PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS

Bartek Gedrojc, Jan C.A. van der Lubbe, Martin van Hensbergen

Abstract

Consider the problem of using mobile agents within an e-commerce setting where the goal is to purchase a desired item for a user. The problem is that the mobile agents visit a collection of hosts which are untrustworthy and therefore could tamper with the correct execution of the agents. Our approach to the e-commerce problem prevents the hosts to retrieve the price the user is willing to pay for a desired item, it prevents the hosts to retrieve the offers given by other hosts (confidentiality) and it ensures the integrity of the agents’ code, the query and itinerary. The key to our approach is the use of multiple agents for our goal; to purchase a desired item for a user. Analogous to a beehive, the user creates Drone agents that can collect data but which do not have the capability to process this data. Also, one Queen agent is deployed which uses the outputs of the Drone agents and makes a decision on that data. Simplified, we let the Drone agents do the work, while the Queen computes the result.

References

  1. Algesheimer, J., Cachin, C., Camenisch, J., and Karjoth, G. (2001). Cryptographic security for mobile code. In Proceedings of the IEEE Symposium on Security and Privacy, page 2. IEEE Computer Society.
  2. Blakely, G. (1979). Safeguarding cryptographic keys. In Proceedings AFIPS 1979 National Computer Conference, pages 313-317. AFIPS.
  3. Cachin, C., Camenisch, J., Kilian, J., and Müller, J. (2000). One-round secure computation and secure autonomous mobile agents. In Proceedings of the 27th International Colloquium on Automata, Languages and Programming, pages 512-523. Springer-Verlag.
  4. Desmedt, Y. and Frankel, Y. (1994). Perfect homomorphic zero-knowledge threshold schemes over any finite abelian group. SIAM J. Discret. Math., 7(4):667- 679.
  5. Lai, C., Gong, L., Koved, L., Nadalin, A., and Schemers, R. (1999). User authentication and authorization in the Java platform. In 15th Annual Computer Security Applications Conference, pages 285-290. IEEE Computer Society Press.
  6. Sander, T. and Tschudin, C. F. (1998a). Protecting mobile agents against malicious hosts. Lecture Notes in Computer Science, 1419:44-60.
  7. Sander, T. and Tschudin, C. F. (1998b). Towards mobile cryptography. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA. IEEE Computer Society Press.
  8. Shamir, A. (1979). How to share a secret. Commun. ACM, 22(11):612-613.
  9. Singelée, D. and Preneel, B. (2004). Secure e-commerce using mobile agents on untrusted hosts. Technical report, COSIC Internal Report.
  10. Tan, H. K. and Moreau, L. (2002). Certificates for mobile code security. In SAC 7802: Proceedings of the 2002 ACM symposium on Applied computing, pages 76-81, New York, NY, USA. ACM Press.
Download


Paper Citation


in Harvard Style

Gedrojc B., C.A. van der Lubbe J. and van Hensbergen M. (2007). PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 289-294. DOI: 10.5220/0002127402890294


in Bibtex Style

@conference{secrypt07,
author={Bartek Gedrojc and Jan C.A. van der Lubbe and Martin van Hensbergen},
title={PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={289-294},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002127402890294},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - PRIVATE COMPUTING WITH BEEHIVE ORGANIZED AGENTS
SN - 978-989-8111-12-8
AU - Gedrojc B.
AU - C.A. van der Lubbe J.
AU - van Hensbergen M.
PY - 2007
SP - 289
EP - 294
DO - 10.5220/0002127402890294