吉林大学学报(工学版) ›› 2013, Vol. 43 ›› Issue (增刊1): 221-224.

• 论文 • 上一篇    下一篇

移动代理同态加密主动保护技术研究

吴杰宏1, 张磊2, 张坡2, 石祥滨2   

  1. 1. 沈阳航空航天大学 工程训练中心,沈阳 110136;
    2. 沈阳航空航天大学 计算机学院, 沈阳 110136
  • 收稿日期:2012-05-27 发布日期:2013-06-01
  • 作者简介:吴杰宏(1971-),女,副教授,博士.研究方向:移动代理的安全,动态频谱存取协议及算法.E-mail:wujiehong07@gmail.com
  • 基金资助:

    国家自然科学基金项目(61170185);辽宁省科技厅博士启动基金项目(20101082);辽宁省教育厅科学技术项目(L2011030).

Research of mobile agent active protection based on homomorphism encryption technology

WU Jie-hong1, ZHANG Lei2, ZHANG Po2, SHI Xiang-bin2   

  1. 1. Engineering Training Center, Shenyang Aerospace University, Shenyang 110136, China;
    2. School of Computer, Shenyang Aerospace University, Shenyang 110136, China
  • Received:2012-05-27 Published:2013-06-01

摘要:

针对移动代理(MA)在异质网络环境中的安全问题,提出了一种同态加密主动保护策略。加密后的移动代理可在其它网络平台上运行而无需解密,MA及产生的结果数据最终由MA生成者解密,从而减少了中间环节的加、解密时间。该方案采用加乘同态加密三地址码操作数,组合函数加密三地址码操作码的保护策略,同时验证了加密、解密算法的正确性及安全性。实验结果表明,对比数据迷乱方法,该方案节省执行时间近1/3,并能及时侦测恶意主机。

关键词: 移动代理, 同态加密, 组合函数, 主动保护

Abstract:

As a new distributed computing technology of mobile agent(MA),agent is completely exposed in remote host and is easy to be isolated and attacked by the malicious host.Homomorphism encryption protecting scheme was put forward,aiming to solve the security problems of mobile agents migrating across heterogeneous network execution environments.Homomorphism idea was applied to mobile cryptography,and encrypted mobile codes could be executed directly on different platforms without decryption.Encrypted results were decrypted by MA creator,and decreasing executing time of handling process effectively.Addition-multiplication homomorphism (AMH) encryption strategy was introduced,encrypting steps were used as follows:three address operands are encrypted by AMH,three address operating codes are encrypted by composite function,and the correctness and security of encryption and decryption method were verified in this scheme at the same time.Experimental results show that by contrast to data obfuscation method,nearly 1/3 executing time will be saved using this protection scheme and the malicious hosts are detected timely.

Key words: mobile agent, homomorphism encryption, composite function, active protection

中图分类号: 

  • TP393

[1] Sander T,Tschudin C.Towards mobile cryptography [C]//In Proceedings of the IEEE Symposium on Security and Privacy,Oakland,CA,1998:215-224.

[2] Topaloglu U,Bayrak C.Secure mobile agent execution in virtual environment[J].Autonomous Agents and Multi-Agent Systems,2008,16(1):1-12.

[3] Jason C Hung,Chang Han-Bin,Chang Hsuan-Pu,et al.Evolution of ubiquitous autonomous agents[J].International Journal of Ad Hoc and Ubiquitous Computing,2009,4(6):334-343.

[4] Richard Ssekibuule.Mobile agent security against malicious platforms[J].Cybernetics and Systems,2010,41(7):522-534.

[5] Ching Lin,Vijay Varadharajan.Mobile trust:a trust enhanced security architecture for mobile agent systems[J].International Journal of Information Security,2010,9(3):153-178.

[6] Tsaur Woei-jiunn,Ho Chien-hao.A mobile agent protected scheme using pairing-based cryptosystems[J].International Journal of Mobile Communications,2005,3(2):183-196.

[7] 谭湘,顾敏清,包崇明.一种用于移动Agent 数据保护的机制[J].软件学报,2005,16(3):477-484. Tan Xiang,Gu Min-qing,Bao Chong-ming.A method for mobile agent data protection[J].Journal of Software,2005,16(3):477-484.

[8] 武小平,邢宏根,沈志东.基于分布式可信度量的移动代理安全应用模型研究[J].计算机工程与科学,2010,32(6):19-22. Wu Xiao-ping,Xing Hong-gen,Shen Zhi-dong.Research of a mobile agent secure model based on distributed trusted measurement[J].Computer Engineering & Science,2010,32(6):19-22.

[9] Apostolos P Fournaris.Trust ensuring crisis management hardware module[J].Information Security Journal:A Global Perspective,2010,19(2):74-83.

[10] Wu Jie-hong,Yin Hang,Chang Gui-ran.Study of mobile agents active protection in IDC network management[C]//2008 Chinese Control and Decision Conference,Yantai,China,2008:1309-1313.

[1] 金顺福,王宝帅,郝闪闪,贾晓光,霍占强. 基于备用虚拟机同步休眠的云数据中心节能策略及性能[J]. 吉林大学学报(工学版), 2018, 48(6): 1859-1866.
[2] 赵东,孙明玉,朱金龙,于繁华,刘光洁,陈慧灵. 结合粒子群和单纯形的改进飞蛾优化算法[J]. 吉林大学学报(工学版), 2018, 48(6): 1867-1872.
[3] 黄辉, 冯西安, 魏燕, 许驰, 陈慧灵. 基于增强核极限学习机的专业选择智能系统[J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[4] 傅文博, 张杰, 陈永乐. 物联网环境下抵抗路由欺骗攻击的网络拓扑发现算法[J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[5] 张维维, 何家峰, 高国旺, 任丽莉, 申铉京. 基于博弈论的无线Mesh网络路由与信道分配联合优化算法[J]. 吉林大学学报(工学版), 2018, 48(3): 887-892.
[6] 蔡振闹, 吕信恩, 陈慧灵. 基于反向细菌优化支持向量机的躯体化障碍预测模型[J]. 吉林大学学报(工学版), 2018, 48(3): 936-942.
[7] 韩家伟, 刘衍珩, 孙鑫, 宋立军. 基于量子密钥和云服务的身份加密方案[J]. 吉林大学学报(工学版), 2018, 48(2): 551-557.
[8] 董坚峰, 张玉峰, 戴志强. 改进的基于狄利克雷混合模型的推荐算法[J]. 吉林大学学报(工学版), 2018, 48(2): 596-604.
[9] 张维维, 何家峰, 高国旺, 任丽莉, 申铉京. 混合式无线Mesh网络路由与信道分配联合优化[J]. 吉林大学学报(工学版), 2018, 48(1): 268-273.
[10] 石文孝, 孙浩然, 王少博. 无线Mesh网络信道分配与路由度量联合优化算法[J]. 吉林大学学报(工学版), 2017, 47(6): 1918-1925.
[11] 刘磊, 刘利娟, 吴新维, 张鹏. 基于ECPMR的编译器测试方法[J]. 吉林大学学报(工学版), 2017, 47(4): 1262-1267.
[12] 董立岩, 王越群, 贺嘉楠, 孙铭会, 李永丽. 基于时间衰减的协同过滤推荐算法[J]. 吉林大学学报(工学版), 2017, 47(4): 1268-1272.
[13] 于斌斌, 武欣雨, 初剑峰, 胡亮. 基于群密钥协商的无线传感器网络签名协议[J]. 吉林大学学报(工学版), 2017, 47(3): 924-929.
[14] 赵东, 臧雪柏, 赵宏伟. 基于果蝇优化的随机森林预测方法[J]. 吉林大学学报(工学版), 2017, 47(2): 609-614.
[15] 董颖, 周占颖, 苏真真, 徐洋, 钱志鸿. 基于路由信息的无线传感器网络跨层MAC协议[J]. 吉林大学学报(工学版), 2017, 47(2): 647-654.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!