Skip to main content

Mobile Agents: Preserving Privacy and Anonymity

  • Conference paper
Intelligent Media Technology for Communicative Intelligence (IMTCI 2004)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3490))

Included in the following conference series:

Abstract

The mobile agent systems have been well known for years, but recent developments in the mobile technology (mobile phones, middleware) and the artificial intelligence created new research directions. Currently being widely used for the e-commerce and network management are entering into more personal areas of our life, e.g., booking airline tickets, doing shopping, making an appointment at the dentist. Future agents are becoming more like our representatives in the Internet than simple software. To operate efficiently in their new role they need to have the same capabilities as we do, showing their credentials when required and being anonymous when needed. Still they have to fulfill all security requirements for agent systems, including confidentiality, integrity, accountability, and availability. This paper focuses on providing mobile agents with anonymity and privacy. The proposed schemes are based on different cryptographic primitives: the secret sharing scheme and the zero-knowledge proof. The paper also includes a discussion of security of the proposed schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashley, P., Au, R., Looi, M., Seet, L.T.: Secure authorisation agent for cross-domain access control in a mobile computing environment. In: Kim, K.-c. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 369–381. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  2. Beimel, A., Dolev, S.: Buses for Anonymous Message Delivery. Journal of Cryptology 16(1), 25–39 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  3. Berkovits, S., Guttman, J.D., Swarup, V.: Authentication for mobile agents. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol. 1419, pp. 114–136. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Cachin, C., Camenisch, J., Kilian, J., Muller, J.: One-Round Secure Computation and Secure Autonomous Agents, Automata, Languages and Programming, pp. 512–523 (2000)

    Google Scholar 

  5. Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  6. Chan, P.K., Fan, D.W., Lee, W., Prodromidis, A.L., Stolfo, S.J., Tselepis, S.: Jam: Java agents for meta-learning over distributed databases. In: Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining (1997)

    Google Scholar 

  7. Corradi, A., Cremonini, M., Montanari, R., Stefanelli, C.: Mobile Agents Integrity for Electronic Commerce Applicatons. Information Systems 24(6), 519–533 (1999)

    Article  Google Scholar 

  8. Guillou, L., Quisquater, J.-J.: A Practical Zero-knowledge Protocol Fitted to Security Microprocessor Minimizing both Transmission and Memory. In: Proceedings of Eurocrypt 1988, pp. 123–128. Springer, Heidelberg (1988)

    Google Scholar 

  9. Jansen, W.: Determining Privileges of Mobile Agents, NIST, http://www.nist.gov

  10. Jansen, W., Karygiannis, T.: NIST Special Publication 800–19 – Mobile Agents Security

    Google Scholar 

  11. Chrissikopoulos, V., Katsirelos, G., Kotzanikolaou, P.: Mobile Agents for Secure Electronic Transactions. In: Mastorakis, N.E. (ed.) Recent Advances in Signal Processing and Communications, pp. 363–368. World Scientific Engineering Society (1999)

    Google Scholar 

  12. Kulesza, K., Kotulski, Z., Kulesza, K.: On Mobile Agents Anonymity; Formulating Traffic Analysis Problems. In: Advanced Computer Systems, Proceedings of the 10th International Conference, ACS 2003, Miedzyzdroje, October 22–24, pp. 15–21 (2003)

    Google Scholar 

  13. Kulesza, K., Kotulski, Z.: Decision Systems in Distributed Environments: Mobile Agents and Their Role in Modern E-Commerce. In: Lapinska, A. (ed.) Information in 21st Century Society, University of Warmia and Mazury Edition, Olsztyn, pp. 271–282 (2003) ISBN 83-89112-60-4

    Google Scholar 

  14. Margasinski, I., Szczypiorski, K.: VAST: Versatile Anonymous System for Web Users. In: Tenth International Multi-Conference on Advanced Computer Systems ACS 2003, Miedzyzdroje, Poland, October 2003. Springer, Heidelberg (2004)

    Google Scholar 

  15. Merkle, R.: Secure Communications over Insecure Channels. Communications of the ACM, 294–299 (April 1978)

    Google Scholar 

  16. Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. Springer, Berlin (2003)

    MATH  Google Scholar 

  17. Reiter, M.K., Rubin, A.D.: Crowds: Anonymity for Web Transactions. ACM Transactions on Information and System Security 1(1), 66–92 (1998)

    Google Scholar 

  18. Reyes, A., Sanchez, E., Barba, A.: Routing Management Application Based on Mobile Agents on the INTERNET2. In: EUNICE 2000, Holland (2000)

    Google Scholar 

  19. Wangham, M.S., da Silva Fraga, J., Obelheiro, R.R.: A security scheme for mobile agent platforms in large-scale systems. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol. 2828, pp. 104–116. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  20. Zwierko, A., Kotulski, Z.: A new protocol for group authentication providing partial anonymity. In: NGI 2005- Proc of The First EuroNGI Conference – Traffic Engineering for the Next Generation Internet, Rome, Italy, April 18-20 (2005) (accepted)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zwierko, A., Kotulski, Z. (2005). Mobile Agents: Preserving Privacy and Anonymity. In: Bolc, L., Michalewicz, Z., Nishida, T. (eds) Intelligent Media Technology for Communicative Intelligence. IMTCI 2004. Lecture Notes in Computer Science(), vol 3490. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558637_25

Download citation

  • DOI: https://doi.org/10.1007/11558637_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29035-3

  • Online ISBN: 978-3-540-31738-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics