mda based approach for implementing secure mobile agent
play

MDA-based Approach for Implementing Secure Mobile Agent Systems - PowerPoint PPT Presentation

Development and Control of Distributed Applications MDA-based Approach for Implementing Secure Mobile Agent Systems Slim Kallel , Molka Rekik, Monia Loulou, and Ahmed Hadj Kacem Workshop on Agent Oriented Software Engineering ReDCAD Lab.


  1. Development and Control of Distributed Applications MDA-based Approach for Implementing Secure Mobile Agent Systems Slim Kallel , Molka Rekik, Monia Loulou, and Ahmed Hadj Kacem Workshop on Agent Oriented Software Engineering ReDCAD Lab. AOSE 2012 University of Sfax, Tunisia Slim.kallel@fsegs.rnu.tn 04.06.2012

  2. Security policies and mobility concepts in MAS  Security rules play a relevant role in MAS, but  They are often only an afterthought during the development process  Managing these rules in ad-hoc manner negatively affects the quality of the system  Mobile Agents  Migrate through the network from one location to another  Be closer to services and resources to adequately perform its goals 2

  3. Ensuring security rules Ensuring that MAS exhibits security rules is crucial in many application domains  Static verification  Most reliable means for this purpose  Not always feasible  Runtime verification  A formal specification of the security properties to be verified  Mechanisms to verify the specified properties during program execution 3

  4. Motivation  The security rules are generally used only to control the resources access of mobile agents. 4

  5. Motivation  The security rules are generally used only to control the resources access of mobile agents.  Lack of a holistic and generic approach for security policies in MAS These policies are often ignored during the development process  The existing approaches do not consider the implementation on several  mobile agents platforms; they take into account only one platform. 5

  6. Motivation  The security rules are generally used only to control the resources access of mobile agents.  Lack of a holistic and generic approach for security policies in MAS  The impact of security policies on modularity  The code implementing security policies is not modularized  The evolution problem 6

  7. Our approach MDS4MAS: Model Driven Security for Mobile Agent Systems

  8. Our approach MDS4MbAS: An end-to-end approach for specifying and enforcing security policies in Mobile Agent Systems  Combines formal methods, model driven architecture, and aspect-oriented programming  Covers the whole development process, including  Formal specification and verification  Platform Independent and specific modeling  Runtime enforcement  Bridges the gap between the development process steps 8

  9. MDS4MAS Approach Formal Specification of NFP Specification Consistency verification And Verification Secure MAS Modeling (UML+OCL) Modeling AGLETS-platform Modeling Implementation Java Templates Aspect Templates Aspects Aspect Code Generator Functional Application Code

  10. Specification and Verification Application Modeling Runtime Enforcement Formal Specification Host CResource Data SObject AgentSystem MobileAgent Service SEntity SRule Action SPolicy 10

  11. Specification and Verification Application Modeling Runtime Enforcement Formal Verification  Using Z/EVES, as a semi-atomatic theorem prover, we formally verified  The consistency of Z specications  Other domain-specific properties. 11

  12. Specification and Verification Application Modeling Runtime Enforcement MDA based approach PIMM : SecureMbAS Meta-model PSMM : AGLETS Meta-model M2 SecurityPackage MobilityPackage Meta- AGLETSPackage import model Conform to Mapping - ATL Conform to Conform to PSM : AGLETS Model PIM : SecureMbAS Model M1 import MyMobilityPackage MySecurityPackage MyAGLETSPackage Model

  13. Specification and Verification Application Modeling Runtime Enforcement PIMM 11

  14. Specification and Verification Application Modeling Runtime Enforcement Part of the UML profile 14

  15. Specification and Verification Application Modeling Runtime Enforcement Code generation process  The code generation process is composed of two parts:  The generation of the functional code including the mobility concepts.  A Java code is automatically generated from the AGLETS specific model, which does not contain any security related code.  The generation of security code, which is obtained automatically from the OCL constraints describing the security constraints.  An aspectJ aspect is automatically generated from each OCL constraints 15

  16. PIM PIMM : SecureMbAS Meta-model PSMM : AGLETS Meta-model PSM M2 Code Génération SecurityPackage MobilityPackage Meta- AGLETSPackage import model Conform to Mapping Conform to Conform to PSM : AGLETS Model PIM : SecureMbAS Model import M1 MyMobilityPackage MySecurityPackage MyAGLETSPackage Model Model-2-Model Model-2-Text Model-2-Text Template Template Java Aspects UML2AspectJ UML2JAVA Code Weaving 16 16

  17. Specification and Verification Application Modeling Runtime Enforcement Aspect Template package MyAgletProfile; public aspect SR1{ public class Buyer extends Aglet pointcut SR1pc() : execution (public * { pointcut Buyer.toBuy(..)); weaving ……. around () : SR1pc() public void toBuy() { ........ { if (allOCLConstraintsAreSatisfieted) { // Start of user code for advice proceed(); operation toBuy } // TODO should be implemented else { // End of user code System.out.println ("You can not } execute this action ..."); .…… } } } } 17

  18. Conclusion  A framework for modeling mobile agent systems and their security policies.  A model specific to AGLETS platform automatically obtained.  A functional application code from the AGLETS model.  An AspctJ aspects to verify at runtime the specified security constraints. 18

  19. Future Work  Work on the MDS4MAS approach  Automatically generating UML model from Z formal specification  Verifying the model transformation  Work on applying MDS4MAS to other MA platform  E.g, JADE  Work on applying our approach for verifying and enforcing other properties of mobile agent systems  E.g., Temporal properties 19

  20. Questions Slim Kallel Slim.kallel@fsegs.rnu.tn 20

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend