The smart and secure protocol for mobile office environments

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we deal with largely two problems in the networked collaborative computing environments between the cloud computing service and TPM chip as a mobile convergent technology. Firstly, we solve the security problem from inside attackers, which has been social issues, for example, 45 % of the attacks are conducted by insiders according to [18]. The substantial reason of this problem is that server managers are regarded trustworthy. Hence, we propose Encrypted DB Retrieval System whose server manager cannot access on real data (plaintexts) in Mobile Office Environments of the cloud datacenter. Secondly, cloud computing has limitless computing resources; however, it faces with the vulnerability of security. On the other hand, the TPM technology has been regarded as a high level of physical security; however, it has the severe limitation of use such as hardware constraints or limited amount of non-volatile memory (NVRAM). To produce synergic effects between the two technologies, we combine two applications (cloud datacenter service, TPM chip) as a mobile convergent technology. Consequently, this system is secure against both of the insiders and outsiders, the cloud computing service can improve security weaknesses.

Cite

CITATION STYLE

APA

Park, H. A., Park, J., Kim, J. I., & Park, J. (2015). The smart and secure protocol for mobile office environments. In Lecture Notes in Electrical Engineering (Vol. 352, pp. 297–307). Springer Verlag. https://doi.org/10.1007/978-3-662-47487-7_43

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free