A Novel Solution to Document Protection on Mobile Platform

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 143)

Abstract

The document security problem, such as document leakage or unauthenticated access, has not well solved due to the poor security status of mobile platform. This paper proposes a new solution to this problem. It takes use of the trusted computing technology to enhance the mobile platform security. It also introduces the transparent encryption technology that application could run independent to encryption function and keep the consistency of user experience. The architecture of trusted mobile client platform, key security functions and process flows are detailed. The security analysis shows the proposed solution could be a good choice to solve the document security problem on mobile platform.

Keywords

Document protection mobile platform trusted computing transparent encryption 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jansen, W., Scarfone, K.: Guidelines on Cell Phone and PDA Security. Recommendations of the National Institute of Standards and Technology NIST Special Publication 800-124 (2008)Google Scholar
  2. 2.
    Kim, S., Cho, Y.: The Design and Implementation of Flash Cryptographic File System based on YAFFS. In: ICISS 2008, vol. 23, pp. 62–65 (2008)Google Scholar
  3. 3.
    Wright, C.P., Martino, M.C., NCryptfs, E.Z.: A Secure and Convenient Cryptographic File System. In: The Proceedings of USENIX Annual Technical Conference, pp. 197–210. USENIX Association, San Antonio (2003)Google Scholar
  4. 4.
    Ni, X., Yang, Z., Bai, X.: DiffUser: Differentiated User Access Control on Smartphones. In: Mobile Adhoc and Sensor Systems, October 12, pp. 1012–1017. IEEE (2009)Google Scholar
  5. 5.
    Wu, J.-J., Fang, M.-W., Yu, P.-F.: A Secure Software Download Framework Based on Mobile Trusted Computing. In: WCSE 2009, vol. 167, pp. 171–176 (2009)Google Scholar
  6. 6.
    TCG Mobile Trusted Module Specification Specification version 1.0 Revision  6 (June 26, 2008)Google Scholar
  7. 7.
    Andreas, U.: Schmidt On the deployment of Mobile Trusted Modules. In: WCNC 2008, pp. 3169–3174. IEEE (2008)Google Scholar
  8. 8.
    Dhandapani, G., Sundaresan, A.: Netlink Sockets - Overview (1999), http://qos.ittc.ku.edu/netlink/netlink.pdf

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingChina

Personalised recommendations