Skip to Main content Skip to Navigation
Conference papers

Practical and Privacy-Preserving TEE Migration

Abstract : Running within the TEE, the Trusted Applications (TA) belong to diverse service providers. Each TA manipulates a profile, constituted of secret credentials and user’s private data. Normally, a user should be able to transfer his TEE profiles from a TEE to another compliant TEE. However, TEE profile migration implies security and privacy issues in particular for TEE profiles that require explicit agreement of the service provider. In this paper, we first present our perception of the deployment and implementation of a TEE: we organize the TEE into security domains with different roles and privileges. Based on this new model, we build a migration protocol of TEE profiles ensuring its confidentiality and integrity. To this end, we use a reencryption key and an authorization token per couple of devices, per service provider and per transfer. The proposed protocol has been successfully validated by AVISPA, an automated security protocol validation tool.
Document type :
Conference papers
Complete list of metadatas

https://hal.inria.fr/hal-01183508
Contributor : Jean-François Lalande <>
Submitted on : Monday, January 23, 2017 - 2:55:01 PM
Last modification on : Wednesday, April 8, 2020 - 4:12:23 PM
Long-term archiving on: : Monday, April 24, 2017 - 2:35:34 PM

File

978-3-319-24018-3_10_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Ghada Arfaoui, Jean-François Lalande, Saïd Gharout, Jacques Traoré. Practical and Privacy-Preserving TEE Migration. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩. ⟨hal-01183508⟩

Share

Metrics

Record views

768

Files downloads

559