透過您的圖書館登入
IP:18.222.119.148
  • 學位論文

一個有效率的行動代理人有限期的階層式金鑰管理機制

An Efficient Date-constraint Hierarchical Key Management Scheme for Mobile Agents

指導教授 : 柯秀佳 鐘玉芳
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


行動代理人的優點在於執行任務(task)時可以恣意移動於不同環境之中,同時也會依照所處的環境進行自動偵測與自我修正(adapting),並完成使用者所指派的task。由於它具備了上述的這些特性,使得行動代理人可以廣泛的被應用在不同領域之中,像是電子商務、無線通訊與資訊安全技術等。在1983年,Akl和Taylor [1]提出了superkey的概念,解決了行動代理人的金鑰管理概念。之後在1998年,Volker和Mehrdad [2]提出樹狀架構的存取控制行動代理人模型。因此本篇論文將使用公開金鑰為基礎的概念和階層式行動代理人模型,並且加入橢圓曲線加密系統(Elliptic Curve Cryptosystem, ECC)的機制,使用橢圓曲線可以增加行動代理運算能力,因為橢圓曲線具有較短的金鑰長度和加密與解密時有較高的效能特性。此外,使用者在使用此階層式架構一段時間後,將會發生因故退出系統或變更使用權限的情形,此時,為了避免使用者繼續使用舊有的金鑰被非法延續使用,而系統必須不斷的更新金鑰,以變更金鑰原有的存取權限,此做法可能會引起不必要的錯誤與風險之外,同時系統也需花費大量的計算成本,因此,本篇論文將提出日期限制金鑰管理機制,以金鑰附加日期的方式,將金鑰賦予使用期限,如此一來,使金鑰管理更有效率。

並列摘要


The core competencies that a mobile agent possesses are free-roaming between different Internet environment, and autonomous environment detection and adaptation while executing the tasks that are assigned by the users. Because of these competencies, the concept of mobile agent is widely used in many different fields, such as Internet business, wireless communication, and information security technologies and etc... In 1983, Akl and Taylor [1] suggested the concept of superkey to resolve the key management issues faced by the mobile agent. Later in 1998, Volker and Mehrdad [2] proposed a tree base mobile agent model for access control. The proposed paper would be based upon the studies of public key and a hierarchical mobile agent model with addition of Elliptic Curve Cryptosystem (ECC). ECC enhances the operational ability of mobile agent model, because of shorter key length and higher efficiency on encryption and decryption. Besides, after using this hierarchical structure for a period of time, user will be log out of the system due to error or change in user rights. At this time, to prevent a user from illegally continuing to use the old key, the system must continue to update the key in order to change the original access rights of the key, this action could cause unnecessary error and risks and at the same time the system also needs to perform large amount of computations. Therefore, this paper proposes Date-constraint key management scheme, where a date is attached to the key, so as to give a validity period to the key. Thus, key management can be more efficient.

參考文獻


[1] S. G. Akl, P. D. Taylor(1983), “Cryptographic solution to a problem of access control in a hierarchy,” ACM Transactions on Computer Systems” Vol. 1, Issue 3, pp. 239– 248.
[2] R. Volker, J.S. Mehrdad(1998), “Access control and key management for mobile agents,” Computer Graphics, Vol. 22, Issue 4, pp. 457– 461.
[3] A. Karmouch(1998), “Mobile Software Agents for Telecommunications,” Guest Editorial, IEEE Communications Magazine, Vol. 36, No. 7, July, pp. 24-25.
[4] I. C. Lin, H. H. Ou, M. S. Hwang(2004), “Efficient access control and key management schemes for mobile agents,” Computer Standards & Interfaces, Vol. 26, No. 5, pp. 423–433.
[5] F. Hohl(1998), “A model of attacks malicious hosts against mobile agents,” Proceedings of the 4th Workshop on Mobile Object Systems: Secure Internet Mobile Computations, Brussels, Belgium, pp. 105–120.

延伸閱讀