xmlui.dri2xhtml.METS-1.0.item-contributor-funder:
Comunidad de Madrid European Commission Ministerio de Ciencia e Innovación (España) Universidad Carlos III de Madrid
Sponsor:
This work was partially supported by Spanish MINECO, AEI and European Regional Development Fund (ERDF), through grants TIN2017-84844-C2-1-R (COPCIS) and PID2019-111429RBC21 (ODIO); by Comunidad de Madrid (Spain) through grant P2018/TCS-4566-CM (CYNAMON), co-funded with ERDF, and also jointly with Univ. Carlos III de Madrid, grant CAVTIONS-CM-UC3M. Lorena González and José María de Fuentes would like to thank the Excellence Program for University Researchers. Luis Hernández-Álvarez would like to thank CSIC Project 202050E304 (CASDiM).
Project:
Comunidad de Madrid. S2018/TCS-4566 Comunidad de Madrid. CAVTIONS-CM-UC3M Gobierno de España. PID2019-111429RB-C21 Gobierno de España. TIN2017-84844-C2-1-R Comunidad de Madrid/Universidad Carlos III de Madrid. CAVTIONS-CM-UC3M
Continuous Authentication (Ca) Approaches Are Attracting Attention Due To The Explosion Of Available Sensors From Iot Devices Such As Smartphones. However, A Critical Privacy Concern Arises When Ca Data Is Outsourced. Data From Motion Sensors May Reveal Users&Continuous Authentication (Ca) Approaches Are Attracting Attention Due To The Explosion Of Available Sensors From Iot Devices Such As Smartphones. However, A Critical Privacy Concern Arises When Ca Data Is Outsourced. Data From Motion Sensors May Reveal Users"
Private Issues. Despite The Need For Ca In Smartphones, No Previous Work Has Explored How To Tackle This Matter Leveraging Motion Sensors In A Privacy-Preserving Way. In This Work, A Mechanism Dubbed Smartcampp Is Proposed To Achieve Ca Based On Gyroscope And Accelerometer Data. Format-Preserving Encryption Techniques Are Applied To Privately Outsource Them. Our Results Show The Suitability Of The Proposed Scheme, Featuring Of Accuracy While Taking 5.12 Ms. Of Computation For Authenticating Each User. Interestingly, The Use Of Cryptography Does Not Lead To A Significant Impact As Compared To A Non-Privacy-Preserving Mechanism[+][-]