One Secure Access Scheme based on Trusted Execution Environment

被引:10
|
作者
Fan, Yongkai [1 ]
Liu, Shengle [2 ]
Tan, Gang [3 ]
Lin, Xiaodong [2 ]
Zhao, Guanqun [2 ]
Bai, Jianrong [2 ]
机构
[1] China Univ Petr, Beijing Key Lab Petr Data Min, Beijing, Peoples R China
[2] China Univ Petr, Dept Comp Sci & Technol, Beijing, Peoples R China
[3] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
关键词
Trusted Execution Environment; Security; Sensitive Information; File Slice;
D O I
10.1109/TrustCom/BigDataSE.2018.00013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wide adoption of mobile devices poses an imminent threat to preserving privacy. In order to prevent the leakage of sensitive information (such as the contact list, or private pictures) raised by inappropriate access, we propose a secure access scheme based on Trusted Execution Environment (TEE) specifically designed for mobile devices. The proposed scheme has two purposes: secure access and minimizing losses. For secure access, we use TEE to run access authorization and verification; for minimizing losses, we use the strategy of file slice to divide the sensitive file into multiple parts and then encrypt the file parts respectively in case of large-scale leakage. Practically, our scheme's "minimizing losses" can be easily expanded to cloud computing by mapping one file part in our scheme to a whole file in cloud computing scenario. The theoretical analysis and experimental evaluation indicate that our scheme meets the requirement in respects of efficiency and security.
引用
收藏
页码:16 / 21
页数:6
相关论文
共 50 条
  • [1] CSCAC: one constant-size CPABE access control scheme in trusted execution environment
    Fan, Yongkai
    Liu, Shengle
    Tan, Gang
    Lin, Xiaodong
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2019, 19 (02) : 162 - 168
  • [2] Secure and Efficient Decentralized Bitcoin Mixing Scheme using Trusted Execution Environment
    Xie, Yankai
    Wang, Qingtao
    Li, Songwei
    Xiao, Ruiyang
    Zhang, Chi
    Wei, Lingbo
    [J]. IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 4390 - 4395
  • [3] SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
    Jang, Jinsoo
    Kong, Sunjune
    Kim, Minsu
    Kim, Daegyeong
    Kang, Brent Byunghoon
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [4] Secure Client-Side Deduplication Scheme for Cloud with Dual Trusted Execution Environment
    Verma, Garima
    [J]. IETE JOURNAL OF RESEARCH, 2023, 69 (10) : 7015 - 7025
  • [5] IoT Access Control Model Based on Blockchain and Trusted Execution Environment
    Jiang, Weijin
    Li, En
    Zhou, Wenying
    Yang, Ying
    Luo, Tiantian
    [J]. PROCESSES, 2023, 11 (03)
  • [6] Fine-grained access control based on Trusted Execution Environment
    Fan, Yongkai
    Liu, Shengle
    Tan, Gang
    Qiao, Fei
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 551 - 561
  • [7] HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment
    Gangal, Akshay
    Ye, Mengmei
    Wei, Sheng
    [J]. PROCEEDINGS OF THE 2020 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2020,
  • [8] Attribute Signature Identity Authentication Scheme Based on Blockchain and Trusted Execution Environment
    Ran, Jinhao
    Cai, Dongliang
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (11): : 2555 - 2566
  • [9] Building a Secure Scheme for a Trusted Hardware Sharing Environment
    Lu, Di
    Ma, Jianfeng
    Sun, Cong
    Wu, Qixuan
    Sun, Zhaochang
    Xl, Ning
    [J]. IEEE ACCESS, 2017, 5 : 20260 - 20271
  • [10] A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment
    Liu, Zewei
    Hu, Chunqiang
    Li, Ruinian
    Xiang, Tao
    Li, Xingwang
    Yu, Jiguo
    Xia, Hui
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (03) : 2325 - 2336