Show simple item record

dc.contributor.authorAlotaibi, S
dc.contributor.authorFurnell, Steven
dc.contributor.authorClarke, Nathan
dc.date.accessioned2019-04-16T09:27:22Z
dc.date.issued2019-04-29
dc.identifier.issn1939-3547
dc.identifier.issn1939-3547
dc.identifier.urihttp://hdl.handle.net/10026.1/13719
dc.description.abstract

With the rapid growth of smartphones and tablets in our daily lives, securing the sensitive data stored upon them makes authentication of paramount importance. Current authentication approaches do not re-authenticate in order to re-validate the user’s identity after accessing a mobile phone. Accordingly, there is a security benefit if authentication can be applied continually and transparently (i.e., without obstructing the user’s activities) to authenticate legitimate users, which is maintained beyond point of entry. To this end, this paper suggests a novel transparent user authentication method for mobile applications by applying biometric authentication on each service within a single application in a secure and usable manner based on the risk level. A study involving data collected from 76 users over a one-month period using 12 mobile applications was undertaken to examine the proposed approach. The experimental results show that this approach achieved desirable outcomes for applying a transparent authentication system at an intra-process level, with an average of 6% intrusive authentication requests. Interestingly, when the participants were divided into three levels of usage (high, medium and low), the average intrusive authentication request was 3% which indicates a clear enhancement and suggests that the system would add a further level of security without imposing significant inconvenience upon the user.

dc.format.extent292-305
dc.languageen
dc.language.isoen
dc.publisherTaylor & Francis
dc.subjectBiotechnology
dc.titleA Novel Transparent User Authentication Approach for Mobile Applications
dc.typejournal-article
dc.typeJournal Article
plymouth.issue5-6
plymouth.volume27
plymouth.publication-statusPublished
plymouth.journalInformation Security Journal: A Global Perspective
dc.identifier.doi10.1080/19393555.2019.1609628
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2019-04-08
dc.rights.embargodate2020-4-28
dc.identifier.eissn1939-3547
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1080/19393555.2019.1609628
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2019-04-29
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV