Review of the main security problems with multi-agent systems used in e-commerce applications
- GONZÁLEZ BRIONES, Alfonso 1
- CHAMOSO, Pablo 2
- BARRIUSO, Alberto 1
-
1
Universidad de Salamanca
info
- 2 Catholic University of Daegu, Faculty of Information Technology, Daegu
ISSN: 2255-2863
Année de publication: 2016
Volumen: 5
Número: 3
Pages: 55-61
Type: Article
D'autres publications dans: ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal
Résumé
The ability to connect to the Internet from a wide variety of devices such as smart phones, IoT devices and desktops at anytime and anywhere, produces a large number of e-commerce transactions, such as purchases of clothes, ticket entrances for performances, or banking operations. The increasing number of these transactions has also created an increase in the number of threats and attacks by third parties to access user data banks. It is important to control the access procedure to user data so that the number of threats does not continue to grow. To do so, it is necessary to prevent unauthorized access, theft and fraud in electronic commerce, which is required to ensure the safety of these transactions. Many e-commerce platforms are developed through multi-agent-systems because they include certain advantages to control the product, resource management, task distribution, etc. However, there are a number of threats that can jeopardize the safety of the agents that make up the system. These issues must be taken into account in the development of these multi-agent systems. However, existing methods of development do not cover in depth the issue of security. It is necessary to present and classify the potential security flaws of multi-agent systems. Therefore, the present research presents a review of the main vulnerabilities that occur in multi-agent systems responsible for managing e-commerce applications, as well as the proposed solutions to the major security problems on these platform systems. The main conclusions provided by this research is the need to optimize security measures and enhance the different security solutions applied in e-commerce applications in order to prevent identity theft, access to private data, access control, etc. It is therefore essential to continue to develop the security methods employed in applications such as e-commerce as different types of attacks and threats continue to evolve.
Références bibliographiques
- Bijani, S., & Robertson, D. (2014). A review of attacks and security approaches in open multi-agent systems. Artificial Intel-ligence Review, 42(4), 607-636. https://doi.org/10.1007/s10462-012-9343-1
- Borselius, N. (2002, June). Security in multi-agent systems. In Proceedings of the 2002 International Conference on Security and Management (SAM'02) (pp. 31-36).
- Bouch, A. (2011). 3-D Secure: A critical review of 3-D Secure and its effectiveness in preventing card not present fraud. University of London, Londra, eri?im: http://www. 58bits. com/thesis/3-D_Secure. pdf, eri?im tarihi, 8, 2014.
- Cremonini, M., Omicini, A., & Zambonelli, F. (1999). Multi-agent systems on the Internet: Extending the scope of coordina-tion towards security and topology. InMulti-Agent System Engineering (pp. 77-88). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-48437-X_7
- Jung, Y., Kim, M., Masoumzadeh, A., & Joshi, J. B. (2012). A survey of security issue in multi-agent systems. Artificial Intelli-gence Review, 37(3), 239-260. https://doi.org/10.1007/s10462-011-9228-8
- Lokhande, P. S. (2013). E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures.
- Mouratidis, H., Giorgini, P., & Manson, G. (2003, July). Modelling secure multiagent systems. In Proceedings of the second in-ternational joint conference on Autonomous agents and multiagent systems (pp. 859-866). ACM. https://doi.org/10.1145/860575.860713
- Niranjanamurthy, M., & Chahar, D. D. (2013). The study of e-commerce security issues and solutions. International Journal of Advanced Research in Computer and Communication Engineering, 2(7), 2885-2895.
- Stallings, W., & Brown, L. (2008). Computer security. Principles and Practice.
- Viega, J., Bloch, J. T., & Chandra, P. (2001). Applying aspect-oriented programming to security. Cutter IT Journal, 14(2), 31-39.
- Wong, H. C., & Sycara, K. (2000). Adding security and trust to multiagent systems. Applied Artificial Intelligence, 14(9), 927-941. https://doi.org/10.1080/08839510050144886