TY - GEN
T1 - A cloud based dual-root trust model for secure mobile online transactions
AU - Li, Li
AU - Huang, Dijiang
AU - Shen, Zhidong
AU - Bouzefrane, Samia
PY - 2013/8/21
Y1 - 2013/8/21
N2 - With rapid growth of mobile devices and the emergency of mobile cloud services, it is a trend to use mobile devices for mobile-centric applications, and expand the mobile capabilities and provide needed security by mobile cloud services. However, due to the mobility of the device and the semitrust of the mobile cloud, how to build trust in the mobile applications is a big concern. In this paper, we propose a dual-root trust online transaction model that provides a dual-root trust model including both the user's mobile device and a delegation mobile cloud. We design a dual-root trust protocol by leveraging a modified CP-ABE cryptography and the trust execution environment embedded in a mobile device to provide device-specific transaction confirmations for online transactions initiated by the mobile user. The performance evaluation of the protocol demonstrates that it is a lightweight scheme for mobile devices since most cryptographic functions are delegated from users to the mobile cloud.
AB - With rapid growth of mobile devices and the emergency of mobile cloud services, it is a trend to use mobile devices for mobile-centric applications, and expand the mobile capabilities and provide needed security by mobile cloud services. However, due to the mobility of the device and the semitrust of the mobile cloud, how to build trust in the mobile applications is a big concern. In this paper, we propose a dual-root trust online transaction model that provides a dual-root trust model including both the user's mobile device and a delegation mobile cloud. We design a dual-root trust protocol by leveraging a modified CP-ABE cryptography and the trust execution environment embedded in a mobile device to provide device-specific transaction confirmations for online transactions initiated by the mobile user. The performance evaluation of the protocol demonstrates that it is a lightweight scheme for mobile devices since most cryptographic functions are delegated from users to the mobile cloud.
UR - http://www.scopus.com/inward/record.url?scp=84881574106&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84881574106&partnerID=8YFLogxK
U2 - 10.1109/WCNC.2013.6555287
DO - 10.1109/WCNC.2013.6555287
M3 - Conference contribution
AN - SCOPUS:84881574106
SN - 9781467359399
T3 - IEEE Wireless Communications and Networking Conference, WCNC
SP - 4404
EP - 4409
BT - 2013 IEEE Wireless Communications and Networking Conference, WCNC 2013
T2 - 2013 IEEE Wireless Communications and Networking Conference, WCNC 2013
Y2 - 7 April 2013 through 10 April 2013
ER -