User authentication on smart phones using a data mining method

Yujin Tang*, Nakazato Hidenori, Yoshiyori Urano

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

The 21st century witnessed the wide spread of smart phones such as iPhone. The daily growing importance of smart phones' also implies the increasing amount of user sensitive data stored in a cell phone, which positions mobile user authentication in an even more important role. Existing mobile user authentication methods either require special hardware or are not user transparent. In this paper, we present a mobile user authentication scheme using a data mining method that identifies a user based on cell phones' application history and GPS information. These data can be collected on almost every smart phone without user awareness and are prone to reflect a user's habit and biometric feature. We organize these data in directional graphs and introduce a metric based on which to classify the data. Experiments and results on real data are explained to show our scheme's effectiveness.

Original languageEnglish
Title of host publication2010 International Conference on Information Society, i-Society 2010
Pages173-178
Number of pages6
Publication statusPublished - 2010 Dec 1
Event2010 International Conference on Information Society, i-Society 2010 - London, United Kingdom
Duration: 2010 Jun 282010 Jun 30

Publication series

Name2010 International Conference on Information Society, i-Society 2010

Conference

Conference2010 International Conference on Information Society, i-Society 2010
Country/TerritoryUnited Kingdom
CityLondon
Period10/6/2810/6/30

ASJC Scopus subject areas

  • Information Systems

Fingerprint

Dive into the research topics of 'User authentication on smart phones using a data mining method'. Together they form a unique fingerprint.

Cite this