Efficiency of Paid Authentication Methods for Mobile Devices

被引:0
|
作者
Jeong Yeon Kim
机构
[1] Sangmyung University,Department of Business Administration
来源
关键词
Authentication; Efficiency; Cloud computing; Security; Privacy; IoT; IoE;
D O I
暂无
中图分类号
学科分类号
摘要
Collecting sensor data through wireless Internet protocol with cloud computing is a new IT architecture and many applications are adopting similar framework of Internet of Things based on it. For sensor devices, cloud environment can be applied to reduce their computing resource limitations to store, index and process their data. Besides, there are several concerns on communication between them in terms of security and privacy issues. In this paper, we focus on paid user authentication methods for the communication in Korea. System managers’ survey on their preferences based on given criteria shows overall priority of security investment. Survey results show system experts have diverse opinions on paid authentication methods based on convenience, security level and operational cost. To review the current challenges of paid authentication method, we scrutinize recent survey results on authentication methods in terms of Internet of Everything framework. Also we compare the well-defined data security requirements in Internet services with current devices to check its compatibility to protect personal data from the security perspective.
引用
收藏
页码:543 / 551
页数:8
相关论文
共 50 条
  • [41] RFID-based Authentication Middleware for Mobile Devices
    Syta, Ewa
    Kurkovsky, Stan
    Casano, Bernardo
    43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 2827 - 2836
  • [42] Touch to Authenticate - Continuous Biometric Authentication on Mobile Devices
    Temper, Marlies
    Tjoa, Simon
    Kaiser, Manfred
    PROCEEDINGS 2015 FIRST INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2015), 2015, : 30 - 35
  • [43] Identity authentication based on trajectory characteristics of mobile devices
    Gao, Zhigang
    Cheng, Zhichao
    Diao, Wenjie
    Zhang, Jianhui
    Lu, Huijuan
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112
  • [44] Active authentication for mobile devices utilising behaviour profiling
    Li, Fudong
    Clarke, Nathan
    Papadaki, Maria
    Dowland, Paul
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (03) : 229 - 244
  • [45] Mutual authentication for low-power mobile devices
    Jakobsson, M
    Pointcheval, D
    FINANCIAL CRYTOGRAPHY, PROCEEDINGS, 2002, 2339 : 178 - 195
  • [46] Towards Multiple User Active Authentication in Mobile Devices
    Perera, Pramuditha
    Patel, Vishal M.
    2017 12TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC FACE AND GESTURE RECOGNITION (FG 2017), 2017, : 354 - 361
  • [47] Keystroke dynamics-based authentication for mobile devices
    Hwang, Seong-Seob
    Cho, Sungzoon
    Park, Sunghoon
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 85 - 93
  • [48] Authentication in mobile devices through hand gesture recognition
    J. Guerra-Casanova
    C. Sánchez-Ávila
    G. Bailador
    A. de Santos Sierra
    International Journal of Information Security, 2012, 11 : 65 - 83
  • [49] User authentication on mobile devices: Approaches, threats and trends
    Wang, Chen
    Wang, Yan
    Chen, Yingying
    Liu, Hongbo
    Liu, Jian
    COMPUTER NETWORKS, 2020, 170
  • [50] Action-based Authentication Scheme for Mobile Devices
    Garcia, Jan Edson S.
    Atienza, Rowel O.
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL I, 2010, : 380 - 383