Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Call For Paper : Vol. 9, Issue 6 , 2022
Security Constraint System for Android Devices

Author : P Greeshma Chowdary 1 B Srinivas Goud 2 Prasad B 3

Date of Publication :7th March 2016

Abstract: The applications that we use in our mobile devices often access sensitive data and resources. But when the users data has been misused due to some malicious applications which may lead to leakage of sensitive data and also reflect in privacy. An example is a malicious application records users banking details. The problem starts when the user have installed the application by granting all the privileges on which the user have no control on operating the features. To avoid this problem we propose a context based access control system by which a user can activate and deactivate some of the applications that are already present in the users mobile based on the context that is provided. It can also perform its action in a particular location by using GPS, Wi-Fi etc.. based on the context that is provided by the user. We have preformed many experiments for accessing the data in a particular location based on context.

Reference :

    1. A. Kushwaha and V. Kushwaha, ―Location based services using android mobile operating system,‖ Int. J. Adv. Eng. Technol., vol. 1, no. 1, pp. 14–20, 2011.
    2. D. Kulkarni, ―Context-aware role-based access control in pervasive computing systems,‖ in Proc. 13th ACM Symp. Access Control Models Technol., 2008, pp. 113–122.
    3. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, ―Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones,‖ in Proc. 9th USENIX Conf. Oper. Syst. Des. Implementation, 2010, pp. 1–6
    4. J. Leyden, (Apr. 2013). Your phone may not be spying on you now—but it soon will be. [Online].Available:http://www.theregister.co.uk/20 13/04/24/kaspersky_mobile_malware_infose
    5. R. Templeman, Z. Rahman, D. J. Crandall, and A. Kapadia, ―Placeraider: Virtual theft in physical spaces with smartphones,‖ in Proc. 20th Annual Netw. Distrib. Syst. Security Symp. (NDSS), Feb. 2013
    6. Erlingsson, F. Schneider, ―IRM enforcement of java stack inspection,‖ in Proc. IEEE Symp. Secur. Privacy, 2000, pp. 246–255
    7. D. Evans and A. Twyman, ―Flexible policydirected code safety,‖ in Proc. IEEE Symp. Secur. Privacy, 1999, pp. 32–45.

Recent Article