Future consumer mobile phone security: A case study using the data-centric security model
نویسنده
چکیده
In the interconnected world that we live in, traditional security barriers are broken down. Developments such as outsourcing, increased usage of mobile devices and wireless networks each cause new security problems. To address the new security threats, a number of solutions have been suggested, mostly aiming at securing data rather than whole systems or networks. However, these visions (such as proposed by the Jericho Forum [9] and IBM [4]) are mostly concerned with large (inter-) enterprise systems. Until now, it is unclear what data-centric security could mean for other systems and environments. One particular category of systems that has been neglected is that of consumer mobile phones. Currently, data security is usually limited to a PIN number on startup and the option to disable wireless connections. The lack of protection does not seem justified, as these devices have steadily increased in capabilities and capacity; they can connect wirelessly to the Internet and have a high risk of being lost or stolen [8]. This not only puts end users at risk, but also their contacts, as phones can contain privacy sensitive data of many others. For example, if birth dates and addresses are kept with the contact records, in many cases a thief will have enough information to impersonate a contact and steal his identity. Could consumer mobile phones benefit from data-centric security? How useful is data-centric security in this context? These are the core questions we will try to address here.
منابع مشابه
The Effects of Constant Touch on Consumer Behavior: The Case of Iranian Mobile Phone Users
The main objective of this paper is to argue how the mobile phones have transformed the Iranian lifestyle and how the arrival of mobiles has been a catalyst for revolting behavior, and has launched a new consumer behavior and has changed our relationships. The paper explains how the people's behavior has developed a whole new social code in Iran. It is argued that the social value of being able...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملPeople-centric sensing in assistive healthcare: Privacy challenges and directions
As the domains of pervasive computing and sensor networking are expanding, there is an ongoing trend towards assistive living and healthcare support environments that can effectively assimilate these technologies according to human needs. Most of the existing research in assistive healthcare follows a more passive approach and has focused on collecting and processing data using a static-topolog...
متن کاملSecurity in context-aware mobile business applications
The support of location computation on mobile devices (e.g. mobile phones, PDAs) has enabled the development of context-aware and especially locationaware applications (e.g. Restaurant Finder, Friend Finder) which are becoming the new trend for future software applications. However, fears regarding security and privacy are the biggest barriers against their success. Especially, mobile users are...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Sec. Techn. Report
دوره 13 شماره
صفحات -
تاریخ انتشار 2008