1 / 12

A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts

A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts. Jes ús Arturo Pérez Díaz Darío Álvarez Gutiérrez Department of Informatics University of Oviedo Oviedo, Asturias, Spain Presenter: Chin-chi Lo. Outline.

Download Presentation

A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Fast Data Protection Technique for Mobile Agents to Avoid Attacks in Malicious Hosts Jesús Arturo Pérez Díaz Darío Álvarez Gutiérrez Department of Informatics University of Oviedo Oviedo, Asturias, Spain Presenter: Chin-chi Lo

  2. Outline • A Secure Mobile Agent System • Traditional Techniques • Encryption Algorithm using Bitmaps & XOR • Limitations & Conclusion

  3. A Secure Mobile Agent System • Protection of the agent system against attacks from mobile agents. • Protection of the agent against agents. • Protection of information transmission between agent servers against unauthorized third parties. • Protection of the agent against malicious agent systems.

  4. Traditional Techniques • Public key cryptography • Digital Signatures • Implementing Secure Channel • Ex: SSL, TLS All of the above are too complex and almost unfeasible in terms of performance.

  5. Data Encryption using Bitmaps & the XOR Operation • Bitmaps A random number expressed as a bitmap in a row of a matrix carried by an agent and known only to the source server. • XOR Applying XOR operation between data and a random number.

  6. Data Area of the Mobile Agent

  7. Fields • HostID: identifier of a server. • CW: “codeword”, used to rotate the data before applying the encryption function. • CRC: verifying if the data is altered. The initial value is binary 0’s.

  8. Encryption Algorithm • The remote server creates a record with the same fields. • The host ID, data to be encrypted in 128-bit blocks form and a generated random CW are put into the record. • is rotated to the left ,where

  9. Encryption Algorithm (Cont.) • Before applying the (3.), the CW is rotated to the right.(7 most-significant bits of CW)Thus, each is not always the same.

  10. Encryption Algorithm (Cont.) • The original CW is restored into the corresponding field of the register in order to retrieve the original information using the inverse algorithm in the source server. • Computing CRC. • The corresponding original bitmap is XOR’ed with generated data. • The counter indicating the number of lines used in the matrix is incremented.

  11. Limitations of the Method • Does not prevent the possible alternation of data from malicious hosts • The current server could see and copy the still available rows . • The two cooperating malicious servers. • There is a fixed maximum number of data that can be protected.

  12. Conclusion • That is a trade-off between performance and security.

More Related