Towards Trustworthy and Secure Kiosk Computing for Mobile Users

被引:1
|
作者
Zhou, Dong [1 ]
Inamura, Hiroshi [1 ]
机构
[1] DoCoMo USA Labs, Palo Alto, CA USA
关键词
D O I
10.1109/EUC.2008.170
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a users typical surrounding environment. Security is a Concern when integrating a mobile device with an environment kiosk. hi particular, the mobile user needs to he assured that the environment kiosk that he is using does not contain malicious code that may exploit his sensitive data on device, and that such sensitive data will not be left on the kiosk for attackers to exploit. In this paper, we present an OS-agnostic approach for trustworthy and secure kiosk computing. Our approach supports secure user session initiation, strong session isolation and quick session startup, and mitigates a number of security threats such as man-in-the-middle attack, session stealing attack, and keyboard tampering attack.
引用
收藏
页码:49 / 54
页数:6
相关论文
共 50 条
  • [41] TOWARDS APPROXIMATE MOBILE COMPUTING
    Pejovic, Veljko
    GETMOBILE-MOBILE COMPUTING & COMMUNICATIONS REVIEW, 2018, 22 (04) : 9 - 12
  • [42] TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving framework
    Sayeed, Sarwar
    Pitropakis, Nikolaos
    Buchanan, William J.
    Markakis, Evangelos
    Papatsaroucha, Dimitra
    Politis, Ilias
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [43] SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
    Biatus, Sergey
    Locasto, Michael E.
    Schulte, Brian
    TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 228 - +
  • [44] Towards Mobile Opportunistic Computing
    Mtibaa, Abderrahmen
    Harras, Khaled A.
    Habak, Karim
    Ammar, Mostafa
    Zegura, Ellen W.
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, 2015, : 1111 - 1114
  • [45] Towards the Secure Modelling of OLAP Users' Behaviour
    Blanco, Carlos
    Fernandez-Medina, Eduardo
    Trujillo, Juan
    Jurjens, Jan
    SECURE DATA MANAGEMENT, 2010, 6358 : 101 - +
  • [46] M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet
    Jiang, Tao
    Chen, Xiaofeng
    Li, Jin
    Ma, Jianfeng
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 612 - 621
  • [47] Towards secure and trustworthy crowdsourcing: challenges, existing landscape, and future directions
    Lian, Rui
    Zhou, Anxin
    Zheng, Yifeng
    WIRELESS NETWORKS, 2024, 30 (05) : 4329 - 4341
  • [48] Secure Identity Management In Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    Anusia, R.
    Deepti, S.
    2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 42 - 45
  • [49] SMOC: A Secure Mobile Cloud Computing Platform
    Hao, Zijiang
    Tang, Yutao
    Zhang, Yifan
    Novak, Ed
    Carter, Nancy
    Li, Qun
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [50] SCALABLE, SECURE, MOBILE COMPUTING WITH LOCATION INFORMATION
    SPREITZER, M
    THEIMER, M
    COMMUNICATIONS OF THE ACM, 1993, 36 (07) : 27 - 27