{"id":"https://openalex.org/W2899484869","doi":"https://doi.org/10.1587/transinf.2017icp0017","title":"A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices","display_name":"A Secure In-Depth File System Concealed by GPS-Based Mounting Authentication for Mobile Devices","publication_year":2018,"publication_date":"2018-10-31","ids":{"openalex":"https://openalex.org/W2899484869","doi":"https://doi.org/10.1587/transinf.2017icp0017","mag":"2899484869"},"language":"en","primary_location":{"id":"doi:10.1587/transinf.2017icp0017","is_oa":true,"landing_page_url":"http://doi.org/10.1587/transinf.2017icp0017","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E101.D/11/E101.D_2017ICP0017/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E101.D/11/E101.D_2017ICP0017/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101656959","display_name":"Yong Jin","orcid":"https://orcid.org/0000-0003-2967-5557"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Yong JIN","raw_affiliation_strings":["Tokyo Institute of Technology","of Technology, Tokyo, 152-8550 Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology","institution_ids":["https://openalex.org/I114531698"]},{"raw_affiliation_string":"of Technology, Tokyo, 152-8550 Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054448019","display_name":"Masahiko Tomoishi","orcid":"https://orcid.org/0000-0001-5636-7774"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masahiko TOMOISHI","raw_affiliation_strings":["Tokyo Institute of Technology","of Technology, Tokyo, 152-8550 Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology","institution_ids":["https://openalex.org/I114531698"]},{"raw_affiliation_string":"of Technology, Tokyo, 152-8550 Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102259109","display_name":"Satoshi Matsuura","orcid":null},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Satoshi MATSUURA","raw_affiliation_strings":["Tokyo Institute of Technology"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology","institution_ids":["https://openalex.org/I114531698"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086969205","display_name":"Yoshiaki Kitaguchi","orcid":"https://orcid.org/0000-0002-8387-4365"},"institutions":[{"id":"https://openalex.org/I114531698","display_name":"Tokyo Institute of Technology","ror":"https://ror.org/0112mx960","country_code":"JP","type":"education","lineage":["https://openalex.org/I114531698"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshiaki KITAGUCHI","raw_affiliation_strings":["Tokyo Institute of Technology","of Technology, Tokyo, 152-8550 Japan"],"affiliations":[{"raw_affiliation_string":"Tokyo Institute of Technology","institution_ids":["https://openalex.org/I114531698"]},{"raw_affiliation_string":"of Technology, Tokyo, 152-8550 Japan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101656959"],"corresponding_institution_ids":["https://openalex.org/I114531698"],"apc_list":null,"apc_paid":null,"fwci":0.3927,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.72222872,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"E101.D","issue":"11","first_page":"2612","last_page":"2621"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9124000072479248,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9124000072479248,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8374247550964355},{"id":"https://openalex.org/keywords/global-positioning-system","display_name":"Global Positioning System","score":0.67396080493927},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6126851439476013},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5463316440582275},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5414853096008301},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.35952049493789673},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2066146731376648},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17100003361701965}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8374247550964355},{"id":"https://openalex.org/C60229501","wikidata":"https://www.wikidata.org/wiki/Q18822","display_name":"Global Positioning System","level":2,"score":0.67396080493927},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6126851439476013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5463316440582275},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5414853096008301},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.35952049493789673},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2066146731376648},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17100003361701965}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1587/transinf.2017icp0017","is_oa":true,"landing_page_url":"http://doi.org/10.1587/transinf.2017icp0017","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E101.D/11/E101.D_2017ICP0017/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1587/transinf.2017icp0017","is_oa":true,"landing_page_url":"http://doi.org/10.1587/transinf.2017icp0017","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E101.D/11/E101.D_2017ICP0017/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEICE Transactions on Information and Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2899484869.pdf","grobid_xml":"https://content.openalex.org/works/W2899484869.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1503499126","https://openalex.org/W1961623891","https://openalex.org/W1977759267","https://openalex.org/W1978046546","https://openalex.org/W2050529356","https://openalex.org/W2098203865","https://openalex.org/W2189601660","https://openalex.org/W2291769357","https://openalex.org/W2513529237","https://openalex.org/W2515280630","https://openalex.org/W2539082945","https://openalex.org/W2754747649"],"related_works":["https://openalex.org/W3162200841","https://openalex.org/W2586280620","https://openalex.org/W2805505483","https://openalex.org/W253106158","https://openalex.org/W2384744344","https://openalex.org/W1799694159","https://openalex.org/W2393169196","https://openalex.org/W2366610330","https://openalex.org/W1550496571","https://openalex.org/W2912135041"],"abstract_inverted_index":{"Data":[0],"breach":[1,55,113,133,217],"and":[2,16,25,38,53,64,118,157,175,178,221],"data":[3,37,52,54,73,98,112,132,143,216],"destruction":[4],"attack":[5],"have":[6,67],"become":[7],"the":[8,13,21,30,59,69,79,84,87,92,108,138,149,158,181,201,213],"critical":[9],"security":[10],"threats":[11,32],"for":[12,89,207,218],"ICT":[14],"(Information":[15],"Communication":[17],"Technology)":[18],"infrastructure.":[19],"Both":[20],"Internet":[22,62,85,93],"service":[23],"providers":[24],"users":[26],"are":[27],"suffering":[28],"from":[29],"cyber":[31],"especially":[33],"those":[34],"to":[35,130],"confidential":[36,51,72],"private":[39],"information.":[40],"The":[41,61,195],"requirements":[42],"of":[43,71,83,91,111,151,197,215,224],"human":[44],"social":[45],"activities":[46],"make":[47,95],"people":[48,96],"move":[49],"carrying":[50],"always":[56],"happens":[57],"during":[58],"transportation.":[60],"connectivity":[63,94],"cryptographic":[65],"technology":[66],"made":[68],"usage":[70],"much":[74],"secure.":[75],"However,":[76],"even":[77],"with":[78,99,153],"high":[80],"deployment":[81],"rate":[82],"infrastructure,":[86],"concerns":[88],"lack":[90],"carry":[97],"their":[100],"mobile":[101,116,135,219],"devices.":[102,136],"In":[103,137],"this":[104,198],"paper,":[105],"we":[106,188],"describe":[107],"main":[109],"patterns":[110],"occur":[114],"on":[115,134,148,165,192],"devices":[117,220],"propose":[119],"a":[120,170,208,222],"secure":[121],"in-depth":[122,140,182],"file":[123,141,183,209],"system":[124,172,184,210],"concealed":[125],"by":[126,190],"GPS-based":[127,204],"mounting":[128,159,205],"authentication":[129,155,206],"mitigate":[131],"proposed":[139],"system,":[142],"can":[144,211],"be":[145,162],"stored":[146],"based":[147],"level":[150],"credential":[152],"corresponding":[154],"policy":[156],"operation":[160],"will":[161],"only":[163],"successful":[164],"designated":[166],"locations.":[167,194],"We":[168],"implemented":[169],"prototype":[171,225],"using":[173],"Veracrypt":[174],"Perl":[176],"language":[177],"confirmed":[179],"that":[180,203],"worked":[185],"exactly":[186],"as":[187],"expected":[189],"evaluations":[191],"two":[193],"contribution":[196],"paper":[199],"includes":[200],"clarification":[202],"reduce":[212],"risk":[214],"realization":[223],"system.":[226]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
