Research Student Profile

Home People Profile...

Mr Saud Nejr Alotaibi

Research Student

Brief biographical information

saud.alotaibi@plymouth.ac.uk

    

Taxonomy of Application-Based Behaviour Authentication for Mobile Security

With the rapid growth of mobile devices for using in our daily life, nearly 7 billion by end 2014, securing the sensitive data stored upon them makes authentication of paramount importance. After point-of-entry authentication, the user can perform almost all tasks without having to re-authenticate. Transparent and continuous authentication provides a basis for convenient and secure re-authentication of the user. Whilst research to date has explored a number of possible avenues, such as the development of biometric modalities that specifically relate to transparent operation and to wider system aspects, there is still a need to understand how well these approaches stand up against targeted forgery attacks and to develop intelligence into the decision-making process through appreciating the situational awareness.

The MPhil stage will focus on developing a current state of the art understanding of transparent authentication, specifically investigating its role within mobile devices. In order to understand the nature of the information available to such a system, an investigation will be undertaken in the nature of the applications on these devices. This will lead to the development of taxonomy of application-based behaviour in terms of sensitivity level and user behavioural information.

Mr Saud Nejr Alotaibi

Director of studies: Prof. Steven M Furnell
Other supervisors: Prof. Nathan L Clarke

Journal papers

A Novel Taxonomy for Mobile Applications Data
Alotaibi S, Furnell SM, Clarke NL
International Journal of Cyber-Security and Digital Forensics (IJCSDF), ISSN: 2305-0012, Vol. 5, No. 3, pp115-121, 2016
More details | External link available

A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception
Alotaibi S, Furnell SM, Clarke NL
International Journal for Information Security Research (IJISR), Volume 5, Issue 3, pp591-599, 2015
More details | External link available

2 Journal papers

Conference papers

Transparent Authentication Systems for Mobile Device Security: A Review
Alotaibi S, Furnell SM, Clarke NL
10th International Conference for Internet Technology and Secured Transactions (ICITST), 14-16 Dec, pp. 406-413, 2015
More details | External link available

1 Conference papers

3 publication(s) - all categories.