mobile agent based privacy protection host malicious task data protection host a host b host a host...

1
Mobile Agent Based Privacy Protection Model (iCOP) HUDA, Md. Nurul * 1 KAMIOKA, Eiji ** YAMADA, Shigeki ** 1 [email protected] Who Should Know What? Entity (who) Personal data (what) Book store E-cash company Delivery office Book store list × × × Book information O × × E-cash information × O × Postal service list × × × Delivery address × × O Privacy is the right/ability of an individual to control the use of his/her personal information by others Mobile Agent based Book Buying Scenario Book buying scenario: Privacy Overview * The Graduate University for Advanced Studies (SOKEN-DAI) ** National Institute of Informatics (NII) iCOP Security Model Collaboration diagram: isolated Closed-door One-way Platform (iCOP) •Third-party encapsulated agent host platform •Closed-door: MAs can not communicate with the outside world •One-way: MAs can not leave the platform •MAs are killed at the platform •Only agreed upon results are sent out Agent type Malicious activity with unauthorized data (UD) MA Host Malicious Task Data Protection Host A Host B Host A Host B Host A Host B Host A Host B Host A Host B Failure Itinerary Take UD away to the origin Success Failure Success Failure Success Failure Success Failure Success Success Failure Messenger Success Failure Mailer Send UD by mail to the origin Success Failure RMI client Send UD by RMI message to the RMI server at the origin Success Failure Simple Take UD with agent through Retraction by the origin Failure Success Send UD by message to the origin Experimental results about basic characteristics of iCOP model Basic characteristics of iCOP Security Model Host A: General host, Host B: iCOP host Future Work: •With experiments, we have tested basic characteristics of iCOP host •In our future work, we would evaluate iCOP architecture by different parameters with different kinds of complex applications Data Data Access Book Database Book information Req for M A Lookup (book) M igration M igration M igration iCOP Req for M A E-cash Database Lookup (e-cash) Address User Book Store E-cash Company Post Office Shared: Book Information Not shared: E- cash information, Delivery address Not shared: E- cash information Book information Shared: Delivery address Not shared: Book information Delivery address Shared: E-cash information User Book Store Post Office E-cash Company Not shared: Preferred book store list and delivery office list Motivation: •Easy service automation •Autonomous and intelligent decision making without direct user interaction •Offline remote computing Local Agents External Agents Agent Platform (JVM) Local Resources Security Manager One-way Migration path Verified Result Msg Migration Migration Msg The outside world :PostOfficeAddress :E-cashDatabase :E-cashCompany :BookDatabase :BookStoreList :PostOffice :BookStore :User verifyE-cash(bookstore,e-cash) 4: getPostOfficeAddress() 5: findBook( book ) 2: showPrice() 2.2: purchaseOrder 3: getBookStoreName() 1: deliveryOrder( Address ) 6: search( book ) 2.1: sendVerificationResult() 4.2: lookup( e-cash ) 4.1:

Upload: dangdung

Post on 06-Jul-2019

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mobile Agent Based Privacy Protection Host Malicious Task Data Protection Host A Host B Host A Host B Host A Host B Host A Host B Host A Host B Itinerary Take UD away to the origin

Mobile Agent Based Privacy Protection Model (iCOP)HUDA, Md. Nurul* 1 KAMIOKA, Eiji** YAMADA, Shigeki**

1 [email protected]

Who Should Know What?Entity (who)

Personal data (what)

Book store E-cash company

Delivery office

Book store list × × ×Book information O × ×E-cash information × O ×Postal service list × × ×Delivery address × × O

Privacy is the right/ability of an individual to control the use of his/her personal information by others

Mobile Agent based Book Buying Scenario

Book buying scenario:

Privacy Overview

*The Graduate University for Advanced Studies (SOKEN-DAI) **National Institute of Informatics (NII)

iCOP Security Model

Collaboration diagram:

isolated Closed-door One-way Platform (iCOP)

•Third-party encapsulated agent host platform•Closed-door: MAs can not communicate with the outside world•One-way: MAs can not leave the platform•MAs are killed at the platform•Only agreed upon results are sent out

Agent typeMalicious activity with unauthorized data (UD)

MA Host

Malicious Task

Data Protection

Host AHost BHost AHost BHost AHost BHost AHost BHost AHost B

FailureItinerary Take UD away to the origin SuccessFailureSuccessFailureSuccessFailureSuccessFailureSuccess

SuccessFailureMessengerSuccessFailureMailer Send UD by mail to the originSuccessFailureRMI client Send UD by RMI message to the

RMI server at the origin SuccessFailureSimple Take UD with agent through

Retraction by the origin Failure Success

Send UD by message to the origin

Experimental results about basic characteristics of iCOP model

Basic characteristics of iCOP Security Model

Host A: General host, Host B: iCOP host

Future Work:•With experiments, we have tested basic characteristics of iCOPhost•In our future work, we would evaluate iCOP architecture by different parameters with different kinds of complex applications

Data

Data Access

BookDatabase

Book informationReq for M A

Lookup (book)

M igration

M igration

M igration

iCOP

Req for M A

E-cashDatabase

Lookup (e-cash)

Address

User

Book Store

E-cash CompanyPost Office

Shared:Book Information

Not shared:E- cash information,

Delivery address

Not shared:E- cash informationBook information

Shared:Delivery address

Not shared:Book informationDelivery address

Shared:E-cash information

UserBook Store

Post Office E-cash Company

Not shared:

Preferred book storelist and delivery officelist

Motivation:•Easy service automation•Autonomous and intelligent decision making without direct user interaction•Offline remote computing

LocalAgents

ExternalAgents

Agent Platform(JVM)

Local Resources

Security Manager

One-wayMigration path

VerifiedResult Msg MigrationMigrationMsg

The outside world

:PostOfficeAddress

:E-cashDatabase:E-cashCompany

:BookDatabase

:BookStoreList

:PostOffice

:BookStore:User

verifyE-cash(bookstore,e-cash)4:

getPostOfficeAddress()5:

findBook( book )2:

showPrice()2.2:

purchaseOrder3:

getBookStoreName()1:

deliveryOrder( Address )6:

search( book )2.1:

sendVerificationResult()4.2:

lookup( e-cash )4.1: