Homomorphic Encryption Scheme & Its Application for Mobile Agent Security
|
International Journal of P2P Network Trends and Technology (IJPTT) | |
© 2013 by IJPTT Journal | ||
Volume-3 Issue-6 |
||
Year of Publication : 2013 | ||
Citation
Sachin Upadhye , P.G. Khot."Homomorphic Encryption Scheme & Its Application for Mobile Agent Security ". International Journal of P2P Network Trends and Technology (IJPTT), V3(6):36 - 39 Nov - Dec 2013, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.
Abstract
— Mobile agents (MA) are autonomous software entities that are able to migrate across heterogeneous network execution environments. Protection of Mobile agents is one of the most difficult problems in the area of mobile agent’s security. A security issues with mobile agents have not been solved and are becoming obstacles for the application of mobile agents. Four threat categories are identified for mobile agent: threats stemming from an agent attacking an agent platform, an agent platform attacking an agent, an agent attacking another agent on the agent platform, and other entities attacking the agent system Homomorphic encryption are a technique in which the encrypted mobile codes can be executed directly on different platforms without decryption. In this paper section introduce the basic part of cryptosystem. In next section explain theory related Homomorphic Encryption. Section III contain the application view of Homomorphic Encryption used for mobile agent security and last conclude the paper.
References
[1] Kerckhoffs, A., (1883). “La cryptographie militaire (part i)”, Journal des Sciences Militaires, Vol. 9, no. 1, pp. 5–38.
[2] Kerckhoffs, A., (1883). “La cryptography militaries (part ii)”, Journal des Sciences Militaires, Vol. 9, no2pp161 191
[3] T. Sander and C.Tschudin. Protecting Mobile Agents against Malicious Hosts. Mobile Agents and Security, LNCS 1419, Berlin: Springer-Verlag 1998, 44-60.
[4] Ching Lin, Vijay Varadharajan. MobileTrust: a trust enhanced security architecture for mobile agent systems [J], International Journal of Information Security,2010,9(3): 153 – 178.
[5] Xiaogang Wang, Darren Xu, Junzhou Luo. A Free-Roaming Mobile Agent Security Protocol Based on Anonymous Onion Routing and k Anonymous Hops Backwards[A], Proceedings of the 5th international conference on Autonomic and Trusted Computing. Special Session Papers: Routing and Reliable Systems,LNCS, Jun.2008, Oslo, Norway, 588 – 602.
[6] Woei-Jiunn Tsaur, Chien-Hao Ho. A mobile agent protected scheme using pairing-based cryptosystems[J]. International Journal of Mobile Communications,2005,3(2):183-196.
[7] Rivest R., Adleman L. and Dertouzos M., (1978), “On data banks and privacy homomorphics”, Foundations of Secure Computation, Academic Press, pp. 169 – 177.
[8] Brickell, E. and Yacobi, Y., (1987). “On privacy homomorphics”, Advances in Cryptology (EUROCRYPT ’87), volume 304 of Lecture Notes in Computer Science, Springer, New York, USA, pp. 117 – 126.
[9] Rappe, D., (2004), Homomorphic Cryptosystems and their Applications, Ph.D. thesis, University of DortmundDortmundGermany
[10] Ruchuan Wang, Xiaolong Xu. Research of MA security mechanism [J]. Chinese Journal of Computers,2002,25(12)?1294-1301.
[11] Xiang Tan,Minqing Gu,Congming Bao. Mechanism for Mobile Agent Data Protection[J]. Journal of Software,2005,16(3): 477 - 484.
[12] Xiaoping Wu, Honggen Xing, Zhidong Shen. Research of MA security application model based on distributed confidence level [J]. Computer Engineering and Science,2010, 32(6):19-22.
[13] Rossilawati Sulaiman, Xu Huang, Dharmendra Sharma. E-health Services with Secure Mobile Agent[A], Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference, Communications Networks and Services Research Conference, IEEE computer society,May.2009,270-277
[14] Monia Loulou, Mohamed Jmaiel, Mohamed Mosbah. Dynamic security framework for mobile agent systems: specification, verification and enforcement[J], International Journal of Information and Computer Security,2009,3(3/4):321-336.
[15] Christopher Colby, Karl Crary, Robert Harper, Peter Lee, Frank P fenning. Automated techniques for provably safe mobile code[J], Theoretical Computer Science,2003,290(2):1175-1199.
[16] Christopher Colby, Karl Crary, Robert Harper, Peter Lee, Frank P fenning. Automated techniques for provably safe mobile code [J], Theoretical Computer Science, 2003, 290(2):1175-1199.
[17] Carles Garrigues, Nikos Migas. Protecting mobile agents from external replay attacks[J]. Journal of Systems and Software. 2009, 82(2):197-206.
[18] D M Hein, R Toegl An Autonomous Attestation Token to Secure Mobile Agents in Disaster Response. LNICST 17, 2009, pp:46-57.
[19] Tomas Sander and Christian F. Tschudin, Towards Mobile Cryptography. Technical Report 97-049, International Computer Science Institute, Berkeley. 1997. http://wwwicsiberkeleyedu/~sander/publications/tr 97-049ps,
[20] Tomas Sander and Christian F. Tschudin, Protecting Mobile Agents Against Malicious Hosts, in Vigna, Giovanni (Ed.): Mobile Agents and Security, Springer-verlag, 1998.
[21] T.Sander and C. Tschudin. On software protection via function hiding. In Information hiding, pages 111-123, 1998],
[22] Hyungjick Lee and Jim Alves-Foss and Scott Harrison, The use of Encrypted functions for Mobile Agent Security from the Proceedings of the 37th Hawaii International Conference on System Sciences 2004
[23] Makoto Yokoo, Koutarou Suzuki. Secure Multi-agent Dynamic programming based on Homomorphic Encryption and its Application to Combinatorial Auctions.
[24] Hyungjick Lee and Jim Alves-Foss and Scott Harrison, The use of Encrypted functions for Mobile Agent Security from the Proceedings of the 37th Hawaii International Conference on System Sciences 2004
Keywords
- Homomorphic encryption, mobile agent security, composite function