MDA-based Approach for Implementing Secure Mobile Agent Systems - - PowerPoint PPT Presentation

mda based approach for implementing secure mobile agent
SMART_READER_LITE
LIVE PREVIEW

MDA-based Approach for Implementing Secure Mobile Agent Systems - - PowerPoint PPT Presentation

Development and Control of Distributed Applications MDA-based Approach for Implementing Secure Mobile Agent Systems Slim Kallel , Molka Rekik, Monia Loulou, and Ahmed Hadj Kacem Workshop on Agent Oriented Software Engineering ReDCAD Lab.


slide-1
SLIDE 1

MDA-based Approach for Implementing Secure Mobile Agent Systems

Slim Kallel, Molka Rekik, Monia Loulou, and Ahmed Hadj Kacem ReDCAD Lab. University of Sfax, Tunisia Slim.kallel@fsegs.rnu.tn

Workshop on Agent Oriented Software Engineering AOSE 2012 04.06.2012

Development and Control of Distributed Applications

slide-2
SLIDE 2

Security policies and mobility concepts in MAS

 Security rules play a relevant role in MAS, but

 They are often only an afterthought during the development process  Managing these rules in ad-hoc manner negatively affects the quality of the

system

 Mobile Agents  Migrate through the network from one location to another  Be closer to services and resources to adequately perform its goals 2

slide-3
SLIDE 3

Ensuring security rules

 Static verification

 Most reliable means for this purpose  Not always feasible

 Runtime verification

 A formal specification of the security properties to be verified  Mechanisms to verify the specified properties during program execution

3

Ensuring that MAS exhibits security rules is crucial in many application domains

slide-4
SLIDE 4

Motivation

 The security rules are generally used only to control the resources access

  • f mobile agents.

4

slide-5
SLIDE 5

Motivation

 The security rules are generally used only to control the resources access

  • f mobile agents.

 Lack of a holistic and generic approach for security policies in MAS

These policies are often ignored during the development process

The existing approaches do not consider the implementation on several mobile agents platforms; they take into account only one platform.

5

slide-6
SLIDE 6

Motivation

 The security rules are generally used only to control the resources access

  • f mobile agents.

 Lack of a holistic and generic approach for security policies in MAS  The impact of security policies on modularity

 The code implementing security policies is not modularized  The evolution problem

6

slide-7
SLIDE 7

Our approach

MDS4MAS: Model Driven Security for Mobile Agent Systems

slide-8
SLIDE 8

Our approach

 Combines formal methods, model driven architecture, and aspect-oriented

programming

 Covers the whole development process, including

 Formal specification and verification  Platform Independent and specific modeling  Runtime enforcement

 Bridges the gap between the development process steps 8

MDS4MbAS: An end-to-end approach for specifying and enforcing security policies in Mobile Agent Systems

slide-9
SLIDE 9

Functional Application Code

MDS4MAS Approach

Consistency verification Aspect Templates

Secure MAS Modeling (UML+OCL)

Specification And Verification Modeling Implementation

Formal Specification of NFP

Aspects

AGLETS-platform Modeling

Java Templates

Aspect Code Generator

slide-10
SLIDE 10

10

MobileAgent AgentSystem Host CResource Data Service

SRule SEntity SObject Action SPolicy

Specification and Verification Application Modeling Runtime Enforcement

Formal Specification

slide-11
SLIDE 11

 Using Z/EVES, as a semi-atomatic theorem prover, we formally

verified

 The consistency of Z specications  Other domain-specific properties. 11

Specification and Verification Application Modeling Runtime Enforcement

Formal Verification

slide-12
SLIDE 12

M2

Meta- model

PIMM : SecureMbAS Meta-model

MobilityPackage

import

M1

Model

PSM : AGLETS Model

MyAGLETSPackage

PIM : SecureMbAS Model

import

Mapping - ATL

Conform to

SecurityPackage MyMobilityPackage MySecurityPackage

Conform to Conform to

PSMM : AGLETS Meta-model

AGLETSPackage

Specification and Verification Application Modeling Runtime Enforcement

MDA based approach

slide-13
SLIDE 13

11

Specification and Verification Application Modeling Runtime Enforcement

PIMM

slide-14
SLIDE 14

14

Specification and Verification Application Modeling Runtime Enforcement

Part of the UML profile

slide-15
SLIDE 15

 The code generation process is composed of two parts:  The generation of the functional code including the mobility concepts.  A Java code is automatically generated from the AGLETS specific

model, which does not contain any security related code.

 The generation of security code, which is obtained automatically from

the OCL constraints describing the security constraints.

 An aspectJ aspect is automatically generated from each OCL

constraints

15

Specification and Verification Application Modeling Runtime Enforcement

Code generation process

slide-16
SLIDE 16

16 16 PIM PSM Code Génération

Model-2-Text Model-2-Text M2

Meta- model

Java Aspects

Weaving

PIMM : SecureMbAS Meta-model

MobilityPackage

import

M1

Model

PSM : AGLETS Model

MyAGLETSPackage

PIM : SecureMbAS Model

import Template UML2AspectJ Code

Model-2-Model

Template UML2JAVA

Mapping

Conform to

SecurityPackage MyMobilityPackage MySecurityPackage

Conform to Conform to

PSMM : AGLETS Meta-model

AGLETSPackage

slide-17
SLIDE 17

17

Specification and Verification Application Modeling Runtime Enforcement

Aspect Template

package MyAgletProfile; public class Buyer extends Aglet { ……. public void toBuy() { // Start of user code for

  • peration toBuy

// TODO should be implemented // End of user code } .…… } public aspect SR1{ pointcut SR1pc() : execution (public * Buyer.toBuy(..)); around () : SR1pc() { ........ if (allOCLConstraintsAreSatisfieted) { proceed(); } else { System.out.println ("You can not execute this action ..."); } } }

pointcut advice weaving

slide-18
SLIDE 18

18

Conclusion

 A framework for modeling mobile agent systems and their security

policies.

 A model specific to AGLETS platform automatically obtained.  A functional application code from the AGLETS model.  An AspctJ aspects to verify at runtime the specified security

constraints.

slide-19
SLIDE 19

 Work on the MDS4MAS approach

 Automatically generating UML model from Z formal

specification

 Verifying the model transformation

 Work on applying MDS4MAS to other MA platform

 E.g, JADE

 Work on applying our approach for verifying and enforcing

  • ther properties of mobile agent systems

 E.g., Temporal properties

19

Future Work

slide-20
SLIDE 20

20

Questions

Slim Kallel Slim.kallel@fsegs.rnu.tn