Efficiency of Paid Authentication Methods for Mobile Devices

被引:0
作者
Jeong Yeon Kim
机构
[1] Sangmyung University,Department of Business Administration
来源
Wireless Personal Communications | 2017年 / 93卷
关键词
Authentication; Efficiency; Cloud computing; Security; Privacy; IoT; IoE;
D O I
暂无
中图分类号
学科分类号
摘要
Collecting sensor data through wireless Internet protocol with cloud computing is a new IT architecture and many applications are adopting similar framework of Internet of Things based on it. For sensor devices, cloud environment can be applied to reduce their computing resource limitations to store, index and process their data. Besides, there are several concerns on communication between them in terms of security and privacy issues. In this paper, we focus on paid user authentication methods for the communication in Korea. System managers’ survey on their preferences based on given criteria shows overall priority of security investment. Survey results show system experts have diverse opinions on paid authentication methods based on convenience, security level and operational cost. To review the current challenges of paid authentication method, we scrutinize recent survey results on authentication methods in terms of Internet of Everything framework. Also we compare the well-defined data security requirements in Internet services with current devices to check its compatibility to protect personal data from the security perspective.
引用
收藏
页码:543 / 551
页数:8
相关论文
共 50 条
  • [41] Review of Biometric Authentication Methods in Mobile Payment
    Alaqeel, Afra
    Alghamdi, Maysun
    Alkhathami, Mohammed
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT: A 2025 VISION TO SUSTAIN ECONOMIC DEVELOPMENT DURING GLOBAL CHALLENGES, 2020, : 10289 - 10299
  • [42] Strong Authentication for Mobile Cloud Computing
    Ahmed-Nacer, Anis
    Ahmed-Nacer, Mehdi
    2016 13TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES FOR DISTRIBUTED SYSTEMS (NOTERE), 2016,
  • [43] Efficient Authentication for Mobile and Pervasive Computing
    Alomair, Basel
    Poovendran, Radha
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (03) : 469 - 481
  • [44] A Blockchain Based Decentralized Authentication Framework for Resource Constrained IOT devices
    Panda, Soumyashree S.
    Satapathy, Utkalika
    Mohanta, Bhabendu K.
    Jena, Debasish
    Gountia, Debasis
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [45] Authentication in mobile devices through hand gesture recognition
    J. Guerra-Casanova
    C. Sánchez-Ávila
    G. Bailador
    A. de Santos Sierra
    International Journal of Information Security, 2012, 11 : 65 - 83
  • [46] Action-based Authentication Scheme for Mobile Devices
    Garcia, Jan Edson S.
    Atienza, Rowel O.
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL I, 2010, : 380 - 383
  • [47] Authentication in mobile devices through hand gesture recognition
    Guerra-Casanova, J.
    Sanchez-Avila, C.
    Bailador, G.
    de Santos Sierra, A.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2012, 11 (02) : 65 - 83
  • [48] Towards port-knocking authentication methods for mobile cloud computing
    Khan, Suleman
    Shiraz, Muhammad
    Boroumand, Laleh
    Gani, Abdullah
    Khan, Muhammad Khurram
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 97 : 66 - 78
  • [49] An Efficiency Model for Authentication Approaches in WBAN
    Meena, Uma
    Jha, M. K.
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2015, : 476 - 481
  • [50] A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices
    Almuairfi, Sadiq
    Veeraraghavan, Prakash
    Chilamkurti, Naveen
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 108 - 116