Analyzing strategies of mobile agents on malicious cloud platform with Agent-Based Computational Economic Approach
Highlights
► The behaviors of cheatings and resistances of buyers and sellers in the malicious cloud platform are modeled as a mathematical model called Eavesdropping and Resistance of Negotiation (ERN) Game. ► The strategies of buyers and sellers in the ERN Game are analyzed with Agent-Based Computational Economic Approach. ► The simulation results show the both cooperative strategies are emerged from buyers and sellers in the ERN Game.
Introduction
Cloud computing is an emerging service model enabling mobile devices to reduce the energy consumptions and to execute diversity services on the clouds remotely. A mobile agent is a software program executed in the clouds on behalf of the software installed in a mobile device such as PDA, smart phone, or tablet PC to remotely execute jobs or to interact with other mobile agents. Integrating the mobile agents into the clouds, the mobile devices are energy efficient and resources saving, which enables a diversity of applications in the Mobile Commerce in the literatures (Aversa et al., 2010, Oberheide et al., 2008, Shih et al., 2007).
The mobile agents are able to negotiate with other mobile agents on behalf of users (Bartolini et al., 2005, Fasli, 2007). The mobile agents are thus used to build services in Mobile Commerce (An et al., 2010, Tsaur, 2012). Security is one of the most important considerations in mobile agent based applications (Cavalcante et al., 2012). It is generally agreed that it is difficult for mobile agents to prevent eavesdropping attacks from cloud platform (Dadhich et al., 2010, Oberheide et al., 2008). When the mobile agents dispatched to a malicious platform of clouds (or malicious platform, for short), the malicious cloud platform can eavesdrop on the negotiation plan carried by the mobile agents, which is called the “Malicious platform eavesdropping attack”. It is hard to prevent such attacks from two reasons: (1) The malicious platform can read and execute any instructions of the mobile agent (Adane, Adane, & Sathe, 2007). (2) The malicious platform can intercept secret communications of mobile agents (Cavalcante et al., 2012).
Based on “Malicious platform eavesdropping attack”, the sellers’ mobile agents can cheat buyers’ mobile agents in negotiation to seize buyers’ profits according to negotiation plans of buyers’ agents discoursed by malicious platform. As illustration in Fig. 1, a buyers’ mobile agent is executed on the malicious platform on behalf of the software installed in the mobile device for negotiation with other mobile agents. The malicious platform can eavesdrop of the buyers’ negotiation plans and disclose those to the sellers’ mobile agents. Thus, the seller’s mobile agent can tailor its negotiation plan to seize buyer’s profits. Such cheating behaviors will discourage people to use mobile agents based negotiation applications in the clouds.
Knowing sellers may cheat in negotiations, a buyer thus resist sellers’ cheating by adjustment of his negotiation plan with extremely low demand (i.e., very low demand price) before migrate to the cloud platform in order to lower the deal price in negotiation for decreasing the sellers’ profits. Above resistance from buyers may make the sellers take honest actions. Above situations between buyers and sellers are mathematically modeled as a Normal-Form Game model in Game Theory (Branzei, Dimitrov, & Tijs, 2008), called Eavesdropping and Resistance of Negotiation Game (ERN Game). The behaviors and strategies adopt by buyers and sellers playing ERN Game are analyzed by an economic analysis model, Agent Based Computation Economic (ACE) Model.
The Agent Based Computation Economics (ACE) is an analysis model of a dynamic system consisting of economic processes interacting agents (Laib and Radjef, 2011, Tesfatsion, 2006). To study the strategies will be evolved between buyers and sellers, an artificial economy consisting of buyers and sellers playing the ERN Game is constructed. The simulation results show the buyers’ resistances will deter from sellers’ cheating behaviors and the cooperative strategies of buyers and sellers will be emerged.
The rest of this paper is organized as follows. In Section 2, we present the Eavesdropping and Resistance of Negotiation Game (ERN) model. In Section 3, the Agent Based Computation Economic (ACE) Modeling for ERG model is presented. The simulation results of strategies and behaviors in playing ERN Game based on ACE modeling is presented in Section 4. Finally, some concluding presented in Section 5.
Section snippets
Eavesdropping and Resistance of Negotiation Game
We first define the preliminary and then model the misbehavior and the resilience between the buyers and sellers. In the last subsection, we formally formulate the Eavesdropping and Resistance of Negotiation Game (ERN Game).
Agent Based Computation Economic
In this section, we introduce the overview of ACE and the framework called Trade Network Game (TNG) and its pseudo-code in Section 3.1. The design of agent is described in Section 3.2.
Simulations
In this section, we simulate a virtual economics for evaluating the co-evolutionary of strategies in ERN Game. The economics model is based on Trade Network Game model, which consists of buyers and sellers under the parameters for simulating the trade market. The simulator is implemented on C++ language, which is extended from the source code developed by McFadzean, Stewart, and Tesfatsion (2001).
The parameters used in simulation are listed in Table. 2. A virtual market is simulated in the
Conclusions
In this paper, we study the problem about the behaviors of negotiation plans carried by mobile agents are easily to be eavesdropped on the malicious cloud platforms. Two research questions in buyers’ resistance to resist the sellers’ cheating are studied: (1) What is an analytic behavior model of buyers and sellers, (2) What are the strategies co-evolved by buyers and sellers? Aiming at the Question (1), we model above situations between buyers and sellers as Eavesdropping and Resistance of
References (14)
- et al.
A survey of security in multi-agent systems
Expert Systems with Applications
(2012) - et al.
Automated traders in commodities markets: Case of producer–consumer institution
Expert Systems with Applications
(2011) - et al.
Morvam: A reverse Vickrey auction system for mobile commerce
Expert Systems with Applications
(2007) Agent-based computational economics: A constructive approach to economic theory
Handbook of Computational Economics
(2006)Secure communication for electronic business applications in mobile agent networks
Expert Systems with Applications
(2012)- Adane, D., Adane, P., & Sathe, S. (2007). Data privacy in mobile agent communication. In Proceeding of 2007 IEEE/IFIP...
- An, B., Lesser, V., Irwin, D., & Zink, M. (2010). Automated negotiation with decommitment for dynamic resource...
Cited by (6)
Survey of agent-based cloud computing applications
2019, Future Generation Computer SystemsA Bayesian Q-Learning Game for Dependable Task Offloading against DDoS Attacks in Sensor Edge Cloud
2021, IEEE Internet of Things JournalCloud-based on agent model for mobile devices
2017, Advances in Intelligent Systems and ComputingAn Entropy-Robust Optimization of Mobile Commerce System Based on Multi-agent System
2016, Arabian Journal for Science and EngineeringDesigning teaching strategies with an agent-based simulator
2016, Lecture Notes in Business Information ProcessingMagicNET: Mobile agents data protection system
2015, Transactions on Emerging Telecommunications Technologies