Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments

被引:10
|
作者
Oh, Doohwan [1 ]
Kim, Ilkyu [2 ]
Kim, Keunsoo [1 ]
Lee, Sang-Min [3 ]
Ro, Won Woo [1 ]
机构
[1] Yonsei Univ, Sch Elect & Elect Engn, Seoul 120749, South Korea
[2] LG Elect, DTV SoC Dev Dept, Seoul, South Korea
[3] ETRI, Broadcasting & Telecommun Media Res Lab, Taejon, South Korea
关键词
Mobile security; offloading computing; cloud computing; pattern matching; Wu-Manber;
D O I
10.4218/etrij.15.0114.0397
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.
引用
收藏
页码:348 / 358
页数:11
相关论文
共 50 条
  • [21] Secure user authentication based on the trusted platform for mobile devices
    GeonLyang Kim
    JaeDeok Lim
    JeongNyeo Kim
    EURASIP Journal on Wireless Communications and Networking, 2016
  • [22] Towards secure mobile cloud computing: A survey
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05): : 1278 - 1299
  • [23] Secure Identity Management In Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    Anusia, R.
    Deepti, S.
    2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 42 - 45
  • [24] SMOC: A Secure Mobile Cloud Computing Platform
    Hao, Zijiang
    Tang, Yutao
    Zhang, Yifan
    Novak, Ed
    Carter, Nancy
    Li, Qun
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [25] Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments
    Birgersson, Marcus
    Artho, Cyrille
    Balliu, Musard
    2024 IEEE SECURE DEVELOPMENT CONFERENCE, SECDEV 2024, 2024, : 105 - 116
  • [26] Quantum-Secure Communication for Trusted Edge Computing with IoT Devices
    Kornaros, George
    Berki, Georgia
    Grammatikakis, Miltos
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP SEC 2023, 2024, 679 : 163 - 176
  • [27] Secure Mobile Payment employing Trusted Computing on TrustZone Enabled Platforms
    Zheng, Xianyi
    Yang, Lulu
    Shi, Gang
    Meng, Dan
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1944 - 1950
  • [28] Achieving reliable and secure services in cloud computing environments
    Liu, Qin
    Wang, Guojun
    Liu, Xuhui
    Peng, Tao
    Wu, Jie
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 153 - 164
  • [29] Secure and Trusted Cloud of Things
    Bhattasali, Tapalina
    Chaki, Rituparna
    Chaki, Nabendu
    2013 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2013,
  • [30] Mobile Trusted Computing
    Asokan, N.
    Ekberg, Jan-Erik
    Kostiainen, Kari
    Rajan, Anand
    Rozas, Carlos
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    Wachsmann, Christian
    PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1189 - 1206