2018
DOI: 10.1155/2018/5107024
|View full text |Cite
|
Sign up to set email alerts
|

Smartwatch-Based Legitimate User Identification for Cloud-Based Secure Services

Abstract: Smartphones are ubiquitously integrated into our home and work environment and users frequently use them as the portal to cloud-based secure services. Since smartphones can easily be stolen or coopted, the advent of smartwatches provides an intriguing platform legitimate user identification for applications like online banking and many other cloud-based services. However, to access security-critical online services, it is highly desirable to accurately identifying the legitimate user accessing such services an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…ARIMA model is a widely used timeseries forecasting model introduced by Box and Jenkins in 1970 [12]. ARIMA model is a general linear stochastic model which is the combination of autoregressive and movingaverage models [13][14][15]. An autoregressive model uses a linear combination of past values to predict the variable of interest.…”
Section: Arima Modelmentioning
confidence: 99%
“…ARIMA model is a widely used timeseries forecasting model introduced by Box and Jenkins in 1970 [12]. ARIMA model is a general linear stochastic model which is the combination of autoregressive and movingaverage models [13][14][15]. An autoregressive model uses a linear combination of past values to predict the variable of interest.…”
Section: Arima Modelmentioning
confidence: 99%
“…The integration of cloud computing and IoT has many security issues and challenges that are discussed in the IoT and cloud computing survey ( Stergiou et al, 2018 ). Furthermore, various researchers working on the security and privacy of database-as-a-service, cloud-based secure services, and blockchain, along with the legitimate user recognition, challenges, and performance analysis ( Khan et al, 2020 ; Khan et al, 2019 ; Ahmad et al, 2018 ).…”
Section: Introductionmentioning
confidence: 99%
“…Thus, it can provide a variety of services. These services include temperature and pulse measurements and the number of calories consumed when performing a physical activity, such as walking, running, cycling and so forth [2].…”
Section: Introductionmentioning
confidence: 99%