Research Article
BibTex RIS Cite

Implementation of smart saver, logged-in device protector

Year 2023, Volume: 3 Issue: 2, 57 - 66, 01.12.2023

Abstract

Unauthorized access by malicious user could be very dangerous to all information systems. As a technical solution to prevent this, IAM (Identity and Access Management) is available. Many systems trust users who passed the system’s authentication or log-in until log-out. However, IAM operates passively by traffic between devices and systems. Because IAM can’t see the user of the device, it considers all traffic from the device after log-in is generated by the log-in user. Therefore, a logged-in and unattended device could be a security vulnerability of the system because it can be used by a malicious user nearby. Currently, many systems entirely rely on individual users to protect their devices. However, this study suggests an idea of technical solution called smart saver to protect the logged-in devices more securely. The smart saver triggers screen saver immediately upon detection of absence or change of the logged-in user using camera sensor of the device. For this, smart saver extracts and uses user’s appearance features and tries not to violate the recent trend of strengthening identity information protection. And this study shows the feasibility of smart saver through experiments.

Supporting Institution

Agency for Defense Development & Korean Governement

Project Number

911194202

References

  • [1] Park, G., A Proposal to apply smart saver to prevent identity theft, 2022 Spring Conf. Korean Society for Internet Information, Apr. 2022
  • [2] Collier, Z. A., Sarkis, J., The zero-trust supply chain: Managing supply chain risk in the absence of trust, International Journal of Production Research, Vol. 59, No. 11, 2021, pp. 3430-3445
  • [3] Kerman, A., Borchert, O., Rose, S., Implementing a zero-trust architecture, Draft, National Cybersecurity Center of Excellence (NCCOE), NIST, Mar. 2020
  • [4] Pol, V. J., Identity and access management tools, International Journal of Trend in Scientific Research and Development (IJTSRD), Vol. 3, Issue 4, May-Jun 2019, pp. 796-798
  • [5] Burhop, D., Greenberg, M., Maxwell, J., Identity and Access Management, I AM Who I Say I AM (WHITE PAPER), Virginia’s Council on Technology Services Identity and Access Workgroup, Jun. 20, 2007
  • [6] Mohammed, I. A., Identity Management Capability Powered by Artificial Intelligence to Transform the Way User Access Privileges Are Managed, Monitored and Controlled, 2021 International Journal of Creative Research Thoughts (IJCRT), Vol. 9, Issue 1, Jan. 2021
  • [7] Kunza, M., Puchta, A., Groll, S., Fuchs, L., Pernul, G., Attribute Quality Management for Dynamic Identity and Access Management, Journal of Information Security and Applications, Nov. 2018
  • [8] Zaeem, R. N., Barber, K. S., The effect of the GDPR on privacy policies: recent progress and future promise, ACM Transactions on Management Information Systems, Vol. 12, No. 1, Article 2. Dec. 2020
  • [9] Haque, A. B., Islam, A. K. M. N., Hyrynsalmi, S., Naqvi, B., Smolander, K., GDPR compliant blockchains-A systematic literature review, IEEE Access, Vol. 9, Apr. 2021
  • [10] Li, H., Yu, L., He, W., The impact of GDPR on global technology development, Journal of Global Information Technology Management, Vol. 22, No. 1, 2019.
  • [11] Park, S., Yoon, S., Jung, E., Yang, J., Method and apparatus for controlling authentication state of electronic device, US Patent, No. US 2015/0288681 A1, Oct. 8, 2015.
Year 2023, Volume: 3 Issue: 2, 57 - 66, 01.12.2023

Abstract

Project Number

911194202

References

  • [1] Park, G., A Proposal to apply smart saver to prevent identity theft, 2022 Spring Conf. Korean Society for Internet Information, Apr. 2022
  • [2] Collier, Z. A., Sarkis, J., The zero-trust supply chain: Managing supply chain risk in the absence of trust, International Journal of Production Research, Vol. 59, No. 11, 2021, pp. 3430-3445
  • [3] Kerman, A., Borchert, O., Rose, S., Implementing a zero-trust architecture, Draft, National Cybersecurity Center of Excellence (NCCOE), NIST, Mar. 2020
  • [4] Pol, V. J., Identity and access management tools, International Journal of Trend in Scientific Research and Development (IJTSRD), Vol. 3, Issue 4, May-Jun 2019, pp. 796-798
  • [5] Burhop, D., Greenberg, M., Maxwell, J., Identity and Access Management, I AM Who I Say I AM (WHITE PAPER), Virginia’s Council on Technology Services Identity and Access Workgroup, Jun. 20, 2007
  • [6] Mohammed, I. A., Identity Management Capability Powered by Artificial Intelligence to Transform the Way User Access Privileges Are Managed, Monitored and Controlled, 2021 International Journal of Creative Research Thoughts (IJCRT), Vol. 9, Issue 1, Jan. 2021
  • [7] Kunza, M., Puchta, A., Groll, S., Fuchs, L., Pernul, G., Attribute Quality Management for Dynamic Identity and Access Management, Journal of Information Security and Applications, Nov. 2018
  • [8] Zaeem, R. N., Barber, K. S., The effect of the GDPR on privacy policies: recent progress and future promise, ACM Transactions on Management Information Systems, Vol. 12, No. 1, Article 2. Dec. 2020
  • [9] Haque, A. B., Islam, A. K. M. N., Hyrynsalmi, S., Naqvi, B., Smolander, K., GDPR compliant blockchains-A systematic literature review, IEEE Access, Vol. 9, Apr. 2021
  • [10] Li, H., Yu, L., He, W., The impact of GDPR on global technology development, Journal of Global Information Technology Management, Vol. 22, No. 1, 2019.
  • [11] Park, S., Yoon, S., Jung, E., Yang, J., Method and apparatus for controlling authentication state of electronic device, US Patent, No. US 2015/0288681 A1, Oct. 8, 2015.
There are 11 citations in total.

Details

Primary Language English
Subjects Computer Software
Journal Section Research Articles
Authors

Gyudong Park 0000-0001-7484-5426

Hocheol Jeon This is me 0000-0002-1420-5846

Kyungshik Yi This is me 0000-0002-4162-2936

Project Number 911194202
Early Pub Date July 30, 2023
Publication Date December 1, 2023
Acceptance Date April 18, 2023
Published in Issue Year 2023 Volume: 3 Issue: 2

Cite

Vancouver Park G, Jeon H, Yi K. Implementation of smart saver, logged-in device protector. Computers and Informatics. 2023;3(2):57-66.