透過您的圖書館登入
IP:18.216.83.240
  • 學位論文

基於使用者行為利用連續驗證來保護行動裝置的隱私

Protecting Privacy of Mobile Devices Using Continuous Authentication Based on User Behavior

指導教授 : 雷欽隆

摘要


行動裝置上個資的隱私已經成為一個重要的課題,因為現今人類的生活與行動裝置越來越緊密,例如:簡訊、Facebook、信用卡號碼等等。因此,本篇論文提出一個方法能連續保護使用者的資訊避免遭受冒用者的攻擊。這個方法會偵測當前的使用者是否為行動裝置真實的擁有者或是冒充者。從實驗的結果中,我們觀察到與先前研究結果相比,利用我們的方法能夠比使用著名的分類演算法(SVN, k-NN)得到較低的equal error rate。

並列摘要


In recent years, mobile devices are nearly indispensable in our daily lives; for instance, message, Facebook, and credit card number. Therefore, privacy of personal information on mobile devices has become an important issue. Hence, this paper proposes a new approach continuously protecting the user information from an impostor’s attack. The approach detects whether the current users of mobile devices are actual owners or impostors. From the result of our experiment, we observed that our approach obtains the lower equal error rate than that of the related work, which make use of the popular classification algorithms (SVN, k-NN).

參考文獻


[2] M. Frank, R. Biedert, E. Ma, I. Martinovic, and D. Song, “Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication,” IEEE Transactions on Information Forensics and Security, Vol. 8, Issue 1, pp. 136-148, 2013.
[4] N. Zheng, K. Bai, H. Huang, and H. Wang, “You are How You Touch: User Verification on Smartphones via Tapping Behaviors,” in Proceedings of IEEE 22nd International Conference on Network Protocols, 2014, pp. 221-232.
[6] T. Feng, J. Yang, and Z. Yan, “TIPS: Context-Aware Implicit User Identification using Touch Screen in Uncontrolled Environments,” in Proceedings of the 15th Workshop on Mobile Computing Systems and Applications Article, No. 9, 2014.
[8] J. Roth, X. Liu, A. Ross, and D. Metaxas, “Investigating the Discriminative Power of Keystroke Sound,” IEEE Transactions on Information Forensics and Security, Vol. 10, Issue 2, pp. 333-345, 2015.
[11] D. Crouse, H. Han, D. Chandra, B. Barbello, and A. K. Jain, “Continuous authentication of mobile user: Fusion of face image and inertial Measurement Unit data,” in Proceedings of International Conference on Biometrics (ICB), 2015, pp. 135-142.

延伸閱讀