Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2009.16-C.3.335

A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module  

Kang, Dong-Wan (순천향대학교 컴퓨터학부)
Jun, Sung-Ik (한국전자통신연구원 SW서비스연구팀)
Lee, Im-Yeoung (순천향대학교 컴퓨터학부)
Abstract
Mobile environments are evolving the main communication environment as a develops of communication technology. In mobile environments, sensitive information can be compromised on-line, so demand for security has increased. Also, mobile devices that provide various services are in danger from malware and illegal devices, phishing and sniffing etc, and the privacy. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM protects user privacy and platform integrity, because it is embedded in the platform, and it is physically secure. However, a security approach is required when secret data is migrated elsewhere, because MTM provides strong security functions. In this paper, we analyze the TCG standard and migration method for cryptographic key, then we propose a secure migration scheme for cryptographic key using key Backup/Recovery method.
Keywords
Trusted Computing; Mobile Trusted Module; Key Backup/Recovery;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Trusted Computing Group, 'TCG TPM Specification Version 1.2 Revision 103,' 2007
2 J. Lindqvist, Laura Takkinen, 'Privacy Management for Secure Mobility,' WPES'06, 2006   DOI
3 김무섭, 신진아, 박영수, 전성익, '모바일 플랫폼용 공통보안핵심 모듈 기술,' 정보보호학회지, 제 17권, 제 3호, pp.7-17, 2006   과학기술학회마을
4 A. K. Ghosh, Tara M. Swaminatha, 'Software security and privacy risks in mobile e-commerce,' Communications of the ACM, Vol 44, No 2, pp.51-57, 2001   DOI   ScienceOn
5 Trusted Computing Group, 'TCG Specification Architecture Overview,' Revision 1.4, 2007
6 Microsoft, 'Windows Vista BitLocker Drive Encryption: Technical Overview', http://technet.microsoft.com/en-us/windowsvista/ aa906017.aspx
7 Trusted Computing Group, 'Backgrounder,' 2006
8 E. Gallery, C. J. Mitchell, 'Trusted Mobile Platforms,' Foundations of Security Analysis and Design IV, LNCS 4677, pp.282-323, 2007   DOI   ScienceOn
9 Ulrich Kuhn, Klaus Kursawe, Stefan Lucks, 'Secure Data Management in Trusted Computing,' CHES 2005, LNCS 3659, pp.324.338, 2005   DOI   ScienceOn
10 김영수, 박영수, 박지만, 김무섭, 김영세, 주홍일, 김명은, 김학두, 최수길, 전성익, '신뢰 컴퓨팅과 TCG 동향,' 전자통신동향분석, 제 22권 제 1호, pp.83-96, 2007   과학기술학회마을
11 Trusted Computing Group, 'Mobile Trusted Module Specification General Overview FAQ,' 2007
12 Trusted Computing Group, 'Mobile Phone Work Group Use Cases,' 2005