ABADAM: un Modelo de Seguridad para el Acceso a Bases de Datos Utilizando Agentes Móviles

Abadam: A Security Model To Databases Access Using Mobile Agents

  • David Antonio Franco Borré Universidad de Cartagena
  • Yasmín Moya Villa Universidad de Cartagena y Universidad Tecnológica de Bolíva
  • Moisés Quintana Álvarez Universidad Tecnológica de Bolívar de Cartagena
  • Miguel Angel García Bolaños Universidad de Cartagena
  • Julio Cesar Rodríguez Ribón Universidad de Cartagena
Palabras clave: Agentes Móviles, Aglets, Base de Datos Disribuida, Java, MS SQL Server (es_ES)

Resumen (es_ES)

En este artículo se analizan aspectos concernientes a los agentes móviles y los problemas de seguridad que estos conllevan, presentando un modelo o esquema para acceder a una base de datos que permita mejorar los tiempos de respuestas en la red y crear un modelo de seguridad que colabore en el proceso de autenticación de los usuarios. El modelo propuesto se ha denominado ABADAM (Acceso a BAses de Datos utilizando Agentes Móviles), ABADAM se implementó utilizando: el lenguaje de programación Java, la API Aglets y MS-SQL Server. ABADAM brinda un alto nivel de seguridad para proteger al servidor de base de datos de ataques de agentes maliciosos, permitiendo el acceso solo a los agentes válidos. La seguridad está basada fundamentalmente en el proceso de autenticación o identificación de los agentes que lleguen al servidor, este proceso será capaz de detectar agentes no válidos y los eliminará al con- siderarlos agentes maliciosos. Además si algún usuario mal intencionado creara un agente móvil con login y password válidos no podrá realizar la autenticación al no portar la credencial que lo acredite como un agente confiable y sería destruido inmediatamente.

Resumen (en_US)

This article analyze aspects related to the mobile agents and security problems these entail, presenting a model access to databases that allow in a high degree to improve the response times in the network and to create a security model that collaborates with user’s authentication process. The proposed model has denominated ABADAM (Access to Databases using Mobile Agents), ABADAM was implemented using: the Java programming language, API Aglets and MS-SQL Server. ABADAM offers a high level of security to protect the database server from malicious agents attacks, allowing access to the valid agents only. The security is based fundamentally on the authentication or identification process of agents that arrive to the server, this process will be able to detect non-valid agents and it will eliminate when considering them malicious agents. In addition if some ill-disposed user created a mobile agent with login and password valid will not be able to make the authentication when it will not be carrying the credential that credits it as a reliable agent and it would be destroyed immediately.

Descargas

La descarga de datos todavía no está disponible.

Referencias

Wang Yan y Law, K.C.K. A mobile agent based system for distributed database access on the Internet. Communication Technology Proceedings, 2000. WCC - ICCT 2000. International Conference on Volume 2, 21-25 Aug. 2000 Page(s):1587 - 1590 vol.2

Haq, M.A. y Matsumoto, M. MAMI: mobile agent based system for mobile internet. Advanced Communication Technology, 2004. The 6th International Conference on Volume 2, 2004 Page(s): 567 ­ 572.

Danny Lange y Mitsuru Oshima, Programming and Deploying Java Mobile Agents with Aglets. Addison Wesley Professional. 1998.

Danny Lange y Mitsuru Oshima, "Mobile Agentes: Enviroments, Technologies and Applications". Proceedings of the Practical Applications of intelligent Agents and MultiAgent Technology Conference, 1998.

Venners Bill, "Solve real problems with aglets, type of mobile agent". JavaWorld ­ Under the hood Magazine, Mayo 1997, pp. 2-4.

M.C. Man y V.K. Wei, "A Taxonomy for Attacks on Mobile Agent", IEEE EUROCON'2001 Trends in Communications, Vol.2. 2001, pp. 385-388.

G. Vigna, "Mobile Agents and Security", Lectura notes in Computer Science, 1998.

Niklas Borselius, "Mobile agente security", Electronics & Communication Engineering Journal. Vol. 14. 2002, pp. 211-218. 2002.

Danny Lange y Mitsuru Oshima, Programming and Deploying Java Mobile Agents with Aglets. Addison Wesley Professional. 1998, pp. 176-178.

Scott Oaks, Java Security. O'reilly & Associates, Inc. 2001, pp 618.

Yu Jiao, Ali R Hurson. Journal of Database Management. Hershey: Oct-Dec 2004. Vol. 15, Iss. 4; p. 1 (24 pages)

Papastavrou, S.; Samaras, G.; Pitoura, E. Mobile agents for WWW distributed database access. Data Engineering, 1999. Proceedings., 15th International Conference on 23-26 Mar 1999.Page(s): 228-237

U.P. Kulkarni; K.K. Tangod; S. R. Mangalwede; A.R. Yardi. Exploring the Capabilities of Mobile Agents in Distributed Data Mining. Database Engineering and Applications Symposium, 2006. IDEAS '06. 10th International. Dec. 2006. Page(s): 277-280

Win, T.; Khin Mar Lar Tun. Mobile Agent Cooperation Methods in Hybrid Query Optimization. Information and Telecommunication Technologies, 2005. APSITT 2005 Proceedings. 6th Asia-Pacific Symposium on 09-10 Nov. 2005. Page(s): 71- 76

Zhen-Peng Liu; Li-Li Zhu; Jian-Min Xu; Wan-Sheng Tang. A Platform of Mobile Agent Based on Distributed WEB Database. Machine Learning and Cybernetics, 2006 International Conference on Aug. 2006. Page(s): 192-197

Walsh, T.; Paciorek N. y Wong, D. Security and Reliability in Concordia. Mitsubishi Electric ITA, Horizon System Laboratory. USA, 1998.

O´Hare, G. y Jennings, N. Foundations of Distributed Artificial Intelligence. John Wiley & Sons. 1996.

Piccolo, F.L.; Bianchi, G.; Salsano, S. A measurement study of the mobile agent JADE platform. World of Wireless, Mobile and Multimedia Networks, 2006. WoWMoM 2006. International Symposium on a 26-29 June 2006 Page(s):6 pp.

Rana, T.A. Mobile Agents Host Security with Access Control. Computational Intelligence for Modelling, Control and Automation, 2006 and International Conference on Intelligent Agents, Web Technologies and Internet Commerce, International Conference on Nov. 2006 Page(s): 232-232.

Ching Lin; Vijay Varadharajan; Yan Wang; Vineet Pruthi. Trust enhanced security for mobile agents. E-Commerce Technology, 2005. CEC 2005. Seventh IEEE International Conference on 19-22 July 2005 . Page(s): 231- 238.

Fragkakis, Michail; Alexandris, Nikolaos. Comparing the Trust and Security Models of Mobile Agents. Information Assurance and Security, 2007. IAS 2007. Third International Symposium on 29-31 Aug. 2007 Page(s): 363368

Cómo citar
Franco Borré, D. A., Moya Villa, Y., Quintana Álvarez, M., García Bolaños, M. A., & Rodríguez Ribón, J. C. (2007). ABADAM: un Modelo de Seguridad para el Acceso a Bases de Datos Utilizando Agentes Móviles. Ingeniería, 13(1), 58 - 66. https://doi.org/10.14483/23448393.2089
Publicado: 2007-11-30
Sección
Ciencia, investigación, academia y desarrollo