Efficiency of Paid Authentication Methods for Mobile Devices

被引:0
|
作者
Jeong Yeon Kim
机构
[1] Sangmyung University,Department of Business Administration
来源
关键词
Authentication; Efficiency; Cloud computing; Security; Privacy; IoT; IoE;
D O I
暂无
中图分类号
学科分类号
摘要
Collecting sensor data through wireless Internet protocol with cloud computing is a new IT architecture and many applications are adopting similar framework of Internet of Things based on it. For sensor devices, cloud environment can be applied to reduce their computing resource limitations to store, index and process their data. Besides, there are several concerns on communication between them in terms of security and privacy issues. In this paper, we focus on paid user authentication methods for the communication in Korea. System managers’ survey on their preferences based on given criteria shows overall priority of security investment. Survey results show system experts have diverse opinions on paid authentication methods based on convenience, security level and operational cost. To review the current challenges of paid authentication method, we scrutinize recent survey results on authentication methods in terms of Internet of Everything framework. Also we compare the well-defined data security requirements in Internet services with current devices to check its compatibility to protect personal data from the security perspective.
引用
收藏
页码:543 / 551
页数:8
相关论文
共 50 条
  • [31] LEARNING ON A BUDGET FOR USER AUTHENTICATION ON MOBILE DEVICES
    Kolosnjaji, Bojan
    Huefner, Antonia
    Eckert, Claudia
    Zarras, Apostolis
    2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 2042 - 2046
  • [32] A survey on touch dynamics authentication in mobile devices
    Teh, Pin Shen
    Zhang, Ning
    Teoh, Andrew Beng Jin
    Chen, Ke
    COMPUTERS & SECURITY, 2016, 59 : 210 - 235
  • [33] SECURE AUTHENTICATION AND AUTHORIZATION SCHEME FOR MOBILE DEVICES
    Wang, Jian
    Jiang, Nan
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 207 - +
  • [34] A Continuous User Authentication Scheme for Mobile Devices
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [35] Design of Fuzzy Expert System for Evaluation of Contemporary User Authentication Methods Intended for Mobile Devices
    Korac, Dragon
    Simic, Dejan
    CONTROL ENGINEERING AND APPLIED INFORMATICS, 2017, 19 (04): : 93 - 100
  • [36] A Review of Multimodal Facial Biometric Authentication Methods in Mobile Devices and their Application in Head Mounted Displays
    Olade, Ilesanmi
    Liang, Hai-Ning
    Fleming, Charles
    2018 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2018, : 1997 - 2004
  • [37] Swipe Gesture based Continuous Authentication for Mobile Devices
    Mondal, Soumik
    Bours, Patrick
    2015 INTERNATIONAL CONFERENCE ON BIOMETRICS (ICB), 2015, : 458 - 465
  • [38] FACE-BASED ACTIVE AUTHENTICATION ON MOBILE DEVICES
    Fathy, Mohammed E.
    Patel, Vishal M.
    Chellappa, Rama
    2015 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING (ICASSP), 2015, : 1687 - 1691
  • [39] A Remote User Authentication Scheme with Anonymity for Mobile Devices
    Shin, Soobok
    Kim, Kangseok
    Kim, Ki-Hyung
    Yeh, Hongjin
    INTERNATIONAL JOURNAL OF ADVANCED ROBOTIC SYSTEMS, 2012, 9
  • [40] Movement Pattern Based Authentication for Smart Mobile Devices
    Rahman, Khandaker Abir
    Tubbs, Dustyn J.
    Hossain, Md Shafaeat
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2018, : 1054 - 1058