SlideShare une entreprise Scribd logo
1  sur  6
CONTEXT-BASED ACCESS CONTROL SYSTEMS FOR 
MOBILE DEVICES 
ABSTRACT: 
Mobile Android applications often have access to sensitive data and resources on 
the user device. Misuse of this data by malicious applications may result in privacy 
breaches and sensitive data leakage. An example would be a malicious application 
surreptitiously recording a confidential business conversation. The problem arises 
from the fact that Android users do not have control over the application 
capabilities once the applications have been granted the requested privileges upon 
installation. In many cases, however, whether an application may get a privilege 
depends on the specific user context and thus we need a context-based access 
control mechanism by which privileges can be dynamically granted or revoked to 
applications based on the specific context of the user. In this paper we propose 
such an access control mechanism. Our implementation of context differentiates 
between closely located sub-areas within the same location. We have modified the 
Android operating system so that context-based access control restrictions can be 
specified and enforced. We have performed several experiments to assess the 
efficiency of our access control mechanism and the accuracy of context detection.
EXISTING SYSTEM: 
Security for mobile operating systems focuses on restricting applications from 
accessing sensitive data and resources, but mostly lacks efficient techniques for 
enforcing those restrictions according to fine-grained contexts that differentiate 
between closely located subareas. Moreover, most of this work has focused on 
developing policy systems that do not restrict privileges per application and are 
only effective system-wide. So User disable all applications from using the camera 
and any device resources and privileges that employers restrict while at work, 
while the user device can retain all its original privileges outside the work area. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Do not cover all the possible ways in which applications can access user data 
and device resources. 
 The User leakage of Their privacy.
 Existing location-based policy systems are not accurate enough to 
differentiate between nearby locations without extra hardware or location 
devices. 
PROPOSED SYSTEM: 
In this paper, we propose a context-based access control (CBAC) mechanism for 
Android systems that allows smartphone users to set configuration policies over 
their applications’ usage of device resources and services at different contexts. 
Through the CBAC mechanism, users can, for example, set restricted privileges for 
device applications when using the device at work, and device applications may re-gain 
their original privileges when the device is used at home. This change in 
device privileges is automatically applied as soon as the user device matches a pre-defined 
context of a user-defined policy. The user can also specify a default set of 
policies to be applied when the user is located in a non-previously defined location. 
Configured policy restrictions are defined according to the accessible device 
resources, services, and permissions that are granted to applications at installation 
time. Such policies define which services are offered by the device and
limit the device and user information accessibility. Policy restrictions are linked to 
context and are configured by the device user. We define context according to 
location and time. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Applications should not be able to fake the location or time of the device. 
 Can develop securer and more acceptable applications for end users.
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
 MOBILE : ANDROID
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : Java 1.7 
 Tool Kit : Android 2.3 ABOVE 
 IDE : Eclipse 
REFERENCE: 
Bilal Shebaro, Oyindamola Oluwatimi, Elisa Bertino, “Context-based Access 
Control Systems for Mobile Devices”, IEEE Transactions on Dependable and 
Secure Computing, 2014.

Contenu connexe

Tendances

Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityUnderstandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityKamal Spring
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsJPINFOTECH JAYAPRAKASH
 
Sunil A 3+ years Resume
Sunil A 3+ years ResumeSunil A 3+ years Resume
Sunil A 3+ years ResumeSunil A
 
Uses , misuses and risk of software
Uses , misuses and risk of softwareUses , misuses and risk of software
Uses , misuses and risk of softwareAbdulJabbar459
 
Uses,mis uses and risk of software
Uses,mis uses and risk of softwareUses,mis uses and risk of software
Uses,mis uses and risk of softwareAHSSAN AKHTAR
 
Web Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and AuthorizationWeb Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and AuthorizationAndiNurkholis1
 
Generating Risk Summary Risk Scores For Mobile Applications
Generating Risk Summary Risk Scores For Mobile ApplicationsGenerating Risk Summary Risk Scores For Mobile Applications
Generating Risk Summary Risk Scores For Mobile ApplicationsPapitha Velumani
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07blusmurfydot1
 
Secure Code Warrior - Least privilege
Secure Code Warrior - Least privilegeSecure Code Warrior - Least privilege
Secure Code Warrior - Least privilegeSecure Code Warrior
 
Face attendnace system AmpleTrails eSSL
Face attendnace system AmpleTrails eSSL Face attendnace system AmpleTrails eSSL
Face attendnace system AmpleTrails eSSL Mayank Jain
 
Enhancing user privacy by permission removal in android phones
Enhancing user privacy by permission removal in android phonesEnhancing user privacy by permission removal in android phones
Enhancing user privacy by permission removal in android phonesRumana Firdose
 
Attribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesAttribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesIJCSIS Research Publications
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face RecognitionPrime Infoserv
 
Secure Code Warrior - Trust no input
Secure Code Warrior - Trust no inputSecure Code Warrior - Trust no input
Secure Code Warrior - Trust no inputSecure Code Warrior
 
Covert compositional analysis of android inter app permission leakage
Covert compositional analysis of android inter app permission leakageCovert compositional analysis of android inter app permission leakage
Covert compositional analysis of android inter app permission leakageLeMeniz Infotech
 
Who is the privileged user
Who is the privileged userWho is the privileged user
Who is the privileged userNis
 

Tendances (20)

Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityUnderstandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing security
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applications
 
Sunil A 3+ years Resume
Sunil A 3+ years ResumeSunil A 3+ years Resume
Sunil A 3+ years Resume
 
Uses , misuses and risk of software
Uses , misuses and risk of softwareUses , misuses and risk of software
Uses , misuses and risk of software
 
Uses,mis uses and risk of software
Uses,mis uses and risk of softwareUses,mis uses and risk of software
Uses,mis uses and risk of software
 
Secopy project A
Secopy project ASecopy project A
Secopy project A
 
Web Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and AuthorizationWeb Programming - 12 Authentication and Authorization
Web Programming - 12 Authentication and Authorization
 
Generating Risk Summary Risk Scores For Mobile Applications
Generating Risk Summary Risk Scores For Mobile ApplicationsGenerating Risk Summary Risk Scores For Mobile Applications
Generating Risk Summary Risk Scores For Mobile Applications
 
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
 
Secure Code Warrior - Least privilege
Secure Code Warrior - Least privilegeSecure Code Warrior - Least privilege
Secure Code Warrior - Least privilege
 
Face attendnace system AmpleTrails eSSL
Face attendnace system AmpleTrails eSSL Face attendnace system AmpleTrails eSSL
Face attendnace system AmpleTrails eSSL
 
Enhancing user privacy by permission removal in android phones
Enhancing user privacy by permission removal in android phonesEnhancing user privacy by permission removal in android phones
Enhancing user privacy by permission removal in android phones
 
Attribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesAttribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android Smartphones
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Secure Code Warrior - Trust no input
Secure Code Warrior - Trust no inputSecure Code Warrior - Trust no input
Secure Code Warrior - Trust no input
 
Security Software
Security SoftwareSecurity Software
Security Software
 
Manikavasagam Profile
Manikavasagam ProfileManikavasagam Profile
Manikavasagam Profile
 
Covert compositional analysis of android inter app permission leakage
Covert compositional analysis of android inter app permission leakageCovert compositional analysis of android inter app permission leakage
Covert compositional analysis of android inter app permission leakage
 
OWASP Top 10 Overview
OWASP Top 10 OverviewOWASP Top 10 Overview
OWASP Top 10 Overview
 
Who is the privileged user
Who is the privileged userWho is the privileged user
Who is the privileged user
 

En vedette

Is War A Booming Industry?
Is War A Booming Industry?Is War A Booming Industry?
Is War A Booming Industry?Maps of World
 
Delay based network utility maximization
Delay based network utility maximizationDelay based network utility maximization
Delay based network utility maximizationJPINFOTECH JAYAPRAKASH
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksJPINFOTECH JAYAPRAKASH
 
An efficient and robust addressing protocol for node auto configuration in ad...
An efficient and robust addressing protocol for node auto configuration in ad...An efficient and robust addressing protocol for node auto configuration in ad...
An efficient and robust addressing protocol for node auto configuration in ad...JPINFOTECH JAYAPRAKASH
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringJPINFOTECH JAYAPRAKASH
 
Promo LISTA 2013 www.utensileria-modenese.com
Promo LISTA 2013 www.utensileria-modenese.comPromo LISTA 2013 www.utensileria-modenese.com
Promo LISTA 2013 www.utensileria-modenese.comUtensileria Modenese srl
 
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...JPINFOTECH JAYAPRAKASH
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codesJPINFOTECH JAYAPRAKASH
 
CHAPTER 1: INTRODUCTION
CHAPTER 1: INTRODUCTIONCHAPTER 1: INTRODUCTION
CHAPTER 1: INTRODUCTIONPHAISTOS DISC
 
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...JPINFOTECH JAYAPRAKASH
 
Synchronous and Social - Evolve Conference
Synchronous and Social - Evolve ConferenceSynchronous and Social - Evolve Conference
Synchronous and Social - Evolve ConferenceYazino
 
FIRSTFare 2012 advanced lab view topics
FIRSTFare 2012 advanced lab view topicsFIRSTFare 2012 advanced lab view topics
FIRSTFare 2012 advanced lab view topicsOregon FIRST Robotics
 
Mc Presentatie Ice Covers Vitility
Mc Presentatie Ice Covers   VitilityMc Presentatie Ice Covers   Vitility
Mc Presentatie Ice Covers VitilityRkivits
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesJPINFOTECH JAYAPRAKASH
 
A gossip protocol for dynamic resource management in large cloud environments
A gossip protocol for dynamic resource management in large cloud environmentsA gossip protocol for dynamic resource management in large cloud environments
A gossip protocol for dynamic resource management in large cloud environmentsJPINFOTECH JAYAPRAKASH
 
Matthews --Mobile Expectations
Matthews --Mobile ExpectationsMatthews --Mobile Expectations
Matthews --Mobile ExpectationsBOLO Conference
 

En vedette (20)

Is War A Booming Industry?
Is War A Booming Industry?Is War A Booming Industry?
Is War A Booming Industry?
 
CDU Zoom lame a nastro e refrigerazione
CDU Zoom lame a nastro e refrigerazioneCDU Zoom lame a nastro e refrigerazione
CDU Zoom lame a nastro e refrigerazione
 
Delay based network utility maximization
Delay based network utility maximizationDelay based network utility maximization
Delay based network utility maximization
 
Discovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networksDiscovery and verification of neighbor positions in mobile ad hoc networks
Discovery and verification of neighbor positions in mobile ad hoc networks
 
An efficient and robust addressing protocol for node auto configuration in ad...
An efficient and robust addressing protocol for node auto configuration in ad...An efficient and robust addressing protocol for node auto configuration in ad...
An efficient and robust addressing protocol for node auto configuration in ad...
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
 
Promo LISTA 2013 www.utensileria-modenese.com
Promo LISTA 2013 www.utensileria-modenese.comPromo LISTA 2013 www.utensileria-modenese.com
Promo LISTA 2013 www.utensileria-modenese.com
 
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
 
2012 or webinar (final)
2012 or webinar (final)2012 or webinar (final)
2012 or webinar (final)
 
CHAPTER 1: INTRODUCTION
CHAPTER 1: INTRODUCTIONCHAPTER 1: INTRODUCTION
CHAPTER 1: INTRODUCTION
 
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
 
Promo Fokus
Promo FokusPromo Fokus
Promo Fokus
 
Synchronous and Social - Evolve Conference
Synchronous and Social - Evolve ConferenceSynchronous and Social - Evolve Conference
Synchronous and Social - Evolve Conference
 
FIRSTFare 2012 advanced lab view topics
FIRSTFare 2012 advanced lab view topicsFIRSTFare 2012 advanced lab view topics
FIRSTFare 2012 advanced lab view topics
 
Mc Presentatie Ice Covers Vitility
Mc Presentatie Ice Covers   VitilityMc Presentatie Ice Covers   Vitility
Mc Presentatie Ice Covers Vitility
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
 
A gossip protocol for dynamic resource management in large cloud environments
A gossip protocol for dynamic resource management in large cloud environmentsA gossip protocol for dynamic resource management in large cloud environments
A gossip protocol for dynamic resource management in large cloud environments
 
Matthews --Mobile Expectations
Matthews --Mobile ExpectationsMatthews --Mobile Expectations
Matthews --Mobile Expectations
 
Presentation iyc
Presentation iycPresentation iyc
Presentation iyc
 

Similaire à Context based access control systems for mobile devices

2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...IEEEFINALYEARSTUDENTSPROJECTS
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEEMEMTECHSTUDENTPROJECTS
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applicationschennaijp
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesJPINFOTECH JAYAPRAKASH
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphoneschennaijp
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorIRJET Journal
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_usersCristian Garcia G.
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesLeMeniz Infotech
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Querieschennaijp
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...IJECEIAES
 
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...chennaijp
 
A Framework for Providing Selective Permissions to Android Applications
A Framework for Providing Selective Permissions to Android ApplicationsA Framework for Providing Selective Permissions to Android Applications
A Framework for Providing Selective Permissions to Android ApplicationsIOSR Journals
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsShekhar Vimalendu
 

Similaire à Context based access control systems for mobile devices (20)

2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
2014 IEEE DOTNET MOBILE COMPUTING PROJECT Preserving location-privacy-in-geos...
 
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
IEEE 2014 DOTNET MOBILE COMPUTING PROJECTS Preserving location-privacy-in-geo...
 
Download
DownloadDownload
Download
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
 
Android Security
Android SecurityAndroid Security
Android Security
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
 
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414  MOSES: Supporting and Enforcing Security Profiles on SmartphonesJPA1414  MOSES: Supporting and Enforcing Security Profiles on Smartphones
JPA1414 MOSES: Supporting and Enforcing Security Profiles on Smartphones
 
IJET-V3I1P9
IJET-V3I1P9IJET-V3I1P9
IJET-V3I1P9
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family Locator
 
Datasheet over privileged_users
Datasheet over privileged_usersDatasheet over privileged_users
Datasheet over privileged_users
 
Wear fit
Wear fitWear fit
Wear fit
 
Spe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devicesSpe security and privacy enhancement framework for mobile devices
Spe security and privacy enhancement framework for mobile devices
 
Android project-APP ENFORCEMENT LOCK
Android project-APP ENFORCEMENT LOCKAndroid project-APP ENFORCEMENT LOCK
Android project-APP ENFORCEMENT LOCK
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...Securing multi-tenancy systems through multi DB instances and multiple databa...
Securing multi-tenancy systems through multi DB instances and multiple databa...
 
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...JPJ1437  Exploiting Service Similarity for Privacy in Location-Based Search Q...
JPJ1437 Exploiting Service Similarity for Privacy in Location-Based Search Q...
 
A Framework for Providing Selective Permissions to Android Applications
A Framework for Providing Selective Permissions to Android ApplicationsA Framework for Providing Selective Permissions to Android Applications
A Framework for Providing Selective Permissions to Android Applications
 
Collaborative policy administration
Collaborative policy administrationCollaborative policy administration
Collaborative policy administration
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
 

Context based access control systems for mobile devices

  • 1. CONTEXT-BASED ACCESS CONTROL SYSTEMS FOR MOBILE DEVICES ABSTRACT: Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by malicious applications may result in privacy breaches and sensitive data leakage. An example would be a malicious application surreptitiously recording a confidential business conversation. The problem arises from the fact that Android users do not have control over the application capabilities once the applications have been granted the requested privileges upon installation. In many cases, however, whether an application may get a privilege depends on the specific user context and thus we need a context-based access control mechanism by which privileges can be dynamically granted or revoked to applications based on the specific context of the user. In this paper we propose such an access control mechanism. Our implementation of context differentiates between closely located sub-areas within the same location. We have modified the Android operating system so that context-based access control restrictions can be specified and enforced. We have performed several experiments to assess the efficiency of our access control mechanism and the accuracy of context detection.
  • 2. EXISTING SYSTEM: Security for mobile operating systems focuses on restricting applications from accessing sensitive data and resources, but mostly lacks efficient techniques for enforcing those restrictions according to fine-grained contexts that differentiate between closely located subareas. Moreover, most of this work has focused on developing policy systems that do not restrict privileges per application and are only effective system-wide. So User disable all applications from using the camera and any device resources and privileges that employers restrict while at work, while the user device can retain all its original privileges outside the work area. DISADVANTAGES OF EXISTING SYSTEM:  Do not cover all the possible ways in which applications can access user data and device resources.  The User leakage of Their privacy.
  • 3.  Existing location-based policy systems are not accurate enough to differentiate between nearby locations without extra hardware or location devices. PROPOSED SYSTEM: In this paper, we propose a context-based access control (CBAC) mechanism for Android systems that allows smartphone users to set configuration policies over their applications’ usage of device resources and services at different contexts. Through the CBAC mechanism, users can, for example, set restricted privileges for device applications when using the device at work, and device applications may re-gain their original privileges when the device is used at home. This change in device privileges is automatically applied as soon as the user device matches a pre-defined context of a user-defined policy. The user can also specify a default set of policies to be applied when the user is located in a non-previously defined location. Configured policy restrictions are defined according to the accessible device resources, services, and permissions that are granted to applications at installation time. Such policies define which services are offered by the device and
  • 4. limit the device and user information accessibility. Policy restrictions are linked to context and are configured by the device user. We define context according to location and time. ADVANTAGES OF PROPOSED SYSTEM:  Applications should not be able to fake the location or time of the device.  Can develop securer and more acceptable applications for end users.
  • 5. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.  MOBILE : ANDROID
  • 6. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE  IDE : Eclipse REFERENCE: Bilal Shebaro, Oyindamola Oluwatimi, Elisa Bertino, “Context-based Access Control Systems for Mobile Devices”, IEEE Transactions on Dependable and Secure Computing, 2014.