Towards Trustworthy and Secure Kiosk Computing for Mobile Users

被引:1
|
作者
Zhou, Dong [1 ]
Inamura, Hiroshi [1 ]
机构
[1] DoCoMo USA Labs, Palo Alto, CA USA
关键词
D O I
10.1109/EUC.2008.170
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a users typical surrounding environment. Security is a Concern when integrating a mobile device with an environment kiosk. hi particular, the mobile user needs to he assured that the environment kiosk that he is using does not contain malicious code that may exploit his sensitive data on device, and that such sensitive data will not be left on the kiosk for attackers to exploit. In this paper, we present an OS-agnostic approach for trustworthy and secure kiosk computing. Our approach supports secure user session initiation, strong session isolation and quick session startup, and mitigates a number of security threats such as man-in-the-middle attack, session stealing attack, and keyboard tampering attack.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [21] CTrust: A framework for Secure and Trustworthy application execution in Cloud computing
    Nimgaonkar, Satyajeet
    Kotikela, Srujan
    Gomathisankaran, Mahadevan
    2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 24 - 31
  • [22] Trustworthy Building Blocks for a More Secure Embedded Computing Environment
    Schramm, Martin
    Grzemba, Andreas
    2011 INTERNATIONAL CONFERENCE ON APPLIED ELECTRONICS (AE), 2011,
  • [23] Towards Secure Mobile Process Tracking using Wearable Computing in mGovernment Applications
    Ghazal, Mohammed
    Al Khalil, Yasmina
    Haneefa, Fasila
    Mhanna, Assem
    Awachi, Dana
    Ali, Samr
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 288 - 294
  • [24] Towards a trustworthy, secure and reliable enclave for machine learning in a hospital setting: The Essen Medical Computing Platform (EMCP)
    Schmidt, Hendrik F. R.
    Schloetterer, Joerg
    Bargull, Marcel
    Nasca, Enrico
    Aydelott, Ryan
    Seifert, Christin
    Meyer, Folker
    2021 IEEE THIRD INTERNATIONAL CONFERENCE ON COGNITIVE MACHINE INTELLIGENCE (COGMI 2021), 2021, : 116 - 123
  • [25] A secure protocol for a payment system based on a kiosk centric case mobile scenario
    Tellez, Jesus A.
    Sierra, Jose M.
    Izquierdo, Antonio
    Carbonell, Mildrey
    INGENIERIA UC, 2006, 13 (02): : 25 - 32
  • [26] Towards secure mobile agents
    Aouadi, H
    Ben Ahmed, M
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS, AND INFORMATICS, VOL XVI, PROCEEDINGS, 2004, : 261 - 265
  • [27] Towards a secure and trustworthy imaging with non-fungible tokens
    Martinod, Nicolas J.
    Homayounfar, Kambiz
    Lazzarotto, Davi Nachtigall
    Upenik, Evgeniy
    Ebrahimi, Touradj
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XLIV, 2021, 11842
  • [28] A Secure Framework for Mobile Cloud Computing
    Al-Omary, Alauddin
    2019 INTERNATIONAL CONFERENCE ON INNOVATION AND INTELLIGENCE FOR INFORMATICS, COMPUTING, AND TECHNOLOGIES (3ICT), 2019,
  • [29] A Framework for Secure Mobile Cloud Computing
    Ramavathu, Lakshmananaik
    Bairam, Manjula
    Manchala, Sadanandam
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 353 - 363
  • [30] Towards secure and cost-effective fuzzy access control in mobile cloud computing
    Wu, Wei
    Hu, Shun
    Yang, Xu
    Liu, Joseph K.
    Au, Man Ho
    SOFT COMPUTING, 2017, 21 (10) : 2643 - 2649