Research Article

Implementation of smart saver, logged-in device protector

Volume: 3 Number: 2 December 1, 2023
EN

Implementation of smart saver, logged-in device protector

Abstract

Unauthorized access by malicious user could be very dangerous to all information systems. As a technical solution to prevent this, IAM (Identity and Access Management) is available. Many systems trust users who passed the system’s authentication or log-in until log-out. However, IAM operates passively by traffic between devices and systems. Because IAM can’t see the user of the device, it considers all traffic from the device after log-in is generated by the log-in user. Therefore, a logged-in and unattended device could be a security vulnerability of the system because it can be used by a malicious user nearby. Currently, many systems entirely rely on individual users to protect their devices. However, this study suggests an idea of technical solution called smart saver to protect the logged-in devices more securely. The smart saver triggers screen saver immediately upon detection of absence or change of the logged-in user using camera sensor of the device. For this, smart saver extracts and uses user’s appearance features and tries not to violate the recent trend of strengthening identity information protection. And this study shows the feasibility of smart saver through experiments.

Keywords

Supporting Institution

Agency for Defense Development & Korean Governement

Project Number

911194202

References

  1. [1] Park, G., A Proposal to apply smart saver to prevent identity theft, 2022 Spring Conf. Korean Society for Internet Information, Apr. 2022
  2. [2] Collier, Z. A., Sarkis, J., The zero-trust supply chain: Managing supply chain risk in the absence of trust, International Journal of Production Research, Vol. 59, No. 11, 2021, pp. 3430-3445
  3. [3] Kerman, A., Borchert, O., Rose, S., Implementing a zero-trust architecture, Draft, National Cybersecurity Center of Excellence (NCCOE), NIST, Mar. 2020
  4. [4] Pol, V. J., Identity and access management tools, International Journal of Trend in Scientific Research and Development (IJTSRD), Vol. 3, Issue 4, May-Jun 2019, pp. 796-798
  5. [5] Burhop, D., Greenberg, M., Maxwell, J., Identity and Access Management, I AM Who I Say I AM (WHITE PAPER), Virginia’s Council on Technology Services Identity and Access Workgroup, Jun. 20, 2007
  6. [6] Mohammed, I. A., Identity Management Capability Powered by Artificial Intelligence to Transform the Way User Access Privileges Are Managed, Monitored and Controlled, 2021 International Journal of Creative Research Thoughts (IJCRT), Vol. 9, Issue 1, Jan. 2021
  7. [7] Kunza, M., Puchta, A., Groll, S., Fuchs, L., Pernul, G., Attribute Quality Management for Dynamic Identity and Access Management, Journal of Information Security and Applications, Nov. 2018
  8. [8] Zaeem, R. N., Barber, K. S., The effect of the GDPR on privacy policies: recent progress and future promise, ACM Transactions on Management Information Systems, Vol. 12, No. 1, Article 2. Dec. 2020

Details

Primary Language

English

Subjects

Computer Software

Journal Section

Research Article

Early Pub Date

July 30, 2023

Publication Date

December 1, 2023

Submission Date

February 22, 2023

Acceptance Date

April 18, 2023

Published in Issue

Year 2023 Volume: 3 Number: 2

Vancouver
1.Gyudong Park, Hocheol Jeon, Kyungshik Yi. Implementation of smart saver, logged-in device protector. Computers and Informatics [Internet]. 2023 Dec. 1;3(2):57-66. Available from: https://izlik.org/JA38DM44EC

Computers and Informatics is licensed under CC BY-NC 4.0