Abstract

SummaryThe surge of the presence of personal mobile devices in multi‐environment makes a significant attention to the mobile cloud computing (MCC). Along with this concern, security issues also appear as a barrier to prevent the propagation of this trend. This paper focuses on an important feature in many security protocols and application, which is the device attestation in the MCC. The existing remote attestation mechanisms are currently used in trusted computing environment such as binary attestation and property‐based attestation. In this paper, by taking advantage of the combination of technologies and trends, such as trusted platform module, cloud computing, and bring your own device, we introduce property‐based token attestation to secure the mobile user in the enterprise cloud environment. In order to accomplish a secure MCC environment, security threats need to be studied and acted accordingly, and therefore, we first represent the common threats and then explain a novel attestation schema for addressing these threats by providing security proofs. In addition, Scyther is in use to verify the correctness of our protocol.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.