Practical and Privacy-Preserving TEE Migration

Abstract : Running within the TEE, the Trusted Applications (TA) belong to diverse service providers. Each TA manipulates a profile, constituted of secret credentials and user’s private data. Normally, a user should be able to transfer his TEE profiles from a TEE to another compliant TEE. However, TEE profile migration implies security and privacy issues in particular for TEE profiles that require explicit agreement of the service provider. In this paper, we first present our perception of the deployment and implementation of a TEE: we organize the TEE into security domains with different roles and privileges. Based on this new model, we build a migration protocol of TEE profiles ensuring its confidentiality and integrity. To this end, we use a reencryption key and an authorization token per couple of devices, per service provider and per transfer. The proposed protocol has been successfully validated by AVISPA, an automated security protocol validation tool.
Type de document :
Communication dans un congrès
Raja Naeem Akram; Sushil Jajodia. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. Springer, Lecture Notes in Computer Science, 9311, pp.153-168, Information Security Theory and Practice. 〈http://www.wistp.org/〉. 〈10.1007/978-3-319-24018-3_10〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01183508
Contributeur : Jean-François Lalande <>
Soumis le : lundi 23 janvier 2017 - 14:55:01
Dernière modification le : mardi 16 janvier 2018 - 15:54:19
Document(s) archivé(s) le : lundi 24 avril 2017 - 14:35:34

Fichier

978-3-319-24018-3_10_Chapter.p...
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Ghada Arfaoui, Jean-François Lalande, Saïd Gharout, Jacques Traoré. Practical and Privacy-Preserving TEE Migration. Raja Naeem Akram; Sushil Jajodia. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. Springer, Lecture Notes in Computer Science, 9311, pp.153-168, Information Security Theory and Practice. 〈http://www.wistp.org/〉. 〈10.1007/978-3-319-24018-3_10〉. 〈hal-01183508〉

Partager

Métriques

Consultations de la notice

394

Téléchargements de fichiers

2