Trusted Mobile Client for Document Security in Mobile Office Automation

Full Text (PDF, 292KB), PP.54-62

Views: 0 Downloads: 0

Author(s)

Xiaojun Yu 1,* Qiaoyan Wen 1

1. State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2011.01.08

Received: 12 May 2010 / Revised: 23 Aug. 2010 / Accepted: 2 Dec. 2010 / Published: 8 Feb. 2011

Index Terms

Document security, mobile office automation, mobile trusted computing, transparent encryption

Abstract

Mobile Office Automation is a popular application on the mobile platform. However, the mobile platform has no enough security protection in front of the open system, such as internet. The document security problem in this application has become a hot topic. This paper proposed a new solution to this problem. The solution based on the trusted computing technology, which implements the platform security by hardware. The solution also includes the transparent encryption technology that means application could run independent to the security module and keep the consistency of user experience. The trusted mobile client platform architecture and security functions process of the mobile document protection system are detailed. Related work also been introduced; the security analysis shows the proposed solution could provide well security enhancement for document protection in mobile platform.

Cite This Paper

Xiaojun Yu, Qiaoyan Wen, "Trusted Mobile Client for Document Security in Mobile Office Automation", International Journal of Information Technology and Computer Science(IJITCS), vol.3, no.1, pp.54-62, 2011. DOI: 10.5815/ijitcs.2011.01.08

Reference

[1] Wayne Jansen and Karen Scarfone .Guidelines on Cell Phone and PDA Security. Recommendations of the National Institute of Standards and Technology 2008 NIST Special Publication 800-124

[2] Seokhyun Kim, Yookun Cho The Design and Implementation of Flash Cryptographic File System based on YAFFS . ICISS. 2008.23 p62-65

[3] Charles P. Wright, Michael C. Martino, and Erez Zadok NCryptfs: A Secure and Convenient Cryptographic File System. USENIX 2003 Annual Technical Conference ,in pp197-210 of the Proceedings http://www.usenix.org/event/usenix03/tech/full_papers/wright/wright_html/

[4] Xudong Ni, Zhimin Yang, Xiaole Bai, DiffUser: Differentiated User Access Control on Smartphones. Mobile Adhoc and Sensor Systems, 2009. IEEE 12 Oct. 2009 pp1012 - 1017

[5] Wu Jun-jun, Fang Ming-wei, Yu Peng-fei, A Secure Software Download Framework Based on Mobile Trusted Computing WCSE.2009.167 p171-176

[6] TCG Mobile Trusted Module Specification Specification version 1.0Revision 6,26 June 2008

[7] Andreas U. Schmidt On the deployment of Mobile Trusted Modules WCNC 2008. IEEE pp3169- 3174

[8] Zhen YANG, Kefeng FAN, Yingxu LAI. Trusted Computing Based Mobile DRM Authentication Scheme. 2009 Fifth International Conference on Information Assurance and Security pp7-10.

[9] LIU REN, Niu-Dongxiao Content Protection based on Trusted computing in Mobile Terminal. 2009 International Conference on Information Management, Innovation Management and Industrial Engineering. pp192-195

[10] Luigi Catuogno, Hans L¨ohr, Mark Manulis et al.Transparent Mobile Storage Protection in Trusted Virtual Domains. LISA'09 Proceedings of the 23rd conference on Large installation system administration 2009