Transcript
Page 1: Mobile Agent Based Privacy Protection Host Malicious Task Data Protection Host A Host B Host A Host B Host A Host B Host A Host B Host A Host B Itinerary Take UD away to the origin

Mobile Agent Based Privacy Protection Model (iCOP)HUDA, Md. Nurul* 1 KAMIOKA, Eiji** YAMADA, Shigeki**

1 [email protected]

Who Should Know What?Entity (who)

Personal data (what)

Book store E-cash company

Delivery office

Book store list × × ×Book information O × ×E-cash information × O ×Postal service list × × ×Delivery address × × O

Privacy is the right/ability of an individual to control the use of his/her personal information by others

Mobile Agent based Book Buying Scenario

Book buying scenario:

Privacy Overview

*The Graduate University for Advanced Studies (SOKEN-DAI) **National Institute of Informatics (NII)

iCOP Security Model

Collaboration diagram:

isolated Closed-door One-way Platform (iCOP)

•Third-party encapsulated agent host platform•Closed-door: MAs can not communicate with the outside world•One-way: MAs can not leave the platform•MAs are killed at the platform•Only agreed upon results are sent out

Agent typeMalicious activity with unauthorized data (UD)

MA Host

Malicious Task

Data Protection

Host AHost BHost AHost BHost AHost BHost AHost BHost AHost B

FailureItinerary Take UD away to the origin SuccessFailureSuccessFailureSuccessFailureSuccessFailureSuccess

SuccessFailureMessengerSuccessFailureMailer Send UD by mail to the originSuccessFailureRMI client Send UD by RMI message to the

RMI server at the origin SuccessFailureSimple Take UD with agent through

Retraction by the origin Failure Success

Send UD by message to the origin

Experimental results about basic characteristics of iCOP model

Basic characteristics of iCOP Security Model

Host A: General host, Host B: iCOP host

Future Work:•With experiments, we have tested basic characteristics of iCOPhost•In our future work, we would evaluate iCOP architecture by different parameters with different kinds of complex applications

Data

Data Access

BookDatabase

Book informationReq for M A

Lookup (book)

M igration

M igration

M igration

iCOP

Req for M A

E-cashDatabase

Lookup (e-cash)

Address

User

Book Store

E-cash CompanyPost Office

Shared:Book Information

Not shared:E- cash information,

Delivery address

Not shared:E- cash informationBook information

Shared:Delivery address

Not shared:Book informationDelivery address

Shared:E-cash information

UserBook Store

Post Office E-cash Company

Not shared:

Preferred book storelist and delivery officelist

Motivation:•Easy service automation•Autonomous and intelligent decision making without direct user interaction•Offline remote computing

LocalAgents

ExternalAgents

Agent Platform(JVM)

Local Resources

Security Manager

One-wayMigration path

VerifiedResult Msg MigrationMigrationMsg

The outside world

:PostOfficeAddress

:E-cashDatabase:E-cashCompany

:BookDatabase

:BookStoreList

:PostOffice

:BookStore:User

verifyE-cash(bookstore,e-cash)4:

getPostOfficeAddress()5:

findBook( book )2:

showPrice()2.2:

purchaseOrder3:

getBookStoreName()1:

deliveryOrder( Address )6:

search( book )2.1:

sendVerificationResult()4.2:

lookup( e-cash )4.1:

Top Related