Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2011.18C.5.293

A Study on Providing Secure Storage and User Authentication Using MTM on Mobile Platform  

Lee, Sun-Ho (순천향대학교 컴퓨터학부)
Lee, Im-Yeong (순천향대학교 컴퓨터소프트웨어학과)
Abstract
The various information services can be delivered by smartphone through advanced high-speed mobile communication. A smartphone is a mobile device that offers more powerful computing capacity than feature phone. Therefore this device can provide such as web surfing, editing documents, playing video, and playing games. A lot of personal information stored on smartphone. Because it has High usability. Personal information Leaks if the smart phone is lost or stolen may become a big problem. In this paper we have analyzed existing method for providing secure storage and user authentication on mobile platform and derived security requirement. Therefore we propose the following scheme that satisfy security requirement. Proposed scheme providing secure storage with preventing authentication bypass, and availability from damaged data to access secure area.
Keywords
Mobile Platform; Secure Storage; Authentication;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Trusted Computing Group, "Backgrounder", 2006
2 Trusted Computing Group, "Mobile Trusted Module Specification FAQ", 2006.
3 Trusted Computing Group, "Trusted Computing Group Mobile Specification: Securing Mobile Devices on Converged Networks", 2006.
4 Trusted Computing Group, "TCG Specification Architecture Overview", Revision 1.4, 2007.
5 Trusted Computing Group, "TCG TPM Specification Version 1.2 Revision 103", 2007.
6 Trusted Computing Group, "TimeLine", 2007.
7 U. Kuhn, K. Kursawe, S. Lucks, "Secure Data Management in Trusted Computing", CHES 2005, LNCS 3659, pp.324-338, 2005.
8 윤민홍, 김선자, "글로벌 모바일 단말 소프트웨어 플랫폼 동향", 전자통신동향분석, 23(1), 2008. 2.
9 이기혁, "Mobile Security 현황과 통신사업자 대응 방안", SIS2009, 2009.
10 이선호, 이임영, "USB 메모리를 위한 보안 솔루션에 관한 연구", 멀티미디어학회 논문지, 13(1), 2010. 1.   과학기술학회마을
11 Apple inc., "iPhone in Business Security Overview", 2009.
12 제갈병직, "스마트폰 시장과 모바일OS 동향", Semiconductor Insight, 2010.
13 Andrew Hoog, "Android Forensics". viaForensics, 2009.
14 Andrew Hoog, Kyle Gaffaney, "iPhone Forensics". viaForensics, 2009.
15 Nicolas Seriot, "iPhone Privacy", BlackHatDC2010, 2010.
16 Trusted Computing Group, "Mobile Phone Work Group Use Cases", 2005.
17 김영수, 박영수, 박지만, 김무섭, 김영세, 주홍일, 김명은, 김학두, 최수길, 전성익, "신뢰 컴퓨팅과 TCG 동향", 전자통신동향분석, 22(1), pp.83-96, 2007.
18 강동호, 한진희, 이윤경, 조영섭, 한승완, 김정녀, 조현숙, "모바일 단말 보안 운영체제기술 동향", 전자통신동향분석, 25(3), 2010.
19 김기영, 강동호, "개방형 모바일 환경에서 스마트폰 보안기술", 정보보학회 논문지, 10(5), 2009.
20 김무섭, 신진아, 박영수, 전성익, "모바일 플랫폼용 공통보안핵심 모듈기술", 정보보호학회지, 제 16권, 제 3호, pp.7-17, 2006.
21 배근태, 김기영, "모바일 단말 보안 운영체제기술 동향", 전자통신동향분석, 23(4), 2008.
22 유지은, "스마트폰의 Key Enabler : 소프트웨어", SW Insight, 2009.
23 iSecPartners, http://www.isecpartners.com/mobile-securitytools/ manifes12t-explorer.html