Towards Trustworthy and Secure Kiosk Computing for Mobile Users

被引:1
|
作者
Zhou, Dong [1 ]
Inamura, Hiroshi [1 ]
机构
[1] DoCoMo USA Labs, Palo Alto, CA USA
关键词
D O I
10.1109/EUC.2008.170
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a users typical surrounding environment. Security is a Concern when integrating a mobile device with an environment kiosk. hi particular, the mobile user needs to he assured that the environment kiosk that he is using does not contain malicious code that may exploit his sensitive data on device, and that such sensitive data will not be left on the kiosk for attackers to exploit. In this paper, we present an OS-agnostic approach for trustworthy and secure kiosk computing. Our approach supports secure user session initiation, strong session isolation and quick session startup, and mitigates a number of security threats such as man-in-the-middle attack, session stealing attack, and keyboard tampering attack.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [1] Towards trustworthy kiosk computing
    Garriss, Scott
    Sailer, Reiner
    Caceres, Ramon
    van Doorn, Leendert
    Berger, Stefan
    Zhang, Xiaolan
    [J]. EIGHTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2007, : 41 - +
  • [2] Towards secure mobile cloud computing: A survey
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05): : 1278 - 1299
  • [3] Special Issue on Secure and Trustworthy Computing
    Sinanoglu, Ozgur
    Karri, Ramesh
    [J]. ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2016, 13 (01)
  • [4] Trustworthy ICs for secure embedded computing
    Cheng, Tim
    [J]. IEEE DESIGN & TEST OF COMPUTERS, 2007, 24 (06): : 516 - 516
  • [5] Trustworthy computing for secure smart cities
    Mansoor, Wathiq
    Varadarajan, Vijayakumar
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND SMART ENVIRONMENTS, 2021, 13 (03) : 183 - 184
  • [6] Towards a Secure Mobile Edge Computing Framework for Hajj
    Rahman, Md. Abdur
    Hassanain, Elham
    Hossain, M. Shamim
    [J]. IEEE ACCESS, 2017, 5 : 11768 - 11781
  • [7] Towards Secure Data Distribution Systems in Mobile Cloud Computing
    Zhang, Jiang
    Zhang, Zhenfeng
    Guo, Hui
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (11) : 3222 - 3235
  • [8] Secure mobile computing
    Agrawal, DP
    Deng, HM
    Poosarla, R
    Sanyal, S
    [J]. DISTRIBUTED COMPUTING: IWDC 2003, 2003, 2918 : 265 - 278
  • [9] From Intent to Action: Nudging Users Towards Secure Mobile Payments
    Story, Peter
    Smullen, Daniel
    Acquisti, Alessandro
    Cranor, Lorrie Faith
    Sadeh, Norman
    Schaub, Florian
    [J]. PROCEEDINGS OF THE SIXTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2020), 2020, : 379 - 415
  • [10] Towards Holistic Secure and Trustworthy Deep Learning
    Chen, Huili
    [J]. ProQuest Dissertations and Theses Global, 2022,