Weitere Artikel dieser Ausgabe durch Wischen aufrufen
In real-life applications, ensuring secure transmission of data over public network channels to prevent malicious eavesdropping of the data is an important issue in distributed network environment. There are several potential security risks in protecting data and providing access control over the data. It is a challenging problem to manage dynamically the access rights to the resources and protect them from unauthorized access. Several migration access control mechanisms have been proposed in the literature using hierarchical structure to manage the cryptographic keys to prevent from unauthorized access of resources. However, most of them suffer from some known attacks and they do not efficiently support all required dynamic properties for mobile agent environment. Since, in practical scenarios, from time to time changing of decryption key of a confidential file provides maximum security for the system, it affects significantly the performance of the key management mechanism. In this paper, we propose a novel dynamic migration access control mechanism for the mobile agents (DMAMA) in a distributed network environment using symmetric-key cryptosystem. Further, we provide an elliptic curve cryptography based signature (El-Gamal type) on the decryption key assigned to the confidential file to avoid unauthorized modifications by an attacker. Moreover, DMAMA provides an efficient solution to the dynamic property such as changing decryption key of a confidential file, whereas other schemes do not provide. In addition, DMAMA is efficient in computation and storage overheads as compared to the other related existing schemes. Through the informal and formal security analysis, we show that DMAMA is secure against possible known attacks including man-in-the-middle attack as well as DMAMA provides backward secrecy to the decryption key of a confidential file when adding a new node or creating a new relationship in the existing hierarchy. As a result, higher security, low computational and storage overheads along with efficient access control properties make DMAMA more suitable for practical applications compared to the other related schemes.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Zakerolhosseini, A., & Nikooghadam, M. (2013). Secure transmission of mobile agent in dynamic distributed environments. Wireless Personal Communications, 70(2), 641–656. CrossRef
Lin, I. C., Ou, H. H., & Hwang, M. S. (2004). Efficient access control and key management schemes for mobile agents. Computer Standards & Interfaces, 26(5), 423–433. CrossRef
Baek, J. W., & Yeom, H. Y. (2006). A timed mobile agent planning approach for distributed information retrieval in dynamic network environments. Information sciences, 176(22), 3347–3378. CrossRef
Lange, D. B., & Oshima, M. (1999). Seven good reasons for mobile agents. Communications of the ACM, 42(3), 88–89. CrossRef
Esparza, O., Muñoz, J. L., Soriano, M., & Forné, J. (2006). Secure brokerage mechanisms for mobile electronic commerce. Computer Communications, 29(12), 2308–2321. CrossRef
Chung, Y. F., Chen, Y. T., Chen, T. L., & Chen, T. S. (2011). An agent-based english auction protocol using elliptic curve cryptosystem for mobile commerce. Expert Systems with Applications, 38(8), 9900–9907. CrossRef
Nickalls, R. W. D. (1993). A new approach to solving the cubic: Cardan’s solution revealed. The Mathematical Gazette, 77(480), 354–359. CrossRef
Stallings, W. (2003). Cryptography and network security, principles and practices, 2003 (3rd ed.). India: Pearson Education.
Sarkar, P. (2010). A simple and generic construction of authenticated encryption with associated data. ACM Transactions on Information and System Security (TISSEC), 13(4), 33. CrossRef
National Institute of Standards FIPS PUB 197 and Technology (NIST). Advanced encryption standard. U.S. Department of Commerce, November 2001. Accessed Nov, 2010 from http://csrc.nist.gov/publications/fips/fips197/fips-197
Bellare, M., Boldyreva, A., & Micali, S. (2000). Public-key encryption in a multi-user setting: Security proofs and improvements. In International conference on the theory and application of cryptographic techniques, advances in Cryptology-EUROCRYPT 2000 (pp. 259–274). Bruges: Springer.
Roth, V., & Mehrdad, J. S. (1998). Access control and key management for mobile agents. Computers & Graphics, 22(4), 457–461. CrossRef
Saxena, N., Tsudik, G., & Yi, J. H. (2004). Access control in ad hoc groups. In International workshop on hot topics in peer-to-peer systems (HOT-P2P 2004) (pp. 2–7). Volendam: IEEE.
Nikooghadam, M., & Zakerolhosseini, A. (2012). Secure communication of medical information using mobile agents. Journal of Medical Systems, 36(6), 3839–3850. CrossRef
Vijayakumar, P., Anand, K., Bose, S., Maheswari, V., Kowsalya, R., & Kannan, A. (2012). Hierarchical key management scheme for securing mobile agents with optimal computation time. Procedia Engineering, 38, 1432–1443. CrossRef
Huang, K. H., Chung, Y. F., Liu, C. H., Lai, F., & Chen, T. S. (2009). Efficient migration for mobile computing in distributed networks. Computer Standards & Interfaces, 31(1), 40–47. CrossRef
Kim, Y., Perrig, A., & Tsudik, G. (2004). Group key agreement efficient in communication. IEEE Transactions on Computers, 53(7), 905–921. CrossRef
Odelu, V., Das, A. K., & Goswami, A. (2013). Lhsc: An effective dynamic key management scheme for linear hierarchical access control. In 5th international conference on communication systems and networks (COMSNETS 2013) (pp. 1–9). Bangalore: IEEE.
Odelu, V., Das, A. K., & Goswami, A. (2013). A new key management scheme for a user hierarchy based on a hybrid cryptosystem. SmartCR, 3(1), 42–54. CrossRef
Harn, L., & Xu, Y. (1994). Design of generalised elgamal type digital signature schemes based on discrete logarithm. Electronics Letters, 30(24), 2025–2026. CrossRef
Chuang, Y. H., & Tseng, Y. M. (2010). An efficient dynamic group key agreement protocol for imbalanced wireless networks. International Journal of Network Management, 20(4), 167–180. MATH
Standard, S. H. (1995). Department of commerce. VA: NIST, National Technical Information Service, Springfield.
Nikooghadam, M., Zakerolhosseini, A., & Moghaddam, M. E. (2010). Efficient utilization of elliptic curve cryptosystem for hierarchical access control. Journal of Systems and Software, 83(10), 1917–1929. CrossRef
Lauter, K. (2004). The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Communications, 11(1), 62–67. CrossRef
- DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Networks
Ashok Kumar Das
- Springer US