A low-consumption secure resource download scheme based on trusted cloud

min li,zhiguang qin,yang bai,cong wang,ruijin wang
DOI: https://doi.org/10.1109/ICCCAS.2013.6765214
2013-01-01
Abstract:Due to the development of modern networks, more and more resources can be obtained from the Internet. Unfortunately, these resources may include a variety of malicious attacks. How to ensure the security of the downloading resource has increasingly become a focus. So, this paper introduces a novel secure resource download scheme which is well-suited for the thin clients. And in this scheme, instead of the client, the authorized cloud will download resources to detect based on credible strategy. Only certified as safe, resources can be downloaded to the client directly from the cloud. This approach provides several important benefits including better saving the client's consumption (including the bandwidth, time and system resources), enhancing the security of the authorization and account information, and improving detection of malicious software. To explore the idea we construct a prototype which includes an authorization and authentication sever, a lightweight host agent and a cloud service center, and we analysis the security and the efficiency of the credible strategy.
What problem does this paper attempt to address?