Secure mobile computing via public terminals

  • Authors:
  • Richard Sharp;James Scott;Alastair R. Beresford

  • Affiliations:
  • Intel Research, Cambridge, UK;Intel Research, Cambridge, UK;Computer Laboratory, University of Cambridge, Cambridge, UK

  • Venue:
  • PERVASIVE'06 Proceedings of the 4th international conference on Pervasive Computing
  • Year:
  • 2006

Quantified Score

Hi-index 0.01

Visualization

Abstract

The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals to handle personal data may compromise privacy. We present a system that enables users to access their applications and data securely using a combination of public terminals and a more trusted, personal device. Our system (i) provides users with capabilities to censor the public terminal display, so that it does not show private data; (ii) filters input events coming from the public terminal, so that maliciously injected keyboard/pointer events do not compromise privacy; and (iii) enables users to view personal information and perform data-entry via their personal device. A key feature of our system is that it works with unmodified applications. A prototype implementation of the system has been publicly released for Linux and Windows. The results arising from a pilot usability study based on this implementation are presented.