SlideShare a Scribd company logo
CONTEXT-BASED ACCESS CONTROL SYSTEMS FOR 
MOBILE DEVICES 
ABSTRACT: 
Mobile Android applications often have access to sensitive data and resources on 
the user device. Misuse of this data by malicious applications may result in privacy 
breaches and sensitive data leakage. An example would be a malicious application 
surreptitiously recording a confidential business conversation. The problem arises 
from the fact that Android users do not have control over the application 
capabilities once the applications have been granted the requested privileges upon 
installation. In many cases, however, whether an application may get a privilege 
depends on the specific user context and thus we need a context-based access 
control mechanism by which privileges can be dynamically granted or revoked to 
applications based on the specific context of the user. In this paper we propose 
such an access control mechanism. Our implementation of context differentiates 
between closely located sub-areas within the same location. We have modified the 
Android operating system so that context-based access control restrictions can be 
specified and enforced. We have performed several experiments to assess the 
efficiency of our access control mechanism and the accuracy of context detection.
EXISTING SYSTEM: 
Security for mobile operating systems focuses on restricting applications from 
accessing sensitive data and resources, but mostly lacks efficient techniques for 
enforcing those restrictions according to fine-grained contexts that differentiate 
between closely located subareas. Moreover, most of this work has focused on 
developing policy systems that do not restrict privileges per application and are 
only effective system-wide. So User disable all applications from using the camera 
and any device resources and privileges that employers restrict while at work, 
while the user device can retain all its original privileges outside the work area. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Do not cover all the possible ways in which applications can access user data 
and device resources. 
 The User leakage of Their privacy.
 Existing location-based policy systems are not accurate enough to 
differentiate between nearby locations without extra hardware or location 
devices. 
PROPOSED SYSTEM: 
In this paper, we propose a context-based access control (CBAC) mechanism for 
Android systems that allows smartphone users to set configuration policies over 
their applications’ usage of device resources and services at different contexts. 
Through the CBAC mechanism, users can, for example, set restricted privileges for 
device applications when using the device at work, and device applications may re-gain 
their original privileges when the device is used at home. This change in 
device privileges is automatically applied as soon as the user device matches a pre-defined 
context of a user-defined policy. The user can also specify a default set of 
policies to be applied when the user is located in a non-previously defined location. 
Configured policy restrictions are defined according to the accessible device 
resources, services, and permissions that are granted to applications at installation 
time. Such policies define which services are offered by the device and
limit the device and user information accessibility. Policy restrictions are linked to 
context and are configured by the device user. We define context according to 
location and time. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Applications should not be able to fake the location or time of the device. 
 Can develop securer and more acceptable applications for end users.
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
 MOBILE : ANDROID
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : Java 1.7 
 Tool Kit : Android 2.3 ABOVE 
 IDE : Eclipse 
REFERENCE: 
Bilal Shebaro, Oyindamola Oluwatimi, Elisa Bertino, “Context-based Access 
Control Systems for Mobile Devices”, IEEE Transactions on Dependable and 
Secure Computing, 2014.

More Related Content

PDF
Context based access control systems for mobile devices
DOCX
JPA1404 Context-based Access Control Systems for Mobile Devices
PDF
Ieee project-2014-2015-context-based-access-control-systems
PDF
Context based access control systems for mobile devices
PDF
I018145157
DOCX
Effective risk communication for android apps
PPTX
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
PPTX
Context based access control systems for mobile devices
JPA1404 Context-based Access Control Systems for Mobile Devices
Ieee project-2014-2015-context-based-access-control-systems
Context based access control systems for mobile devices
I018145157
Effective risk communication for android apps
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques

What's hot (20)

DOCX
Understandingphone sensor and app data for enhancing security
DOCX
Generating summary risk scores for mobile applications
DOCX
Sunil A 3+ years Resume
PPTX
Uses , misuses and risk of software
PPTX
Uses,mis uses and risk of software
PDF
Secopy project A
PDF
Web Programming - 12 Authentication and Authorization
PPT
Generating Risk Summary Risk Scores For Mobile Applications
PPT
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
PPTX
Secure Code Warrior - Least privilege
PPT
Face attendnace system AmpleTrails eSSL
PPTX
Enhancing user privacy by permission removal in android phones
PDF
Attribute-based Permission Model for Android Smartphones
PDF
Face Chk - Face Recognition
PPTX
Secure Code Warrior - Trust no input
PPT
Security Software
PDF
Manikavasagam Profile
PDF
Covert compositional analysis of android inter app permission leakage
PDF
OWASP Top 10 Overview
PDF
Who is the privileged user
 
Understandingphone sensor and app data for enhancing security
Generating summary risk scores for mobile applications
Sunil A 3+ years Resume
Uses , misuses and risk of software
Uses,mis uses and risk of software
Secopy project A
Web Programming - 12 Authentication and Authorization
Generating Risk Summary Risk Scores For Mobile Applications
IT109 Microsoft Windows 7 Operating Systems Unit 06 lesson 07
Secure Code Warrior - Least privilege
Face attendnace system AmpleTrails eSSL
Enhancing user privacy by permission removal in android phones
Attribute-based Permission Model for Android Smartphones
Face Chk - Face Recognition
Secure Code Warrior - Trust no input
Security Software
Manikavasagam Profile
Covert compositional analysis of android inter app permission leakage
OWASP Top 10 Overview
Who is the privileged user
 
Ad

Viewers also liked (20)

PPTX
Is War A Booming Industry?
PDF
CDU Zoom lame a nastro e refrigerazione
DOCX
Delay based network utility maximization
DOCX
Discovery and verification of neighbor positions in mobile ad hoc networks
DOCX
An efficient and robust addressing protocol for node auto configuration in ad...
DOCX
Cam cloud assisted privacy preserving mobile health monitoring
PDF
Promo LISTA 2013 www.utensileria-modenese.com
PPT
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
DOCX
Query adaptive image search with hash codes
PDF
2012 or webinar (final)
DOC
CHAPTER 1: INTRODUCTION
DOCX
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
PDF
KEY
Synchronous and Social - Evolve Conference
PPTX
FIRSTFare 2012 advanced lab view topics
PDF
Mc Presentatie Ice Covers Vitility
DOCX
Secure mining of association rules in horizontally distributed databases
DOCX
A gossip protocol for dynamic resource management in large cloud environments
PDF
Matthews --Mobile Expectations
PDF
Presentation iyc
Is War A Booming Industry?
CDU Zoom lame a nastro e refrigerazione
Delay based network utility maximization
Discovery and verification of neighbor positions in mobile ad hoc networks
An efficient and robust addressing protocol for node auto configuration in ad...
Cam cloud assisted privacy preserving mobile health monitoring
Promo LISTA 2013 www.utensileria-modenese.com
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Query adaptive image search with hash codes
2012 or webinar (final)
CHAPTER 1: INTRODUCTION
Cooperative packet delivery in hybrid wireless mobile networks a coalitional ...
Synchronous and Social - Evolve Conference
FIRSTFare 2012 advanced lab view topics
Mc Presentatie Ice Covers Vitility
Secure mining of association rules in horizontally distributed databases
A gossip protocol for dynamic resource management in large cloud environments
Matthews --Mobile Expectations
Presentation iyc
Ad

Similar to Context based access control systems for mobile devices (20)

PDF
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
PDF
Mobile Device Protection Using Sensors
PPT
3. security architecture and models
PDF
Semantic security framework and context-aware role-based access control ontol...
PDF
A Secure Software Engineering Perspective
PPT
CASA: Context Aware Scalable Authentication, at SOUPS 2013
PDF
Bf25342345
PPTX
Least privilege, access control, operating system security
PPT
Access Control for Home Data Sharing: Attitudes, Needs and Practices
PPT
system protection.ppt
PDF
Separation of Duty and Context Constraints for Contextual Role-Based Access C...
PPT
ch14 protection use in operating sys.ppt
PPT
Security Policies
PPT
ch1sdsdsdsdsdsdsdsdsdsdsdsdsdsdsdsdsds4.ppt
PPT
ch14.ppt hajaj shsjsj hsjsj to ni h na tb tk
DOC
Exploiting service similarity for privacy in location based search queries
DOCX
Information security proposal for electronic door lock
PPT
CASA: Context-Aware Scalable Authentication, at SOUPS 2013
PPT
2. access control
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
Mobile Device Protection Using Sensors
3. security architecture and models
Semantic security framework and context-aware role-based access control ontol...
A Secure Software Engineering Perspective
CASA: Context Aware Scalable Authentication, at SOUPS 2013
Bf25342345
Least privilege, access control, operating system security
Access Control for Home Data Sharing: Attitudes, Needs and Practices
system protection.ppt
Separation of Duty and Context Constraints for Contextual Role-Based Access C...
ch14 protection use in operating sys.ppt
Security Policies
ch1sdsdsdsdsdsdsdsdsdsdsdsdsdsdsdsdsds4.ppt
ch14.ppt hajaj shsjsj hsjsj to ni h na tb tk
Exploiting service similarity for privacy in location based search queries
Information security proposal for electronic door lock
CASA: Context-Aware Scalable Authentication, at SOUPS 2013
2. access control

Context based access control systems for mobile devices

  • 1. CONTEXT-BASED ACCESS CONTROL SYSTEMS FOR MOBILE DEVICES ABSTRACT: Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by malicious applications may result in privacy breaches and sensitive data leakage. An example would be a malicious application surreptitiously recording a confidential business conversation. The problem arises from the fact that Android users do not have control over the application capabilities once the applications have been granted the requested privileges upon installation. In many cases, however, whether an application may get a privilege depends on the specific user context and thus we need a context-based access control mechanism by which privileges can be dynamically granted or revoked to applications based on the specific context of the user. In this paper we propose such an access control mechanism. Our implementation of context differentiates between closely located sub-areas within the same location. We have modified the Android operating system so that context-based access control restrictions can be specified and enforced. We have performed several experiments to assess the efficiency of our access control mechanism and the accuracy of context detection.
  • 2. EXISTING SYSTEM: Security for mobile operating systems focuses on restricting applications from accessing sensitive data and resources, but mostly lacks efficient techniques for enforcing those restrictions according to fine-grained contexts that differentiate between closely located subareas. Moreover, most of this work has focused on developing policy systems that do not restrict privileges per application and are only effective system-wide. So User disable all applications from using the camera and any device resources and privileges that employers restrict while at work, while the user device can retain all its original privileges outside the work area. DISADVANTAGES OF EXISTING SYSTEM:  Do not cover all the possible ways in which applications can access user data and device resources.  The User leakage of Their privacy.
  • 3.  Existing location-based policy systems are not accurate enough to differentiate between nearby locations without extra hardware or location devices. PROPOSED SYSTEM: In this paper, we propose a context-based access control (CBAC) mechanism for Android systems that allows smartphone users to set configuration policies over their applications’ usage of device resources and services at different contexts. Through the CBAC mechanism, users can, for example, set restricted privileges for device applications when using the device at work, and device applications may re-gain their original privileges when the device is used at home. This change in device privileges is automatically applied as soon as the user device matches a pre-defined context of a user-defined policy. The user can also specify a default set of policies to be applied when the user is located in a non-previously defined location. Configured policy restrictions are defined according to the accessible device resources, services, and permissions that are granted to applications at installation time. Such policies define which services are offered by the device and
  • 4. limit the device and user information accessibility. Policy restrictions are linked to context and are configured by the device user. We define context according to location and time. ADVANTAGES OF PROPOSED SYSTEM:  Applications should not be able to fake the location or time of the device.  Can develop securer and more acceptable applications for end users.
  • 5. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.  MOBILE : ANDROID
  • 6. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE  IDE : Eclipse REFERENCE: Bilal Shebaro, Oyindamola Oluwatimi, Elisa Bertino, “Context-based Access Control Systems for Mobile Devices”, IEEE Transactions on Dependable and Secure Computing, 2014.