Research Article

TAMEC: Trusted Augmented Mobile Execution on Cloud

Table 1

Threats vs. security mechanisms.

ThreatCateredMechanism

Threats on cloud node/TC
MasqueradingYesEach node’s AIK is already known to TC
EavesdroppingYesUse of only trusted software ensures that no information can be manipulated or tempered with
Message temperingYes
MalwareYesMalware cannot remain undetected since TC checks status of each node through remote attestation process
Message replayYesThe nonces used ensure freshness

Threats to mobile client
Man in the middleYesThe processed data are being received encrypted which can only be accessed by the relevant mobile client
Result temperingYesSince the data are encrypted, no one can alter the data undetectably