Practical and Privacy-Preserving TEE Migration - Information Security Theory and Practice Access content directly
Conference Papers Year : 2015

Practical and Privacy-Preserving TEE Migration


Running within the TEE, the Trusted Applications (TA) belong to diverse service providers. Each TA manipulates a profile, constituted of secret credentials and user’s private data. Normally, a user should be able to transfer his TEE profiles from a TEE to another compliant TEE. However, TEE profile migration implies security and privacy issues in particular for TEE profiles that require explicit agreement of the service provider. In this paper, we first present our perception of the deployment and implementation of a TEE: we organize the TEE into security domains with different roles and privileges. Based on this new model, we build a migration protocol of TEE profiles ensuring its confidentiality and integrity. To this end, we use a reencryption key and an authorization token per couple of devices, per service provider and per transfer. The proposed protocol has been successfully validated by AVISPA, an automated security protocol validation tool.
Fichier principal
Vignette du fichier
978-3-319-24018-3_10_Chapter.pdf (477.11 Ko) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01183508 , version 1 (23-01-2017)





Ghada Arfaoui, Jean-François Lalande, Saïd Gharout, Jacques Traoré. Practical and Privacy-Preserving TEE Migration. 9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩. ⟨hal-01183508⟩
430 View
300 Download



Gmail Facebook X LinkedIn More