透過您的圖書館登入
IP:3.15.190.144
  • 學位論文

行動式代理人之安全機制設計—可移動式安全執行環境

MotorHome: A Secure and Portable Execution Environment for Mobile Agent

指導教授 : 莊裕澤

摘要


行動式代理人是一種可以自由地移動在各個主機上來執行使用者所交代的工作的物件。學界普遍地相信這樣的物件應用在電子商務、分散式系統和網際服務上,能夠帶來更方便的來提供客製化的服務。但是這樣優異的能力卻因為安全性上的考量,而讓使用者為之卻步。使用者會擔心行動式代理人在陌生未知的主機上執行時是否會被洗腦而無法正確的執行或是所攜帶的隱私資料會被窺視而被盜用。而主機也會擔心接受來訪的代理人來執行是否會造成系統資源被濫用,像病毒一樣造成系統當機,或是像木馬程式來盜取系統隱私資料。資訊安全的問題對行動式代理人來說是很重要的一個議題,能成功讓使用者來相信行動代理人執行的完整性以及資料的隱密性,另一方面也要能讓主機來確保來訪的代理人能夠合理的還使用系統資源。 既有保護行動代理人資訊安全的機制都還沒有一個很有效的方法來解決使用者安全的顧慮,於是本篇論文提出了一個新的系統架構來解決資安問題。本研究藉由一個可移動式的執行環境來提供行動式代理人直接行使系統資源的能力,不經由主機的應用程式和作業系統來避免主機惡意的攻擊,創造出一個獨立執行的環境。本篇論文提出了一個系統概念,並詳細地討論系統實做的方向,系統所需的注意事項,以及系統的流程。整合了虛擬機器監控器來提供分割系統硬體資源給主機擁有者和行動代理人,可動的虛擬機器和一簡單的作業系統來作為可動執行環境,以及一些相關的認證和竄改偵測的機制來建立一個安全的執行空間給行動式代理人自由的執行使用者交付的工作。

並列摘要


Mobile Agent is an object which can roam over the network freely to accomplish its jobs. Mobile Agent is so brilliant that can be applied in E-commerce, distributed system and web service to create customized application easily. However, because of the hostile network environment, user of Mobile Agent will concern about that Mobile Agent may be brainwash to break the execution integrity or peek the private information of Mobile Agent. In addition, host owner worry about that incoming agent may abuse his resource to crash the whole system, or leak out the host private data. These distrusts obstruct the development about Mobile Agent and the potential success of Mobile Agent. Current security schemes of Mobile Agent is not enough to convince the users trusting the Mobile Agent. In this thesis, we propose the MotorHome, a portable execution environment, which allows Mobile Agent to access system resources directly. The MotorHoem system integrate the virtual machine monitor to divide the system hardware resources into two parts, one is for host and the other is shared for Mobile Agent; the portable platform with virtual devices and a specific OS; authentication and tamper detection mechanisms. In this thesis, we propose the system concept and the system implementation guideline, clearly discussing about the implementation issues.

參考文獻


[2] A survey of virtual machine monitors. http://www-
[3] Trusted computing platform allicance.
[5] Karl Aberer and Zoran Despotovic. Managing trust in a peer-2-peer
on Operating systems principles, pages 164{177. ACM Press, 2003.
a mobile agent system. Technical Report TR-1997-15, 1997.

延伸閱讀