Trusted mobile computing: An overview of existing solutions - Archive ouverte HAL Accéder directement au contenu
Article Dans Une Revue Future Generation Computer Systems Année : 2018

Trusted mobile computing: An overview of existing solutions

Résumé

Nowadays, smartphones are able to process large amounts of data enabling the use of applications for personal or professional use. In these contexts, the smartphone needs to process, store and transfer sensitive data in a secure way. Encryption is a commonly used solution to enforce security but the encryption keys it relies on have also to be securely processed and stored. Several research works have investigated these issues and different solutions have been proposed. They can be classified into two main categories: hardware-based solutions (Secure Elements, Trusted Platform Module and Trusted Execution Environments) and software-based solutions (Virtualization Environments). This paper overviews/surveys these two categories highlighting their pros and cons. Examples of trusted computing applications are then provided for each category. Finally, a discussion is provided about trends and perspectives for trusted mobile computing.
Fichier principal
Vignette du fichier
Bouazzouni_22029.pdf (668.47 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-02640582 , version 1 (28-05-2020)

Identifiants

Citer

Mohamed Amine Bouazzouni, Emmanuel Conchon, Fabrice Peyrard. Trusted mobile computing: An overview of existing solutions. Future Generation Computer Systems, 2018, 80, pp.596-612. ⟨10.1016/j.future.2016.05.033⟩. ⟨hal-02640582⟩
71 Consultations
561 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More