Efficiency of Paid Authentication Methods for Mobile Devices

被引:0
|
作者
Jeong Yeon Kim
机构
[1] Sangmyung University,Department of Business Administration
来源
关键词
Authentication; Efficiency; Cloud computing; Security; Privacy; IoT; IoE;
D O I
暂无
中图分类号
学科分类号
摘要
Collecting sensor data through wireless Internet protocol with cloud computing is a new IT architecture and many applications are adopting similar framework of Internet of Things based on it. For sensor devices, cloud environment can be applied to reduce their computing resource limitations to store, index and process their data. Besides, there are several concerns on communication between them in terms of security and privacy issues. In this paper, we focus on paid user authentication methods for the communication in Korea. System managers’ survey on their preferences based on given criteria shows overall priority of security investment. Survey results show system experts have diverse opinions on paid authentication methods based on convenience, security level and operational cost. To review the current challenges of paid authentication method, we scrutinize recent survey results on authentication methods in terms of Internet of Everything framework. Also we compare the well-defined data security requirements in Internet services with current devices to check its compatibility to protect personal data from the security perspective.
引用
收藏
页码:543 / 551
页数:8
相关论文
共 50 条
  • [21] Local authentication with Bluetooth enabled mobile devices
    Dellutri, F
    Me, GL
    Strangio, MA
    2005 JOINT INTERNATIONAL CONFERENCE ON AUTONOMIC AND AUTONOMOUS SYSTEMS AND INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES (ICAS/ICNS), 2005, : 447 - 452
  • [22] Biometric Authentication System on Mobile Personal Devices
    Tao, Qian
    Veldhuis, Raymond
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2010, 59 (04) : 763 - 773
  • [23] Authentication of users of mobile devices by their motor reactions
    Nechiporenko A.S.
    Gubarenko E.V.
    Gubarenko M.S.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (12): : 987 - 1003
  • [24] Ensuring Secured Iris Authentication for Mobile Devices
    Choudhary, Meenakshi
    Tiwari, Vivek
    Venkanna, U.
    2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2021,
  • [25] Proximity-based authentication of mobile devices
    Scannell, Adin
    Varshavsky, Alexander
    LaMarca, Anthony
    de Lara, Eyal
    International Journal of Security and Networks, 2009, 4 (1-2) : 4 - 16
  • [26] Who wants Continuous Authentication on Mobile Devices?
    Rasnayaka, Sanka
    Sim, Terence
    2018 IEEE 9TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS), 2018,
  • [27] A Flick Biometric Authentication Mechanism on Mobile Devices
    Shih, Dong-Her
    Lu, Chia-Ming
    Shih, Ming-Hung
    2015 INTERNATIONAL CONFERENCE ON INFORMATIVE AND CYBERNETICS FOR COMPUTATIONAL SOCIAL SYSTEMS (ICCSS), 2015, : 31 - 33
  • [28] Flexible and Transparent User Authentication for Mobile Devices
    Clarke, Nathan
    Karatzouni, Sevasti
    Furnell, Steven
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 1 - 12
  • [29] Comprehensive analysis of continuous authentication for mobile devices
    Dagar, Aishani
    Singh, Karan
    Khan, Tayyab
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (07): : 2007 - 2024
  • [30] Behaviour Profiling for Transparent Authentication for Mobile Devices
    Li, Fudong
    Clarke, Nathan
    Papadaki, Maria
    Dowland, Paul
    PROCEEDINGS OF THE 10TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 307 - 314