undetachable digital signatures , 2004, InfoSecu '04.

[14]  Heiko Knospe,et al.  Secure mobile commerce , 2002 .

[15]  Upkar Varshney,et al.  Mobile Commerce: A New Frontier , 2000, Computer.

[16]  Byoungcheon Lee,et al.  Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.