Abstract
The loss of control over a new-generation mobile device (e.g. loss of device or short time of inattention) can have negative impacts on the owner’s privacy due to the increasing number of privacy-sensitive data stored on such devices. Current mobile platforms either lack the required protection mechanisms or the implementations lack a balance between the level of security and usability. In order to fill this gap, we propose a design for a local security mechanism for mobile devices by using an reasonable combination of existing technologies.
Chapter PDF
Similar content being viewed by others
References
Morrissey, S., Campbell, T.: IOS forensic analysis. Apress, Berkeley (2010)
ISO: ISO 9241-11:1998-03, Ergonomic requirements for office work with visual display terminals (VDTs) – Part 11: Guidance on usability 35.180; 13.180(9241-11:1998-03). ISO, Geneva (1998)
Buhan, I., Kelkboom, E., Simoens, K.: A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), pp. 346–351. IEEE Press, New York (2010)
Merkle, J.: Biometrie-Daten-Schutz. Funktionsprinzip und Chancen biometrischer Kryptosysteme. In: KES 2008, vol. 6, p. 52. SecuMedia-Verlag, Ingelheim (2008)
Cavoukian, A., Stoianov, A.: Biometric Encryption. Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy. Discussion paper of the Office of the Information and Privacy Commissioner of Ontario (2007)
Park, K.R., Park, H., Kang, B.J., Lee, E.C., Jeong, D.S.: A study on iris localization and recognition on mobile phones. EURASIP Journal on Advances in Signal Processing, vol. 2008 (2008)
Tao, Q., Veldhuis, R.N.J.: Biometric Authentication for a Mobile Personal Device. In: Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, pp. 1–3. IEEE Press, New York (2006)
Furnell, S., Clarke, N., Karatzouni, S.: Beyond the PIN – Enhancing user authentication for mobile devices. In: Computer Fraud & Security 2008, vol. 8, pp. 12–17. Elsevier Science Inc., New York (2008)
Abileah A., Green P.: Optical sensors embedded within AMLCD panel: design and applications. In: Association for Computing Machinery (ACM) (eds.) Images and Beyond: the Future of Displays and Interaction, article no. 27. ACM, New York (2007)
Marcialis, G.L., Roli, F.: Fingerprint verification by fusion of optical and capacitive sensors. Pattern Recognition Letters 25(11), 1315–1322 (2004)
Schmidt, J.: Krypto für Jedermann. Richtig verschlüsseln mit Linux. Verschlüsselung unter Linux. In: c’t - Magazin für Computertechnik, vol. 11, pp. 192–195. Heise Verlag, Hannover (2011)
Dietrich, K., Winter, J.: Secure Boot Revisited. In: Wang, G. (ed.) The 9th International Conference for Young Computer Scientists, pp. 2360–2365. IEEE Press, New York (2008)
Cesena, E., Löhr, H., Ramunno, G., Sadeghi, A., Vernizzi, D.: Anonymous Authentication with TLS and DAA. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 47–62. Springer, Heidelberg (2010)
Kursawe, K., Schellekens, D., Preneel, B.: Analyzing trusted platform communication. In: ECRYPT Workshop, CRASH – Cryptographic Advances in Secure Hardware (2005)
Raghav Trivedi, T., Seshadri, R.: Efficient Cryptographic Key Generation using Biometrics. International Journal of Computer Technology and Applications 2(1), 183–187 (2011)
Becher, M., Freiling, F.C., Hoffmann, J., Holz, T., Uellenbeck, S., Wolf, C.: Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 96–111. IEEE Press, New York (2011)
Friedman, J., Hoffman, D.V.: Protecting Data on Mobile Devices: A Taxonomy of security threats to mobile computing and review of applicable defences. Information Knowledge Systems Management 7(1,2), 159–180 (2008)
Nicholson, A.J., Corner, M.D., Noble, B.D.: Mobile Device Security Using Transient Authentication. IEEE Transactions on Mobile Computing 5(11), 1489–1502 (2006)
Trusted Computing Group: TCG Mobile Trusted Module Specification. Specification Version 1.0 Revision 7.02 (2010)
Shi, E., Niu, Y., Jakobsson, M., Chow, R.: Implicit Authentication through Learning User Behavior. In: Burmester, M., Tsudik, G., Magliveras, S., Ilić, I. (eds.) ISC 2010. LNCS, vol. 6531, pp. 99–113. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Yang, S., Bal, G. (2012). Balancing Security and Usability of Local Security Mechanisms for Mobile Devices. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds) Information Security and Privacy Research. SEC 2012. IFIP Advances in Information and Communication Technology, vol 376. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30436-1_27
Download citation
DOI: https://doi.org/10.1007/978-3-642-30436-1_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30435-4
Online ISBN: 978-3-642-30436-1
eBook Packages: Computer ScienceComputer Science (R0)