Towards Trustworthy and Secure Kiosk Computing for Mobile Users

被引:1
|
作者
Zhou, Dong [1 ]
Inamura, Hiroshi [1 ]
机构
[1] DoCoMo USA Labs, Palo Alto, CA USA
关键词
D O I
10.1109/EUC.2008.170
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a users typical surrounding environment. Security is a Concern when integrating a mobile device with an environment kiosk. hi particular, the mobile user needs to he assured that the environment kiosk that he is using does not contain malicious code that may exploit his sensitive data on device, and that such sensitive data will not be left on the kiosk for attackers to exploit. In this paper, we present an OS-agnostic approach for trustworthy and secure kiosk computing. Our approach supports secure user session initiation, strong session isolation and quick session startup, and mitigates a number of security threats such as man-in-the-middle attack, session stealing attack, and keyboard tampering attack.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [31] Towards secure and cost-effective fuzzy access control in mobile cloud computing
    Wei Wu
    Shun Hu
    Xu Yang
    Joseph K. Liu
    Man Ho Au
    Soft Computing, 2017, 21 : 2643 - 2649
  • [32] Towards cost-efficient resource provisioning with multiple mobile users in fog computing
    Lu, Shuaibing
    Wu, Jie
    Duan, Yubin
    Wang, Ning
    Fang, Juan
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 146 : 96 - 106
  • [33] Visual Mobile Computing for Mobile End-Users
    Francese, Rita
    Risi, Michele
    Tortora, Genoveffa
    Tucci, Maurizio
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2016, 15 (04) : 1033 - 1046
  • [34] Secure face retrieval for group mobile users
    Xin Jin
    Yujie Li
    Shiming Ge
    Chenggen Song
    Le Wu
    Xinghui Zhou
    Soft Computing, 2019, 23 : 12813 - 12820
  • [35] A secure and efficient authentication scheme for mobile users
    Department of Computer Science and Information Engineering, National Chung Cheng University, Chiayi, 621, Taiwan
    不详
    不详
    不详
    不详
    Int. J. Mobile Commun., 2006, 5 (581-594):
  • [36] Secure face retrieval for group mobile users
    Jin, Xin
    Li, Yujie
    Ge, Shiming
    Song, Chenggen
    Wu, Le
    Zhou, Xinghui
    SOFT COMPUTING, 2019, 23 (23) : 12813 - 12820
  • [37] Protecting user data in ubiquitous computing: Towards trustworthy environments
    Duan, Y
    Canny, J
    PRIVACY ENHANCING TECHNOLOGIES, 2005, 3424 : 167 - 185
  • [38] Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial
    Zhao, Minghao
    Hu, Chengyu
    Song, Xiangfu
    Zhao, Chuan
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 131 : 55 - 65
  • [39] Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems
    Dietrich, Kurt
    Winter, Johannes
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2011, 2011, 6740 : 16 - 32
  • [40] Trustworthy computing
    Varadharajan, V
    WEB INFORMATION SYSTEMS - WISE 2004, PROCEEDINGS, 2004, 3306 : 13 - 16