Multi-agent security architecture for a Sharia compliant e-auction

Nor Aimuni Md Rashid, Norleyza Jailani, Rossilawati Sulaiman, Zuraidah Abdullah

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Electronic auction has introduced new processes in the way auction is conducted which require investigation to ensure compliancy to Sharia (Islamic principles that are based on Qur’an and Sunnah) rules. The use of mobile software agent in electronic auction marketplaces adds ubiquity power to the bidders. In particular it allows agents to quicker respond to local changes in auction marketplaces and make bidding strategy decisions faster than remote agents or human participants could. Nevertheless, mobile agent raises issues concerning malicious attacks from a variety of intervening sources that might alter the sensitive information it carries. A multi-agent based e-auction must fit the concept of halal trade and address the problems resulting from fraud activities in online auction. Most auction frauds such as bid shilling and bid shielding also violate Sharia transaction law. If an attacker gains information on sensitive data such as the maximum bid for the bidders, the information can be manipulated to artificially increase prices through bid shilling. A Sharia compliant e-auction must comply with Islamic business law and offer secure and trustworthy trading environment. This paper discusses findings of non-compliances to Sharia rules found in the case studies conducted on a number of major online auction systems. This paper focuses on addressing the bid shilling problem by proposing multi-agent security architecture for Sharia compliant e-auction which encompasses security protocols for mobile agent authentication and confidentiality of sensitive information. Mobile agents are used to carry bidders’ and sellers’ data. Cryptography protocol such as encryption/decryption, digital signature and hash function are used and applied on identified high and low risk data.

Original languageEnglish
Pages (from-to)345-355
Number of pages11
JournalJournal of Theoretical and Applied Information Technology
Volume70
Issue number2
Publication statusPublished - 2014

Fingerprint

Mobile agents
Auctions
Cryptography
Mobile Agent
Network protocols
Electronic document identification systems
Software agents
Hash functions
Online systems
Online Auctions
Shielding
Authentication
Electronics
Noncompliance
Information Gain
Bidding
Security Protocols
Software Agents
Digital Signature
Architecture

Keywords

  • Cryptography
  • E-Auction
  • Multi-Agent
  • Security
  • Sharia Compliant

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Multi-agent security architecture for a Sharia compliant e-auction. / Rashid, Nor Aimuni Md; Jailani, Norleyza; Sulaiman, Rossilawati; Abdullah, Zuraidah.

In: Journal of Theoretical and Applied Information Technology, Vol. 70, No. 2, 2014, p. 345-355.

Research output: Contribution to journalArticle

@article{b8c989a084e14dd49f8648601d2a45e9,
title = "Multi-agent security architecture for a Sharia compliant e-auction",
abstract = "Electronic auction has introduced new processes in the way auction is conducted which require investigation to ensure compliancy to Sharia (Islamic principles that are based on Qur’an and Sunnah) rules. The use of mobile software agent in electronic auction marketplaces adds ubiquity power to the bidders. In particular it allows agents to quicker respond to local changes in auction marketplaces and make bidding strategy decisions faster than remote agents or human participants could. Nevertheless, mobile agent raises issues concerning malicious attacks from a variety of intervening sources that might alter the sensitive information it carries. A multi-agent based e-auction must fit the concept of halal trade and address the problems resulting from fraud activities in online auction. Most auction frauds such as bid shilling and bid shielding also violate Sharia transaction law. If an attacker gains information on sensitive data such as the maximum bid for the bidders, the information can be manipulated to artificially increase prices through bid shilling. A Sharia compliant e-auction must comply with Islamic business law and offer secure and trustworthy trading environment. This paper discusses findings of non-compliances to Sharia rules found in the case studies conducted on a number of major online auction systems. This paper focuses on addressing the bid shilling problem by proposing multi-agent security architecture for Sharia compliant e-auction which encompasses security protocols for mobile agent authentication and confidentiality of sensitive information. Mobile agents are used to carry bidders’ and sellers’ data. Cryptography protocol such as encryption/decryption, digital signature and hash function are used and applied on identified high and low risk data.",
keywords = "Cryptography, E-Auction, Multi-Agent, Security, Sharia Compliant",
author = "Rashid, {Nor Aimuni Md} and Norleyza Jailani and Rossilawati Sulaiman and Zuraidah Abdullah",
year = "2014",
language = "English",
volume = "70",
pages = "345--355",
journal = "Journal of Theoretical and Applied Information Technology",
issn = "1992-8645",
publisher = "Asian Research Publishing Network (ARPN)",
number = "2",

}

TY - JOUR

T1 - Multi-agent security architecture for a Sharia compliant e-auction

AU - Rashid, Nor Aimuni Md

AU - Jailani, Norleyza

AU - Sulaiman, Rossilawati

AU - Abdullah, Zuraidah

PY - 2014

Y1 - 2014

N2 - Electronic auction has introduced new processes in the way auction is conducted which require investigation to ensure compliancy to Sharia (Islamic principles that are based on Qur’an and Sunnah) rules. The use of mobile software agent in electronic auction marketplaces adds ubiquity power to the bidders. In particular it allows agents to quicker respond to local changes in auction marketplaces and make bidding strategy decisions faster than remote agents or human participants could. Nevertheless, mobile agent raises issues concerning malicious attacks from a variety of intervening sources that might alter the sensitive information it carries. A multi-agent based e-auction must fit the concept of halal trade and address the problems resulting from fraud activities in online auction. Most auction frauds such as bid shilling and bid shielding also violate Sharia transaction law. If an attacker gains information on sensitive data such as the maximum bid for the bidders, the information can be manipulated to artificially increase prices through bid shilling. A Sharia compliant e-auction must comply with Islamic business law and offer secure and trustworthy trading environment. This paper discusses findings of non-compliances to Sharia rules found in the case studies conducted on a number of major online auction systems. This paper focuses on addressing the bid shilling problem by proposing multi-agent security architecture for Sharia compliant e-auction which encompasses security protocols for mobile agent authentication and confidentiality of sensitive information. Mobile agents are used to carry bidders’ and sellers’ data. Cryptography protocol such as encryption/decryption, digital signature and hash function are used and applied on identified high and low risk data.

AB - Electronic auction has introduced new processes in the way auction is conducted which require investigation to ensure compliancy to Sharia (Islamic principles that are based on Qur’an and Sunnah) rules. The use of mobile software agent in electronic auction marketplaces adds ubiquity power to the bidders. In particular it allows agents to quicker respond to local changes in auction marketplaces and make bidding strategy decisions faster than remote agents or human participants could. Nevertheless, mobile agent raises issues concerning malicious attacks from a variety of intervening sources that might alter the sensitive information it carries. A multi-agent based e-auction must fit the concept of halal trade and address the problems resulting from fraud activities in online auction. Most auction frauds such as bid shilling and bid shielding also violate Sharia transaction law. If an attacker gains information on sensitive data such as the maximum bid for the bidders, the information can be manipulated to artificially increase prices through bid shilling. A Sharia compliant e-auction must comply with Islamic business law and offer secure and trustworthy trading environment. This paper discusses findings of non-compliances to Sharia rules found in the case studies conducted on a number of major online auction systems. This paper focuses on addressing the bid shilling problem by proposing multi-agent security architecture for Sharia compliant e-auction which encompasses security protocols for mobile agent authentication and confidentiality of sensitive information. Mobile agents are used to carry bidders’ and sellers’ data. Cryptography protocol such as encryption/decryption, digital signature and hash function are used and applied on identified high and low risk data.

KW - Cryptography

KW - E-Auction

KW - Multi-Agent

KW - Security

KW - Sharia Compliant

UR - http://www.scopus.com/inward/record.url?scp=84919442329&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84919442329&partnerID=8YFLogxK

M3 - Article

VL - 70

SP - 345

EP - 355

JO - Journal of Theoretical and Applied Information Technology

JF - Journal of Theoretical and Applied Information Technology

SN - 1992-8645

IS - 2

ER -