Strategies of mobile agents on malicious clouds

Yung Liang Lai, Hsueh Chi Shih, Jehn Ruey Jiang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review


Cloud computing is a service model enabling resources limited mobile devices to remotely execute tasks on the clouds. The Mobile Agent is a software program on behalf of the software installed in the mobile device to negotiate with other mobile agents in the clouds, which provides a diversity of automated negotiation based applications in Mobile Commences. However, the negotiation plans carried by mobile agents are easily be eavesdropped by the malicious cloud platforms, since the codes of mobile agents are read and executed on the cloud platform. Thus, the sellers can take cheat actions to increase their profits, which is to tailor the negotiation plans to seize buyers' profits after eavesdropping on buyers' negotiation plans. In this paper, we consider the buyers can take actions to resist the sellers' cheatings, that is the buyers can tailor their plans with extremely low demands before migrate to the cloud platform. Above situations are modeled as a mathematical model, called the Eavesdropping and Resistance of Negotiation (ERN) Game. We develop a simulator to simulate an artificial market for analyzing the behaviors on ERN Game. The simulation results show buyers' resistances deter sellers from cheating and cooperative strategies are adopted by buyers and sellers.

Original languageEnglish
Title of host publication18th Americas Conference on Information Systems 2012, AMCIS 2012
Number of pages7
StatePublished - 2012
Event18th Americas Conference on Information Systems 2012, AMCIS 2012 - Seattle, WA, United States
Duration: 9 Aug 201212 Aug 2012

Publication series

Name18th Americas Conference on Information Systems 2012, AMCIS 2012


Conference18th Americas Conference on Information Systems 2012, AMCIS 2012
Country/TerritoryUnited States
CitySeattle, WA


  • Cloud computing
  • Malicious cloud
  • Mobile agents
  • Mobile commerce
  • Negotiation
  • Trade network game


Dive into the research topics of 'Strategies of mobile agents on malicious clouds'. Together they form a unique fingerprint.

Cite this