One Secure Access Scheme based on Trusted Execution Environment

被引:10
|
作者
Fan, Yongkai [1 ]
Liu, Shengle [2 ]
Tan, Gang [3 ]
Lin, Xiaodong [2 ]
Zhao, Guanqun [2 ]
Bai, Jianrong [2 ]
机构
[1] China Univ Petr, Beijing Key Lab Petr Data Min, Beijing, Peoples R China
[2] China Univ Petr, Dept Comp Sci & Technol, Beijing, Peoples R China
[3] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
关键词
Trusted Execution Environment; Security; Sensitive Information; File Slice;
D O I
10.1109/TrustCom/BigDataSE.2018.00013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wide adoption of mobile devices poses an imminent threat to preserving privacy. In order to prevent the leakage of sensitive information (such as the contact list, or private pictures) raised by inappropriate access, we propose a secure access scheme based on Trusted Execution Environment (TEE) specifically designed for mobile devices. The proposed scheme has two purposes: secure access and minimizing losses. For secure access, we use TEE to run access authorization and verification; for minimizing losses, we use the strategy of file slice to divide the sensitive file into multiple parts and then encrypt the file parts respectively in case of large-scale leakage. Practically, our scheme's "minimizing losses" can be easily expanded to cloud computing by mapping one file part in our scheme to a whole file in cloud computing scenario. The theoretical analysis and experimental evaluation indicate that our scheme meets the requirement in respects of efficiency and security.
引用
收藏
页码:16 / 21
页数:6
相关论文
共 50 条
  • [21] Awesome Trusted Execution Environment
    Coppolino, Luigi
    Mazzeo, Giovanni
    Romano, Luigi
    [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS - SUPPLEMENTAL VOLUME, DSN-S, 2023, : 5 - 6
  • [22] Blockchain Query Framework Based on Trusted Execution Environment
    Zhang, Yufan
    Wu, Yaojiang
    Wang, Junjie
    Liu, Bokun
    Liu, Aodi
    Chen, Xiaowei
    [J]. 2024 5TH INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKS AND INTERNET OF THINGS, CNIOT 2024, 2024, : 182 - 185
  • [23] Towards Blockchain-Based Secure Storage and Trusted Data Sharing Scheme for IoT Environment
    Ullah, Zia
    Raza, Basit
    Shah, Habib
    Khan, Shahzad
    Waheed, Abdul
    [J]. IEEE ACCESS, 2022, 10 : 36978 - 36994
  • [24] Secure and Trusted Application Execution on Embedded Devices
    Markantonakis, Konstantinos
    Akram, Raja Naeem
    Msgna, Mehari G.
    [J]. INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 : 3 - 24
  • [25] Mimer Trust: Efficient and Secure Data Processing for Trusted Execution Environment in Automotive Systems
    Cai, Simin
    Alund, Fredrik
    Gunne, Bengt
    Hayton, Richard
    [J]. 2022 IEEE 27TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2022,
  • [26] A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment
    Akguen, Mete
    Soykan, Elif Ustundag
    Soykan, Gurkan
    [J]. IEEE ACCESS, 2023, 11 : 9182 - 9196
  • [27] Secure Cloud Storage with Client-side Encryption using a Trusted Execution Environment
    da Rocha, Marciano
    Gomes Valadares, Dalton Cezane
    Perkusich, Angelo
    Gorgonio, Kyller Costa
    Pagno, Rodrigo Tomaz
    Will, Newton Carlos
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE (CLOSER), 2020, : 31 - 43
  • [28] A Fine-grained General Purpose Secure Storage Facility for Trusted Execution Environment
    Catuogno, Luigi
    Galdi, Clemente
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 588 - 595
  • [29] Trusted Execution Environment-Based Authentication Gauge (TEEBAG)
    Balisane, Ranjbar A.
    Martin, Andrew
    [J]. PROCEEDINGS OF THE 2016 NEW SECURITY PARADIGMS WORKSHOP (NSPW'16), 2016, : 61 - 67
  • [30] Trusted Execution Environment: What It Is, and What It Is Not
    Sabet, Mohamed
    Achemlal, Mohammed
    Bouabdallah, Abdelmadjid
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 57 - 64