کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
861135 1470785 2012 6 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Secure System Architecture for Wide Area Surveillance Using Security, Trust and Privacy (STP) Framework
موضوعات مرتبط
مهندسی و علوم پایه سایر رشته های مهندسی مهندسی (عمومی)
پیش نمایش صفحه اول مقاله
Secure System Architecture for Wide Area Surveillance Using Security, Trust and Privacy (STP) Framework
چکیده انگلیسی

Mobile computing emerged in the market for the past few years to provide solution for various platforms that range from smart phone, tablet, laptop, desktop computer, server to virtual computing systems such as cloud computing. The design approach and development of solutions for mobile computing continues to evolve in fulfilling the needs of diverse applications that run on various platforms. Recently, a new framework was introduced to provide a unified approach to resolve Security, Trust and Privacy (STP) enhancement on these platforms. This new framework emerged to enable a better way of dealing with security, trust and privacy conflicting aspects in pervasive environment such as mobile computing. This framework will be useful for system architects, engineers, designers and developers that are still struggling to create a secure, trustworthy, and privacy preserved environment to create confidence amongst users to do business transactions and collaborations especially in a more challenging environment such as cloud computing. In this paper, we discuss and propose new Secure System Architecture for strengthening surveillance activities in Wide Area using a combination of Trusted Computing (TC) via mutual attestation process to ensure integrity of components of the system, and Surveillance System. We further propose using Intel AMT chip that will generate a heartbeat pulse and transmit the signal through network interface to detect any possible physical intrusion. A failure to provide this pulse within a given time frame will trigger an action by the trusted security system for further analysis such as thievery detection.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Procedia Engineering - Volume 41, 2012, Pages 480-485