One Secure Access Scheme based on Trusted Execution Environment

被引:10
|
作者
Fan, Yongkai [1 ]
Liu, Shengle [2 ]
Tan, Gang [3 ]
Lin, Xiaodong [2 ]
Zhao, Guanqun [2 ]
Bai, Jianrong [2 ]
机构
[1] China Univ Petr, Beijing Key Lab Petr Data Min, Beijing, Peoples R China
[2] China Univ Petr, Dept Comp Sci & Technol, Beijing, Peoples R China
[3] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
关键词
Trusted Execution Environment; Security; Sensitive Information; File Slice;
D O I
10.1109/TrustCom/BigDataSE.2018.00013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The wide adoption of mobile devices poses an imminent threat to preserving privacy. In order to prevent the leakage of sensitive information (such as the contact list, or private pictures) raised by inappropriate access, we propose a secure access scheme based on Trusted Execution Environment (TEE) specifically designed for mobile devices. The proposed scheme has two purposes: secure access and minimizing losses. For secure access, we use TEE to run access authorization and verification; for minimizing losses, we use the strategy of file slice to divide the sensitive file into multiple parts and then encrypt the file parts respectively in case of large-scale leakage. Practically, our scheme's "minimizing losses" can be easily expanded to cloud computing by mapping one file part in our scheme to a whole file in cloud computing scenario. The theoretical analysis and experimental evaluation indicate that our scheme meets the requirement in respects of efficiency and security.
引用
收藏
页码:16 / 21
页数:6
相关论文
共 50 条
  • [31] Trusted Execution Environment-Based Authentication Gauge (TEEBAG)
    Balisane, Ranjbar A.
    Martin, Andrew
    [J]. PROCEEDINGS OF THE 2016 NEW SECURITY PARADIGMS WORKSHOP (NSPW'16), 2016, : 61 - 67
  • [32] A Quantum Computer Trusted Execution Environment
    Trochatos, Theodoros
    Xu, Chuanqi
    Deshpande, Sanjay
    Lu, Yao
    Ding, Yongshan
    Szefer, Jakub
    [J]. IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 22 (02) : 177 - 180
  • [33] A Quantum Computer Trusted Execution Environment
    Trochatos, Theodoros
    Xu, Chuanqi
    Deshpande, Sanjay
    Lu, Yao
    Ding, Yongshan
    Szefer, Jakub
    [J]. 2024 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA 2024, 2024, : 613 - 613
  • [34] A novel method of APK-based automated execution and traversal with a trusted execution environment
    Chang, Rui
    Jiang, Liehui
    Yin, Qing
    Liu, Wei
    Zhang, Shengqiao
    [J]. PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 254 - 258
  • [35] Elevating Security in Migration: An Enhanced Trusted Execution Environment-Based Generic Virtual Remote Attestation Scheme
    Yuan, Jie
    Shen, Yinghua
    Xu, Rui
    Wei, Xinghai
    Liu, Dongxiao
    [J]. INFORMATION, 2024, 15 (08)
  • [36] Trusted Network Access Authentication Scheme Based on the Label
    Wang, Yu
    Duan, Yu
    Wang, Fei
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 123 - 130
  • [37] SeRoT: A Secure Runtime System on Trusted Execution Environments
    Liu, Jingbin
    Qin, Yu
    Feng, Dengguo
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 30 - 37
  • [38] One enhanced secure access scheme for outsourced data
    Fan, Yongkai
    Liu, Jiaxu
    Li, Kuan-Ching
    Liang, Wei
    Lei, Xia
    Tan, Gan
    Tang, Mingdong
    [J]. INFORMATION SCIENCES, 2021, 561 : 230 - 242
  • [39] SofTEE: Software-Based Trusted Execution Environment for User Applications
    Lee, Unsung
    Park, Chanik
    [J]. IEEE ACCESS, 2020, 8 : 121874 - 121888
  • [40] An Architecture for Virtualization-Based Trusted Execution Environment on Mobile Devices
    Jung, Young-Woo
    Kim, Hag-Young
    Kim, Sang-Wook
    [J]. 2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 540 - 547