期刊文献+

A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology 被引量:2

A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
原文传递
导出
摘要 In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well. In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期379-384,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the National Basic Research Program of China(973 Program)(2014CB340600) the National Natural Science Foundation of China(61173138,61103628,61103220) the Intel Collaborative Research Project
关键词 trusted computing mobile payment VIRTUALIZATION mobile platform trusted computing mobile payment virtualization mobile platform
  • 相关文献

参考文献12

  • 1Cheetah Mobile. Security report about Chinese mobile payment in 2013-2014 [EB/OL], [2014-04-12], http://www. ijin-shan. com/news/img/20140213/20140313baogao.pdf{Ch).
  • 2Lin P, Chen H Y, Fang Y, et al. A secure mobile electronic payment architecture platform for wireless mobile networks^]. Wireless Communications, IEEE Transactions on,2008, 7(7): 2705-2713.
  • 3Hussin W H, Coulton P, Edwards R. Mobile ticketing system employing TrustZone technology[C\UMobile Business, 2005. ICMB 2005. International Conference on. Sydney: IEEE Press, 2005:651-654.
  • 4Winter J. Trusted computing building blocks for embedded linux-based ARM trustzone p\&ifoxms\C\lI Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing. Alexandria: ACM Press, 2008: 21-30.
  • 5Trusted Computing Group. TCG Mobile Trusted Module Specification [EB/OL].[2014-03-29]. http’.Uwww.trustedcom-putinggroup. org/flles/resourceJiles/87852F3 3 -1D093519-A D0C0F141CC6B10D/Revision_6-tcg-mobile-trusted-module -l_0.pdf.
  • 6Trusted Computing Group. TPM Main Specification [EB/OL]. [2014-04-03]. http://www.trustedcomputinggroup. org/resources/tpm_main_specification.
  • 7Bugiel S, Ekberg J E. Implementing an application-specific credential platform using late-launched mobile trusted mod-ule[C\!/Proceedings of the 5th ACM Workshop on Scalable Trusted Computing. New York: ACM Press, 2010: 21-30.
  • 8Li Q, Zhang X, Seifert J P, et al. Secure mobile payment via trusted computmg[C\//Trusted Infrastructure Technologies Conference, 2008. APTC'08. Third Asia-Pacific. Wuhan: IEEE Press, 2008:98-112.
  • 9Kastanas M. Limbo-android [EB/OL].[2014-03-14], https: I/code, google.com/pllimbo-androidl.
  • 10USB Implemented Forum Inc. On-The-Go [EB/OL], [2014-04-04], http-.H www.usb.org/developers/onthego/.

同被引文献14

  • 1Couto R S, Elias M, Campista M, et al. Network resource control for Xen-based virtualized software routers[J]. Com- puter Networks, 2014, 64(8): 71-88.
  • 2Shao Z, He L, Lu Z, et al. VSA: An offline scheduling ana- lyzer for Xen virtual machine monitor[J]. Future Genera- tions Computer Systems: FGCS, 2013, 29(8): 2067- 2076.
  • 3Lim S S, Yoo B, Park J H, et al. A research on the investiga- tion method of digital forensics for a VMware Workstation's virtual machine[J]. Mathematical and Computer Modelling, 2012, 55(1-2): 151-160.
  • 4Szefer J, Lee R B. Architectural support for hypervi- sot-secure virtualization[J]. Computer Architecture News, 2012, 40(1):437-449.
  • 5Wang Z, Jiang X X. HyperSafe: A lightweight approach to provide lifetime hypervisor control-flow integrity[C]//1EEE Symposium on Securia and Privacy. Washington D C: IEEE Press, 2010: 380-395.
  • 6Yang J S, Kang S. Using hypervisor to provide data secrecy for user applications on a per-page basis[C]//Proc of the 4th International ConJerence on Virtual Execution Environ- ments (VEE 08). New York: ACM Press, 2008:71-80.
  • 7Xu F, Liu F M, Jin H, et al. Managing perfoncance over- head of virtual machines in cloud computing: A survey, state of the art, and future directions[J]. Proceedings of the IEEE, 2014, 102(1): 11-31.
  • 8Bai Y B, Ma Y, Lou C, et al. A high performance in- ter-domain communication approach for virtual machines[J]. Journal of Systems and Software, 2013, 86(2): 367-376.
  • 9石志国,贺也平,张宏.一种基于TPM匿名证书的信任协商方案[J].计算机研究与发展,2008,45(8):1279-1289. 被引量:1
  • 10冯登国,秦宇,汪丹,初晓博.可信计算技术研究[J].计算机研究与发展,2011,48(8):1332-1349. 被引量:114

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部