Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent

被引:0
|
作者
Chung, Yu-Fang [1 ]
Chen, Tzer-Shyong [2 ]
Liu, Chia-Hui [3 ]
Wang, Tzu-Chi [2 ]
机构
[1] Chaoyang Univ Technol, Informat Management Dept, Chaoyang, Taiwan
[2] Tunghai Univ, Dept Management Informat, Taichung, Taiwan
[3] Natl Taiwan Univ, Dept Elect Engn, Taipei, Taiwan
关键词
Mobile agent; access control; key management; information security; polynomial interpolation formula;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Technologies and their applications related to e-commerce have always been the topic of interests to attract researchers and widely discussed. Among them, the use of the mobile agent in e-commerce is a highly potential technology which has accumulated a lot of interests in recent years. Since the mobile agent has high autonomy and mobility, it can move, unbridled, in different execution environments. At the same time, it can automatically detect its current environment and respond accordingly. Finally, it can also carry out work, or tasks assigned to it by its user. The above qualities make the mobile agent very suitable for use in e-commerce. The internet is an open environment. When there is a need to transfer, or exchange confidential information over the internet, the security of the present Internet environment must be improved. Even so, during its execution, a mobile agent needs to roam around the internet between different servers on the internet. At the same time, a mobile agent may also come in contact, or interact with other mobile agents or hosts. Therefore, the users may worry that a mobile agent may not work properly if it meets with a malicious program, or if it is tampered with by a malicious host, or that confidential information carried by the mobile agent may be stolen by other agents. To ensure the safety of mobile agents on the internet, this paper proposes a security scheme suitable for use to mobile agents: The scheme includes access control and key management to ensure the security and confidentiality of information and the system. In view of the access control and key management scheme for mobile agents proposed by Volker and Mehrdad[1], this paper proposes a new scheme that uses the concepts of polynomial interpolation formula[19], the hierarchy structure and the superkey[8] to improve the previous security schemes which need a large amount of space for the mobile agent. According to this paper's security and performance analysis, it is proved that the proposed scheme can efficiently protect the mobile agents.
引用
收藏
页码:650 / +
页数:3
相关论文
共 50 条
  • [1] Efficient hierarchical key management scheme for access control in the mobile agent
    Chung, Yufang
    Chen, Tzershyong
    Liu, Chiahui
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2008, 4 (09): : 2375 - 2389
  • [2] A novel key management and access control scheme for mobile agent
    Pan, Jen-Yi
    Chen, Tzer-Long
    Chen, Tzer-Shyong
    [J]. COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 334 - 345
  • [3] Cryptanalysis and improvement of a hierarchical key management scheme foraccess control in the mobile agent
    Lin, Yu-Li
    Hsu, Chien-Lung
    [J]. ICIC Express Letters, 2010, 4 (01): : 183 - 187
  • [4] AN ID-BASED ACCESS CONTROL IN A HIERARCHICAL KEY MANAGEMENT FOR MOBILE AGENT
    Liu, Chia-Hui
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Wang, Sheng-De
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1443 - 1456
  • [5] A centralized key management scheme for hierarchical access control
    Zhang, Q
    Wang, YK
    [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2067 - 2071
  • [6] An Efficient Hierarchical Key Management Scheme for Access Medical Database
    Xie, Chang-Ying
    Lin, Guan-Li
    Lai, Yi-An
    Yeh, Jung
    Huang, Yu-Min
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    [J]. PROCEEDINGS OF THE 2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND ENGINEERING (IEEE-ICICE 2017), 2017, : 461 - 463
  • [7] Efficient Date-constraint Access Control and Key Management Scheme for Mobile Agents
    Chung, Yu-Fang
    Kao, Ming-Hsien
    Chen, Tzer-Long
    Chen, Tzer-Shyong
    [J]. INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 252 - 257
  • [8] A key management scheme for hierarchical access control in group communication
    Zhang, Qiong
    Wang, Yuke
    Jue, Jason P.
    [J]. International Journal of Network Security, 2008, 7 (03) : 323 - 334
  • [9] An improved key-management scheme for hierarchical access control
    Chao W.-Y.
    Tsai C.-Y.
    Hwang M.-S.
    [J]. International Journal of Network Security, 2017, 19 (04) : 639 - 643
  • [10] An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
    Jeng, Fuh-Gwo
    Wang, Chung-Ming
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2006, 79 (08) : 1161 - 1167