Back to Search Start Over

Trusted mobile computing: An overview of existing solutions

Authors :
Mohamed Amine Bouazzouni
Emmanuel Conchon
Fabrice Peyrard
Réseaux, Mobiles, Embarqués, Sans fil, Satellites (IRIT-RMESS)
Institut de recherche en informatique de Toulouse (IRIT)
Université Toulouse 1 Capitole (UT1)
Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3)
Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP)
Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1)
Université Fédérale Toulouse Midi-Pyrénées
XLIM (XLIM)
Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)
Université Toulouse - Jean Jaurès (UT2J)
Université Toulouse 1 Capitole (UT1)-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3)
Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP)
Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1)-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3)
Mathématiques & Sécurité de l'information (XLIM-MATHIS)
Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)-Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS)
Centre National de la Recherche Scientifique - CNRS (FRANCE)
Institut National Polytechnique de Toulouse - INPT (FRANCE)
Université de Limoges - UNILIM (FRANCE)
Université Toulouse III - Paul Sabatier - UT3 (FRANCE)
Université Toulouse - Jean Jaurès - UT2J (FRANCE)
Université Toulouse 1 Capitole - UT1 (FRANCE)
Université de Poitiers (FRANCE)
Institut National Polytechnique de Toulouse - Toulouse INP (FRANCE)
Source :
Future Generation Computer Systems, Future Generation Computer Systems, Elsevier, 2018, 80, pp.596-612. ⟨10.1016/j.future.2016.05.033⟩, Future Generation Computer Systems, 2018, 80, pp.596--612. ⟨10.1016/j.future.2016.05.033⟩
Publication Year :
2018
Publisher :
HAL CCSD, 2018.

Abstract

International audience; Nowadays, smartphones are able to process large amounts of data enabling the use of applications for personal or professional use. In these contexts, the smartphone needs to process, store and transfer sensitive data in a secure way. Encryption is a commonly used solution to enforce security but the encryption keys it relies on have also to be securely processed and stored. Several research works have investigated these issues and different solutions have been proposed. They can be classified into two main categories: hardware-based solutions (Secure Elements, Trusted Platform Module and Trusted Execution Environments) and software-based solutions (Virtualization Environments). This paper overviews/surveys these two categories highlighting their pros and cons. Examples of trusted computing applications are then provided for each category. Finally, a discussion is provided about trends and perspectives for trusted mobile computing.

Details

Language :
English
ISSN :
0167739X
Database :
OpenAIRE
Journal :
Future Generation Computer Systems, Future Generation Computer Systems, Elsevier, 2018, 80, pp.596-612. ⟨10.1016/j.future.2016.05.033⟩, Future Generation Computer Systems, 2018, 80, pp.596--612. ⟨10.1016/j.future.2016.05.033⟩
Accession number :
edsair.doi.dedup.....2e66bf49d30a31e10073172b3c20a45c
Full Text :
https://doi.org/10.1016/j.future.2016.05.033⟩