Title
Securing Highly-Sensitive Information In Smart Mobile Devices Through Difficult-To-Mimic And Single-Time Usage Analytics
Abstract
The ability of smart devices to recognize their owners or valid users gains attention with the advent of widespread highly sensitive usage of these devices such as storing secret and personal information. Unlike the existing techniques, in this paper, we propose a very lightweight single-time user identification technique that can ensure a unique authentication by presenting a system near-to-impossible to breach for intruders. Here, we have conducted a thorough study over single-time usage data collected from 33 users. The study reveals several new findings, which in turn, leads us to a novel solution exploiting a new machine learning technique. Our evaluation confirms that the proposed solution operates with only 5% False Acceptance Rate (FAR) and only 6% False Rejection Rate (FRR) over the data collected from 33 users. We further evaluate the performance through comparing its performance with some existing machine learning techniques. Finally, we perform a real implementation of our proposed solution as a mobile application to conduct a rigorous user evaluation over 27 participants using three different devices in order to show how the solution works in practical situations. Outcomes of the user evaluation demonstrate as low as 0% FAR after letting intruders to mimic the actual user, which ensures extremely low probability of being breached. Moreover, we let 2 users to continuously use our application over 25 days in different states during their operation. Outcomes of this evaluation demonstrate as low as 1% FRR confirming the usability of our technique in long-term usage.
Year
DOI
Venue
2018
10.1145/3286978.3287012
PROCEEDINGS OF THE 15TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2018)
Keywords
Field
DocType
Smartphone, Behavioral biometrics, Security, Mean-SD Clustering
Authentication,Computer science,Usability,Mobile device,Human–computer interaction,Acceptance rate,Personally identifiable information,Information sensitivity,Analytics,Usage data,Distributed computing
Conference
Citations 
PageRank 
References 
0
0.34
11
Authors
5
Name
Order
Citations
PageRank
Saiyma Sarmin100.34
Nafisa Anzum200.68
Kazi Hasan Zubaer300.34
Farzana Rahman417023.31
A. B. M. Alim Al Islam57227.82