TY - JOUR
T1 - Decoupling data-at-rest encryption and smartphone locking with wearable devices
AU - Muslukhov, Ildar
AU - Sun, San Tsai
AU - Wijesekera, Primal
AU - Boshmaf, Yazan
AU - Beznosov, Konstantin
N1 - Publisher Copyright:
© 2016 Elsevier B.V.
PY - 2016/10/1
Y1 - 2016/10/1
N2 - Smartphones store sensitive and confidential data, e.g., business related documents or emails. If a smartphone is stolen, such data are at risk of disclosure. To mitigate this risk, modern smartphones allow users to enable data encryption, which uses a locking password to protect the data encryption key. Unfortunately, users either do not lock their devices at all, due to usability issues, or use weak and easy to guess 4-digit PINs. This makes the current approach of protecting confidential data-at-rest ineffective against password guessing attackers. To address this problem we design, implement and evaluate the Sidekick system — a system that uses a wearable device to decouple data encryption and smartphone locking. Evaluation of the Sidekick system revealed that the proposal can run on an 8-bit System-on-Chip, uses only 4 Kb/20 Kb of RAM/ROM, allows data encryption key fetching in less than two seconds, while lasting for more than a year on a single coin-cell battery.
AB - Smartphones store sensitive and confidential data, e.g., business related documents or emails. If a smartphone is stolen, such data are at risk of disclosure. To mitigate this risk, modern smartphones allow users to enable data encryption, which uses a locking password to protect the data encryption key. Unfortunately, users either do not lock their devices at all, due to usability issues, or use weak and easy to guess 4-digit PINs. This makes the current approach of protecting confidential data-at-rest ineffective against password guessing attackers. To address this problem we design, implement and evaluate the Sidekick system — a system that uses a wearable device to decouple data encryption and smartphone locking. Evaluation of the Sidekick system revealed that the proposal can run on an 8-bit System-on-Chip, uses only 4 Kb/20 Kb of RAM/ROM, allows data encryption key fetching in less than two seconds, while lasting for more than a year on a single coin-cell battery.
KW - Data-at-rest encryption
KW - Encryption keys management
KW - Smartphone locking
KW - Smartphone loss and theft
KW - Wearable devices
UR - https://www.scopus.com/pages/publications/84992724010
U2 - 10.1016/j.pmcj.2016.06.016
DO - 10.1016/j.pmcj.2016.06.016
M3 - Article
AN - SCOPUS:84992724010
SN - 1574-1192
VL - 32
SP - 26
EP - 34
JO - Pervasive and Mobile Computing
JF - Pervasive and Mobile Computing
ER -