Research Article
TAMEC: Trusted Augmented Mobile Execution on Cloud
Table 1
Threats vs. security mechanisms.
| Threat | Catered | Mechanism |
| Threats on cloud node/TC | Masquerading | Yes | Each node’s AIK is already known to TC | Eavesdropping | Yes | Use of only trusted software ensures that no information can be manipulated or tempered with | Message tempering | Yes | Malware | Yes | Malware cannot remain undetected since TC checks status of each node through remote attestation process | Message replay | Yes | The nonces used ensure freshness |
| Threats to mobile client | Man in the middle | Yes | The processed data are being received encrypted which can only be accessed by the relevant mobile client | Result tempering | Yes | Since the data are encrypted, no one can alter the data undetectably |
|
|