Towards Trustworthy and Secure Kiosk Computing for Mobile Users

被引:1
|
作者
Zhou, Dong [1 ]
Inamura, Hiroshi [1 ]
机构
[1] DoCoMo USA Labs, Palo Alto, CA USA
关键词
D O I
10.1109/EUC.2008.170
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a users typical surrounding environment. Security is a Concern when integrating a mobile device with an environment kiosk. hi particular, the mobile user needs to he assured that the environment kiosk that he is using does not contain malicious code that may exploit his sensitive data on device, and that such sensitive data will not be left on the kiosk for attackers to exploit. In this paper, we present an OS-agnostic approach for trustworthy and secure kiosk computing. Our approach supports secure user session initiation, strong session isolation and quick session startup, and mitigates a number of security threats such as man-in-the-middle attack, session stealing attack, and keyboard tampering attack.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [1] Towards trustworthy kiosk computing
    Garriss, Scott
    Sailer, Reiner
    Caceres, Ramon
    van Doorn, Leendert
    Berger, Stefan
    Zhang, Xiaolan
    EIGHTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, : 41 - +
  • [2] Towards secure mobile cloud computing: A survey
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05): : 1278 - 1299
  • [3] Special Issue on Secure and Trustworthy Computing
    Sinanoglu, Ozgur
    Karri, Ramesh
    ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2016, 13 (01)
  • [4] Trustworthy ICs for secure embedded computing
    Cheng, Tim
    IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 516 - 516
  • [5] Trustworthy computing for secure smart cities
    Mansoor, Wathiq
    Varadarajan, Vijayakumar
    JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2021, 13 (03) : 183 - 184
  • [6] Towards a secure platform for distributed mobile object computing
    Lacoste, Marc
    Operating Systems Review (ACM), 2000, 34 (02): : 56 - 73
  • [7] Towards a Secure Mobile Edge Computing Framework for Hajj
    Rahman, Md. Abdur
    Hassanain, Elham
    Hossain, M. Shamim
    IEEE ACCESS, 2017, 5 : 11768 - 11781
  • [8] Towards Secure Data Distribution Systems in Mobile Cloud Computing
    Zhang, Jiang
    Zhang, Zhenfeng
    Guo, Hui
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (11) : 3222 - 3235
  • [9] Secure mobile computing
    Agrawal, DP
    Deng, HM
    Poosarla, R
    Sanyal, S
    DISTRIBUTED COMPUTING: IWDC 2003, 2003, 2918 : 265 - 278
  • [10] From Intent to Action: Nudging Users Towards Secure Mobile Payments
    Story, Peter
    Smullen, Daniel
    Acquisti, Alessandro
    Cranor, Lorrie Faith
    Sadeh, Norman
    Schaub, Florian
    PROCEEDINGS OF THE SIXTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2020), 2020, : 379 - 415