Efficient Access Control and Key Management for Mobile Agents

碩士 === 逢甲大學 === 資訊電機工程碩士在職專班 === 94 === The mobile agent is designed for roaming around the internet and to achieve the goal of autonomy. With rapid growth of internet application, it will become a new promising technique. There are many application paradigms about mobile agents had proposed. Howeve...

Full description

Bibliographic Details
Main Authors: Chun-Hsu Huang, 黃君旭
Other Authors: Wei-Bin Lee
Format: Others
Language:zh-TW
Published: 2006
Online Access:http://ndltd.ncl.edu.tw/handle/73747443919624679179
id ndltd-TW-094FCU05392058
record_format oai_dc
spelling ndltd-TW-094FCU053920582015-12-11T04:04:18Z http://ndltd.ncl.edu.tw/handle/73747443919624679179 Efficient Access Control and Key Management for Mobile Agents 有效率地提供行動代理人存取控制與金鑰管理的方法 Chun-Hsu Huang 黃君旭 碩士 逢甲大學 資訊電機工程碩士在職專班 94 The mobile agent is designed for roaming around the internet and to achieve the goal of autonomy. With rapid growth of internet application, it will become a new promising technique. There are many application paradigms about mobile agents had proposed. However, a lot of security issues arose continuously. Security is still a fundamental precondition for the application of mobile agent systems. In order to enable the mobile agent to travel through the internet in safety, a suitable access control mechanism is indispensable to mobile agents. Volker and Mehrdad have proposed a tree-based structure that supports key management and access control for mobile agents. However, a large amount of storage for storing the secret keys is required in their scheme. Lin, Ou and Hwang proposed a RSA-based hierarchy structure to improve the drawbacks of Volker and Mehrdad’s scheme. The schemes of Lin-Ou-Hwang could reduce some of the mobile code, but still suffer from high computational cost. If the network service host has many mobile agents visited in the meantime; or the mobile agent is applied in mobile devices, these cases above-mention will diminish the efficiency and facility in application of mobile agents. In this paper, we propose an efficient hierarchy structure based on CRT (Chinese Remainder Theorm) for access control and key management for mobile agents. Our analysis shows that not only does our security match previous requirements but also reduce the computational cost of deriving secret keys significantly, so it is quite obvious that our scheme is more efficient than previous schemes. Wei-Bin Lee 李維斌 2006 學位論文 ; thesis 38 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 逢甲大學 === 資訊電機工程碩士在職專班 === 94 === The mobile agent is designed for roaming around the internet and to achieve the goal of autonomy. With rapid growth of internet application, it will become a new promising technique. There are many application paradigms about mobile agents had proposed. However, a lot of security issues arose continuously. Security is still a fundamental precondition for the application of mobile agent systems. In order to enable the mobile agent to travel through the internet in safety, a suitable access control mechanism is indispensable to mobile agents. Volker and Mehrdad have proposed a tree-based structure that supports key management and access control for mobile agents. However, a large amount of storage for storing the secret keys is required in their scheme. Lin, Ou and Hwang proposed a RSA-based hierarchy structure to improve the drawbacks of Volker and Mehrdad’s scheme. The schemes of Lin-Ou-Hwang could reduce some of the mobile code, but still suffer from high computational cost. If the network service host has many mobile agents visited in the meantime; or the mobile agent is applied in mobile devices, these cases above-mention will diminish the efficiency and facility in application of mobile agents. In this paper, we propose an efficient hierarchy structure based on CRT (Chinese Remainder Theorm) for access control and key management for mobile agents. Our analysis shows that not only does our security match previous requirements but also reduce the computational cost of deriving secret keys significantly, so it is quite obvious that our scheme is more efficient than previous schemes.
author2 Wei-Bin Lee
author_facet Wei-Bin Lee
Chun-Hsu Huang
黃君旭
author Chun-Hsu Huang
黃君旭
spellingShingle Chun-Hsu Huang
黃君旭
Efficient Access Control and Key Management for Mobile Agents
author_sort Chun-Hsu Huang
title Efficient Access Control and Key Management for Mobile Agents
title_short Efficient Access Control and Key Management for Mobile Agents
title_full Efficient Access Control and Key Management for Mobile Agents
title_fullStr Efficient Access Control and Key Management for Mobile Agents
title_full_unstemmed Efficient Access Control and Key Management for Mobile Agents
title_sort efficient access control and key management for mobile agents
publishDate 2006
url http://ndltd.ncl.edu.tw/handle/73747443919624679179
work_keys_str_mv AT chunhsuhuang efficientaccesscontrolandkeymanagementformobileagents
AT huángjūnxù efficientaccesscontrolandkeymanagementformobileagents
AT chunhsuhuang yǒuxiàolǜdetígōngxíngdòngdàilǐréncúnqǔkòngzhìyǔjīnyàoguǎnlǐdefāngfǎ
AT huángjūnxù yǒuxiàolǜdetígōngxíngdòngdàilǐréncúnqǔkòngzhìyǔjīnyàoguǎnlǐdefāngfǎ
_version_ 1718147593567993856