Mobile Data Protection

Abstract
Smartphones are extremely popular and convenient these days. People carry them anytime, anywhere and use them to perform daily activities like making phone calls, checking emails, and browsing the mobile Web. However, they are easily lost or stolen because of their small sizes and high mobility. Personal data such as addresses and messages stored in the devices are revealed when the devices are lost. Various methods have been used or proposed for smartphone data protection. The methods can be classified into five categories: (i) password/keyword identification, (ii) human intervention, (iii) biometric-based identification, (iv) anomaly/behavior-based identification, and (v) other ad hoc methods.

Keywords
Handheld/mobile/smartphone computing, human behavior recognition, mobile data management, pattern identification

References
  1. International Conference on Mobile Data Management