Loading…

Trusted mobile computing: An overview of existing solutions

Nowadays, smartphones are able to process large amounts of data enabling the use of applications for personal or professional use. In these contexts, the smartphone needs to process, store and transfer sensitive data in a secure way. Encryption is a commonly used solution to enforce security but the...

Full description

Saved in:
Bibliographic Details
Published in:Future generation computer systems 2018-03, Vol.80, p.596-612
Main Authors: Bouazzouni, Mohamed Amine, Conchon, Emmanuel, Peyrard, Fabrice
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Nowadays, smartphones are able to process large amounts of data enabling the use of applications for personal or professional use. In these contexts, the smartphone needs to process, store and transfer sensitive data in a secure way. Encryption is a commonly used solution to enforce security but the encryption keys it relies on have also to be securely processed and stored. Several research works have investigated these issues and different solutions have been proposed. They can be classified into two main categories: hardware-based solutions (Secure Elements, Trusted Platform Module and Trusted Execution Environments) and software-based solutions (Virtualization Environments). This paper overviews/surveys these two categories highlighting their pros and cons. Examples of trusted computing applications are then provided for each category. Finally, a discussion is provided about trends and perspectives for trusted mobile computing. •Survey of trusted mobile computing.•Presentation of hardware and virtualized solutions of secure execution environment.•User centric models for trusted mobile computing.•Analyses and discussion of the current and future solutions.•Installing and testing an open source TEE adapted for UCOM model.
ISSN:0167-739X
1872-7115
DOI:10.1016/j.future.2016.05.033