skip to main content
10.1145/1866855.1866869acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Gatekeeper: providing secure interoperability between mobile web-browser and local resources

Published: 08 October 2010 Publication History

Abstract

The most popular platforms being developed currently are those used in mobile devices. In particular, mobile Web-based services have attracted the attention of platform developers. However, mobile Web applications offer limited functionality. Therefore, in this paper, we propose a scheme called Gatekeeper, which offers secure interworking for mobile Web-browsers that maintains the convenience of normal Web use. In our scheme, a Web-browser calls Gatekeeper using a URL protocol handler. Gatekeeper then provides secure communication using pre-established keys shared between a remote server and local resource. Compared to related studies, the Gatekeeper scheme shows an improvement in security. Moreover, the scheme is not constrained to a specific environment.

References

[1]
]]ITU-D, "The WORLD IN 2009: ICT FACTS AND FIGURES, ITU TELECOM WORLD 2009", 2009.10. {online} Available: http://www.itu.int/ITU-D/ict/material/Telecom09_flyer.pdf
[2]
]]Cowen and Company, "wireless equipment", November 2008.
[3]
]]IDC, "Worldwide Quarterly Mobile Phone Tracker", April 2010.
[4]
]]Sang Ok Park, "The Framework for Providing Compatibility to various Web Browser Plug-ins", Master's Thesis, KAIST, August 2009.
[5]
]]Jesse James Garrett, "Ajax: A New Approach to Web Applications", February 2005. {online} Available: http://www.adaptivepath.com/ideas/essays/archives/000385.php
[6]
]]J. Ruderman, "Same origin policy for JavaScript", 2008. {online} Available: http://developer.mozilla.org/En/Same_origin_policy_for_JavaScript.
[7]
]]Ian Hickson, "HTML5 Web Messaging", Editor's Draft 15, W3C, June 2010. {online} Available: http://www.w3.org/TR/postmsg/
[8]
]]D. Chappell, "Understanding ActiveX and OLE", Microsoft Press, 1997.
[9]
]]T. Berners-Lee, R. Fielding, and H. Frystyck, "Hypertext Transfer Protocol-HTTP/1.0", RFC 1945, May 1998.
[10]
]]Tomas Joelsson, "Mobile Web Browser Extensions", Master of Science Thesis, KTH Information and Communication Technology, July 2008.
[11]
]]Sing Li and Jonathan Knudsen, "Beginning J2ME Platform, From Novice to Professional", Apress, third edition, 2005
[12]
]]R. Petke and I. King, "Registration Procedures for URL Scheme Names", RFC 2717, November 1999.
[13]
]]Y. Oiwa, H. Watanabe, H. Takagi, and H.Suzuki, "Mutual Authentication Protocol for HTTP", IETF Internet Draft, February 2010. {online} Available: http://tools.ietf.org/html/draft-oiwa-http-mutualauth-06
[14]
]]International Organization for Standardization, "Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets", ISO Standard 11770-4, May 2006.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
DIM '10: Proceedings of the 6th ACM workshop on Digital identity management
October 2010
70 pages
ISBN:9781450300902
DOI:10.1145/1866855
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 October 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. mobile device
  2. mobile web-browser
  3. password-authenticated key exchange
  4. url protocol handler

Qualifiers

  • Research-article

Conference

CCS '10
Sponsor:

Acceptance Rates

DIM '10 Paper Acceptance Rate 8 of 16 submissions, 50%;
Overall Acceptance Rate 16 of 34 submissions, 47%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 180
    Total Downloads
  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media