Agent Based Transaction System CS790: Dr. Bruce Land Sanish Mondkar Sandeep Chakravarty.

Slides:



Advertisements
Similar presentations
DISTRIBUTED COMPUTING PARADIGMS
Advertisements

Agents & Mobile Agents.
Comparison Study of Three Mobile Agent Systems Aglets, Grasshopper and Voyager Qunhua Zhao, Hua Wang and Yi Zhang Department of Computer Science and Engineering.
Understanding Code Mobility
Mobile Agents Mouse House Creative Technologies Mike OBrien.
Introduction Why do we need Mobile OGSI.NET? Drawbacks:
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
The Mobile Code Paradigm and Its Security Issues Anthony Chan and Michael Lyu September 27, 1999.
Copyright © 2001 Qusay H. Mahmoud RMI – Remote Method Invocation Introduction What is RMI? RMI System Architecture How does RMI work? Distributed Garbage.
28.2 Functionality Application Software Provides Applications supply the high-level services that user access, and determine how users perceive the capabilities.
Chapter 19: Network Management Business Data Communications, 4e.
1 Mobile Agent Instructor: Dr. AGGARWAL Presenter: Liu Lun.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
System Architecture  you should list the layered Architecture  Understand the ISO/OSI model used in data communications  Understand the differences.
ATSN 2009 Towards an Extensible Agent-based Middleware for Sensor Networks and RFID Systems Dirk Bade University of Hamburg, Germany.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
Institute for Visualization and Perception Research 1 © Copyright 1998 Haim Levkowitz Automated negotiations The best terms for all concerned Tuomas Sandholm.
WNT Client/Server SDK Tony Vaccaro CS699 Project Presentation.
The Mobile Code Paradigm and Its Security Issues Anthony Chan September 13, 1999.
AgentOS: The Agent-based Distributed Operating System for Mobile Networks Salimol Thomas Department of Computer Science Illinois Institute of Technology,
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
Distributed Process Implementation Hima Mandava. OUTLINE Logical Model Of Local And Remote Processes Application scenarios Remote Service Remote Execution.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Chapter Intranet Agents. Chapter Background Intranet: an internal corporate network based on Internet technology. Typically, an intranet can.
Protocol Architectures. Simple Protocol Architecture Not an actual architecture, but a model for how they work Similar to “pseudocode,” used for teaching.
Active Monitoring in GRID environments using Mobile Agent technology Orazio Tomarchio Andrea Calvagna Dipartimento di Ingegneria Informatica e delle Telecomunicazioni.
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
Source: George Colouris, Jean Dollimore, Tim Kinderberg & Gordon Blair (2012). Distributed Systems: Concepts & Design (5 th Ed.). Essex: Addison-Wesley.
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
 Protocols used by network systems are not effective to distributed system  Special requirements are needed here.  They are in cases of: Transparency.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Web Application Security Presented by Ben Lake. How the Web Works Hypertext Transfer Protocol (HTTP)  Application-level  Stateless Example  Web Browser.
DISTRIBUTED COMPUTING PARADIGMS. Paradigm? A MODEL 2for notes
UDT as an Alternative Transport Protocol for GridFTP Raj Kettimuthu Argonne National Laboratory The University of Chicago.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
MOBILE AGENTS What is a software agent ? Definition of an Agent (End-User point of view): An agent is a program that assists people and acts on their behalf.
Intrusion Tolerant Software Architectures Bruno Dutertre, Valentin Crettaz, Victoria Stavridou System Design Laboratory, SRI International
Transparent Mobility of Distributed Objects using.NET Cristóbal Costa, Nour Ali, Carlos Millan, Jose A. Carsí 4th International Conference in Central Europe.
Agent Communication Transfer Protocol (ACTP) Alexander Artikis, Jeremy Pitt and Christos Stergiou Imperial College of Science, Technology and Medicine,
Mobile Agents Babak Esfandiari. Types of Applications Dynamic load balancing. Dynamic service deployment. Intermittently connected systems.
ECI – electronic Commerce Infrastructure “ An application to the Shares Market ” Demetris Zeinalipour ( Melinos Kyriacou
Intelligent Agent Framework1 From Chapter 7 of Constructing Intelligent Agents with Java.
1 Object Oriented Logic Programming as an Agent Building Infrastructure Oct 12, 2002 Copyright © 2002, Paul Tarau Paul Tarau University of North Texas.
SCJ and EV3 Robots Leadership Election. Background Safety Critical Java – A safety critical programming model in Java EV3 mindstorms Lego Robot – A robot.
Institute for Visualization and Perception Research 1 © Copyright 1999 Haim Levkowitz Java-based mobile agents.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
EEL 5937 Mobile agents (2) EEL 5937 Multi Agent Systems Lotzi Bölöni.
Core and Framework DIRAC Workshop October Marseille.
1 Example security systems n Kerberos n Secure shell.
Sung-Dong Kim, Dept. of Computer Engineering, Hansung University Java - Introduction.
Presented by Edith Ngai MPhil Term 3 Presentation
Chapter 19: Network Management
Java Distributed Object System
Building Distributed Educational Applications using P2P
#01 Client/Server Computing
Mobile Agents.
Mobile Agents M. L. Liu.
A Component-based Architecture for Mobile Information Access
In Distributed Systems
Unit 8 Network Security.
#01 Client/Server Computing
Presentation transcript:

Agent Based Transaction System CS790: Dr. Bruce Land Sanish Mondkar Sandeep Chakravarty

What are mobile agents? A mobile agent is an active object that can move both data and functionality (code) to multiple places within a distributed system. Mobile agents are defined in formal terms as objects that have behavior, state, and location The set of events varies a bit from model to model, but the following is a list of the most common ones: Creation, Disposal, Dispatch, Arrival, Communication

Why mobile agents? There are several applications where the mobile agents paradigm can be used successfully solve existing problems. The following is a cross-section of possible problems: User passivity/data timeliness Multi-staged/multi-processed calculations Untrusted collaborators Low-reliability/partially-disconnected networks

Project Objectives To make a framework for mobile agents which would allow agents to move from node to node and execute at each node To incorporate security features so that agent activities are securely conducted To make the framework fully customizable so that a user can create his/her own agents as easily as creating applets and still use the facilities provided by the agent framework To study existing architectures for distributed systems and investigate the possibility of how an agent-based system can solve some of the inherent problems suffered by existing systems. To create a sample application that uses some of the features provided by the agent framework to do something useful.

Applet Vs Agents Applets do not carry state Applets are instantiated by the receiving client Applets do not travel to multiple hosts

Problem Areas Transportation Authentication Secrecy Standardization

Design for Agent Host AgentServer AgentSpawner IncomingRequestMonitor RequestServicer

Design for Agent Agent is a purely abstract class having some method declaration. Users wishing to write their own agents will have to: 1. Inherit their customized agent from the abstract class Agent and implement all the methods 2. The main agent task will have to be put in a method called run. This is the method which shall be called by each receiving host while starting the agent thread.

Agent Transfer Protocol Establish connection Send agent identity Receive result object Send agent Close connections

Security Issues Authentication Controlling agent activity User option for agent acceptance

Security:Our Implementation Digital Signatures Message Digests User option for agent acceptance Possible extension to SSL

Sample Application Bill Agent Transfer Agent Info Agent

Other Approaches IBM Aglets WorkBench Java RMI

Future Work... A layer of security can be added by using SSL for the agent transfer More study is needed to understand the feasibility of having an agent-based system AI algorithms can be used for making mobile agents equipped with negotiation capabilities

Future Work…contd. For Electronic Commerce applications, there should be a mechanism by which a agent should be able to pay for the services used. More work is needed to make the Agent Host more robust in handling various agents Agents need more error handling capabilities. In case an agent dies during a task, then the sender should be informed of the failed transaction

Conclusion Agent systems for groupware Existing problems are solved eg. Webcrawlers Network bandwidth optimally utilized