06.11.2014 Views

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

A User Centric Security Model for Tamper-Resistant Devices

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7.2 Application Sharing Mechanism<br />

Table 7.1: Comparison between dierent rewall mechanisms<br />

FiR Multos Java Card UCTD<br />

1. No O-card <strong>Security</strong> Assumption No No Yes<br />

2. Application Authentication Yes* Yes* Yes<br />

3. Application State Validation No No Yes<br />

4. Access Control No No Yes<br />

5. Application Binding No No Yes<br />

6. Application-Plat<strong>for</strong>m Communication No No Yes<br />

7. Sharing Revocation Yes* Yes* Yes<br />

8. <strong>User</strong>'s Privacy No No Yes<br />

Note. Yes means that it totally supports the given requirement, Yes* stands <strong>for</strong> limited support, and<br />

No means that it does not support the given requirement.<br />

1. A mobile handset may have multiple UCTDs, which under the CDAM architecture<br />

behave as a single virtual device. Removing the need <strong>for</strong> a user to install applications<br />

that share each other's resources on the same UCTD makes the management of the<br />

multiple UCTDs exible and user-friendly.<br />

2. The CDAM can facilitate the installation of an internet identity application [193] on<br />

a UCTD that can be accessible to other UCTDs and the host plat<strong>for</strong>m. For example,<br />

if a user installs an internet identity application (i.e. which may act as a single sign<br />

on) on a UCTD then it may be used to authenticate the user when visiting online<br />

services (e.g. online gaming, social and network sites, etc.) or by applications (e.g.<br />

network access, online banking, and online ticketing, etc.) on (other) UCTDs.<br />

3. An accounting application on a UCTD may opt <strong>for</strong> automated receipt collections and<br />

updates to the user's accounting software. For example, a user might have a nancial<br />

system on her Personal Computer (PC) that she uses to track her expenditure.<br />

To enhance the mobile payment scheme, the mobile payment SP may collaborate<br />

with an accounting software developer in a way that means the payment application<br />

might record the transaction details that are later synchronised with the accounting<br />

software. The user would have the accounting software installed on her PC, with an<br />

associated application installed on the UCTD. Afterwards, the user synchronises the<br />

transaction details to her nancial software. The synchronisation would be carried<br />

out by means of the UCTD of the mobile phone and the UCTD of the PC. Thereby,<br />

the CDAM provides security, reliability, and privacy to this system.<br />

4. Internet of Things [37, 160] is an internet-like structure comprising a set of smart<br />

physical devices (e.g. toys, healthcare products, thermostats, and environment sensors,<br />

etc.) that communicate with each other. As an individual device may not have<br />

enough computational and storage resources, they would not have a complex or large<br />

set of services. However, the CDAM can enable comparatively complex and rich featured<br />

systems in an Internet of Things. Individual devices may either have a unique<br />

service in the set or even a subset of a particular service. Each connected device then<br />

164

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!