Trustworthy and personalized computing on public kiosks

  • Authors:
  • Scott Garriss;Rámon Cáceres;Stefan Berger;Reiner Sailer;Leendert van Doorn;Xiaolan Zhang

  • Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA, USA;AT&T Labs, Florham Park, NJ, USA;IBM T. J. Watson Research Center, Hawthorne, NY, USA;IBM T. J. Watson Research Center, Hawthorne, NY, USA;AMD, Austin, TX, USA;IBM T. J. Watson Research Center, Hawthorne, NY, USA

  • Venue:
  • Proceedings of the 6th international conference on Mobile systems, applications, and services
  • Year:
  • 2008

Quantified Score

Hi-index 0.02

Visualization

Abstract

Many people desire ubiquitous access to their personal computing environments. We present a system in which a user leverages a personal mobile device to establish trust in a public computing device, or kiosk, prior to resuming her environment on the kiosk. We have designed a protocol by which the mobile device determines the identity and integrity of all software loaded on the kiosk, in order to inform the user whether the kiosk is trustworthy. Our system exploits emerging hardware security technologies, namely the Trusted Platform Module and new support in x86 processors for establishing a dynamic root of trust. We have demonstrated the viability of our approach by implementing and evaluating our system on commodity hardware. Through a brief survey, we found that respondents are generally willing to endure a delay in exchange for an increased assurance of data privacy, and that the delay incurred by our unoptimized prototype is close to the range tolerable to the respondents. We have focused on allowing the user to personalize a kiosk by running her own virtual machine there. However, our work is generally applicable to establishing trust on public computing devices before revealing any sensitive information to those devices.