Research Article
TAMEC: Trusted Augmented Mobile Execution on Cloud
Table 1
Threats vs. security mechanisms.
| | Threat | Catered | Mechanism |
| | Threats on cloud node/TC | | Masquerading | Yes | Each node’s AIK is already known to TC | | Eavesdropping | Yes | Use of only trusted software ensures that no information can be manipulated or tempered with | | Message tempering | Yes | | Malware | Yes | Malware cannot remain undetected since TC checks status of each node through remote attestation process | | Message replay | Yes | The nonces used ensure freshness |
| | Threats to mobile client | | Man in the middle | Yes | The processed data are being received encrypted which can only be accessed by the relevant mobile client | | Result tempering | Yes | Since the data are encrypted, no one can alter the data undetectably |
|
|