One Secure Access Scheme Based on Trusted Execution Environment

Yongkai Fan, Shengle Liu, Gang Tan, Xiaodong Lin, Guanqun Zhao, Jianrong Bai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The wide adoption of mobile devices poses an imminent threat to preserving privacy. In order to prevent the leakage of sensitive information (such as the contact list, or private pictures) raised by inappropriate access, we propose a secure access scheme based on Trusted Execution Environment (TEE) specifically designed for mobile devices. The proposed scheme has two purposes: secure access and minimizing losses. For secure access, we use TEE to run access authorization and verification; for minimizing losses, we use the strategy of file slice to divide the sensitive file into multiple parts and then encrypt the file parts respectively in case of large-scale leakage. Practically, our scheme's 'minimizing losses' can be easily expanded to cloud computing by mapping one file part in our scheme to a whole file in cloud computing scenario. The theoretical analysis and experimental evaluation indicate that our scheme meets the requirement in respects of efficiency and security.

Original languageEnglish (US)
Title of host publicationProceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages16-21
Number of pages6
ISBN (Print)9781538643877
DOIs
StatePublished - Sep 5 2018
Event17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018 - New York, United States
Duration: Jul 31 2018Aug 3 2018

Publication series

NameProceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018

Other

Other17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018
CountryUnited States
CityNew York
Period7/31/188/3/18

Fingerprint

Cloud computing
Mobile devices
Leakage

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Cite this

Fan, Y., Liu, S., Tan, G., Lin, X., Zhao, G., & Bai, J. (2018). One Secure Access Scheme Based on Trusted Execution Environment. In Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018 (pp. 16-21). [8455881] (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00013
Fan, Yongkai ; Liu, Shengle ; Tan, Gang ; Lin, Xiaodong ; Zhao, Guanqun ; Bai, Jianrong. / One Secure Access Scheme Based on Trusted Execution Environment. Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., 2018. pp. 16-21 (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).
@inproceedings{6262783200a343d39adb0fac99385e8a,
title = "One Secure Access Scheme Based on Trusted Execution Environment",
abstract = "The wide adoption of mobile devices poses an imminent threat to preserving privacy. In order to prevent the leakage of sensitive information (such as the contact list, or private pictures) raised by inappropriate access, we propose a secure access scheme based on Trusted Execution Environment (TEE) specifically designed for mobile devices. The proposed scheme has two purposes: secure access and minimizing losses. For secure access, we use TEE to run access authorization and verification; for minimizing losses, we use the strategy of file slice to divide the sensitive file into multiple parts and then encrypt the file parts respectively in case of large-scale leakage. Practically, our scheme's 'minimizing losses' can be easily expanded to cloud computing by mapping one file part in our scheme to a whole file in cloud computing scenario. The theoretical analysis and experimental evaluation indicate that our scheme meets the requirement in respects of efficiency and security.",
author = "Yongkai Fan and Shengle Liu and Gang Tan and Xiaodong Lin and Guanqun Zhao and Jianrong Bai",
year = "2018",
month = "9",
day = "5",
doi = "10.1109/TrustCom/BigDataSE.2018.00013",
language = "English (US)",
isbn = "9781538643877",
series = "Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "16--21",
booktitle = "Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018",
address = "United States",

}

Fan, Y, Liu, S, Tan, G, Lin, X, Zhao, G & Bai, J 2018, One Secure Access Scheme Based on Trusted Execution Environment. in Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018., 8455881, Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, Institute of Electrical and Electronics Engineers Inc., pp. 16-21, 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018, New York, United States, 7/31/18. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00013

One Secure Access Scheme Based on Trusted Execution Environment. / Fan, Yongkai; Liu, Shengle; Tan, Gang; Lin, Xiaodong; Zhao, Guanqun; Bai, Jianrong.

Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc., 2018. p. 16-21 8455881 (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - One Secure Access Scheme Based on Trusted Execution Environment

AU - Fan, Yongkai

AU - Liu, Shengle

AU - Tan, Gang

AU - Lin, Xiaodong

AU - Zhao, Guanqun

AU - Bai, Jianrong

PY - 2018/9/5

Y1 - 2018/9/5

N2 - The wide adoption of mobile devices poses an imminent threat to preserving privacy. In order to prevent the leakage of sensitive information (such as the contact list, or private pictures) raised by inappropriate access, we propose a secure access scheme based on Trusted Execution Environment (TEE) specifically designed for mobile devices. The proposed scheme has two purposes: secure access and minimizing losses. For secure access, we use TEE to run access authorization and verification; for minimizing losses, we use the strategy of file slice to divide the sensitive file into multiple parts and then encrypt the file parts respectively in case of large-scale leakage. Practically, our scheme's 'minimizing losses' can be easily expanded to cloud computing by mapping one file part in our scheme to a whole file in cloud computing scenario. The theoretical analysis and experimental evaluation indicate that our scheme meets the requirement in respects of efficiency and security.

AB - The wide adoption of mobile devices poses an imminent threat to preserving privacy. In order to prevent the leakage of sensitive information (such as the contact list, or private pictures) raised by inappropriate access, we propose a secure access scheme based on Trusted Execution Environment (TEE) specifically designed for mobile devices. The proposed scheme has two purposes: secure access and minimizing losses. For secure access, we use TEE to run access authorization and verification; for minimizing losses, we use the strategy of file slice to divide the sensitive file into multiple parts and then encrypt the file parts respectively in case of large-scale leakage. Practically, our scheme's 'minimizing losses' can be easily expanded to cloud computing by mapping one file part in our scheme to a whole file in cloud computing scenario. The theoretical analysis and experimental evaluation indicate that our scheme meets the requirement in respects of efficiency and security.

UR - http://www.scopus.com/inward/record.url?scp=85054100395&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85054100395&partnerID=8YFLogxK

U2 - 10.1109/TrustCom/BigDataSE.2018.00013

DO - 10.1109/TrustCom/BigDataSE.2018.00013

M3 - Conference contribution

AN - SCOPUS:85054100395

SN - 9781538643877

T3 - Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018

SP - 16

EP - 21

BT - Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Fan Y, Liu S, Tan G, Lin X, Zhao G, Bai J. One Secure Access Scheme Based on Trusted Execution Environment. In Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018. Institute of Electrical and Electronics Engineers Inc. 2018. p. 16-21. 8455881. (Proceedings - 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, Trustcom/BigDataSE 2018). https://doi.org/10.1109/TrustCom/BigDataSE.2018.00013