Provably secure and biometric-based secure access of e-Governance services using mobile devices

2021 ◽  
Vol 63 ◽  
pp. 103016
Author(s):  
Preeti Soni ◽  
Arup Kumar Pal ◽  
SK Hafizul Islam ◽  
Aadarsh Singh ◽  
Priyanshu Kumar
Author(s):  
Pedro Miguel Sánchez Sánchez ◽  
José María Jorquera Valero ◽  
Alberto Huertas Celdran ◽  
Gregorio Martínez Pérez

Continuous authentication systems are considered as a promising solution to secure access to mobile devices. Their main benefit is the improvement of the users' experience when they use the services or applications of their mobile device. Specifically, continuous authentication avoids having to remember or possess any key to access an application or service that requires authentication. In this sense, having the user authenticated permanently increases the security of the device. It also allows the user interaction with applications to be much more fluid, simple, and satisfactory. This chapter proposes a new continuous authentication system for mobile devices. The system acquires data from the device sensors and the GPS location to create a dataset that represents the user's profile or normal behaviour. Then, the proposed system uses Machine Learning algorithms based on anomaly detection to perform user identification in real time. Several experiments have been carried out to demonstrate the performance and usefulness of the proposed solution.


2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
Jiaqing Mo ◽  
Zhongwang Hu ◽  
Hang Chen ◽  
Wei Shen

Nowadays, due to the rapid development and wide deployment of handheld mobile devices, the mobile users begin to save their resources, access services, and run applications that are stored, deployed, and implemented in cloud computing which has huge storage space and massive computing capability with their mobile devices. However, the wireless channel is insecure and vulnerable to various attacks that pose a great threat to the transmission of sensitive data. Thus, the security mechanism of how the mobile devices and remote cloud server authenticate each other to create a secure session in mobile cloud computing environment has aroused the interest of researchers. In this paper, we propose an efficient and provably secure anonymous two-factor user authentication protocol for the mobile cloud computing environment. The proposed scheme not only provides mutual authentication between mobile devices and cloud computing but also fulfills the known security evaluation criteria. Moreover, utilization of ECC in our scheme reduces the computing cost for mobile devices that are computation capability limited and battery energy limited. In addition, the formal security proof is given to show that the proposed scheme is secure under random oracle model. Security analysis and performance comparisons indicate that the proposed scheme has reasonable computation cost and communication overhead at the mobile client side as well as the server side and is more efficient and more secure than the related competitive works.


2018 ◽  
Vol 5 (6) ◽  
pp. 5271-5280 ◽  
Author(s):  
Yudi Zhang ◽  
Debiao He ◽  
Sherali Zeadally ◽  
Ding Wang ◽  
Kim-Kwang Raymond Choo

2015 ◽  
Vol 7 (1) ◽  
pp. 91
Author(s):  
Jonathan Dale

Fiberlink's mission is to enable our customers to securely extend mobile technologies out to the edges of their organizations. We believe that working in the mobile age should be easy and safe for employees and the IT organizations that support them. Our solutions provide secure access to corporate resources and infor - mation from mobile devices, without compromising the user experience, data security or privacy. We are proud of our cus - tomer-first culture and integrate it into everything we do.


Hadmérnök ◽  
2020 ◽  
Vol 15 (4) ◽  
pp. 15-28
Author(s):  
Kata Rebeka Szűcs ◽  
Arnold Őszi ◽  
Tibor Kovács

The present article aims to introduce the ways of secure access control, with a special emphasis on  biometric solutions on mobile devices. Apart from secure biometric data storage, which is also a very important aspect of this topic, there are several other  types of threats. On the following pages we provide a short description of the possible risks of  biometric systems. In order to understand the current status and attitude towards biometrics, we introduce our own survey as well.


Author(s):  
Macià Mut-Puigserver ◽  
M. Magdalena Payeras-Capellà ◽  
Jordi Castellà-Roca ◽  
Llorenç Huguet-Rotger

Sign in / Sign up

Export Citation Format

Share Document