SlideShare a Scribd company logo
Softroniics
Softroniics www.softroniics.in
Calicut||Coimbatore||Palakkad 9037291113, 9037061113
CONTEXT-BASED ACCESS CONTROL SYSTEMS
FOR MOBILE DEVICES
ABSTRACT:
Mobile Android applications often have access to sensitive data and resources on the
user device. Misuse of this data by malicious applications may result in privacy
breaches and sensitive data leakage. An example would be a malicious application
surreptitiously recording a confidential business conversation. The problem arises
from the fact that Android users do not have control over the application capabilities
once the applications have been granted the requested privileges upon installation.
In many cases, however, whether an application may get a privilege depends on the
specific user context and thus we need a context-based access control mechanism by
which privileges can be dynamically granted or revoked to applications based on the
specific context of the user. In this paper we propose such an access control
mechanism. Our implementation of context differentiates between closely located
sub-areas within the same location. We have modified the Android operating system
so that context-based access control restrictions can be specified and enforced. We
have performed several experiments to assess the efficiency of our access control
mechanism and the accuracy of context detection.
EXISTING SYSTEM:
Security for mobile operating systems focuses on restricting applications from
accessing sensitive data and resources, but mostly lacks efficient techniques for
Softroniics
Softroniics www.softroniics.in
Calicut||Coimbatore||Palakkad 9037291113, 9037061113
enforcing those restrictions according to fine-grained contexts that differentiate
between closely located subareas. Moreover, most of this work has focused on
developing policy systems that do not restrict privileges per application and are only
effective system-wide. So User disable all applications from using the camera and
any device resources and privileges that employers restrict while at work, while the
user device can retain all its original privileges outside the work area.
DISADVANTAGES OF EXISTING SYSTEM:
 Do not cover all the possible ways in which applications can access user data
and device resources.
 The User leakage of Their privacy.
 Existing location-based policy systems are not accurate enough to
differentiate between nearby locations without extra hardware or location
devices.
PROPOSED SYSTEM:
In this paper, we propose a context-based access control (CBAC) mechanism for
Android systems that allows smartphone users to set configuration policies over their
applications’ usage of device resources and services at different contexts. Through
the CBAC mechanism, users can, for example, set restricted privileges for device
Softroniics
Softroniics www.softroniics.in
Calicut||Coimbatore||Palakkad 9037291113, 9037061113
applications when using the device at work, and device applications may re-gain
their original privileges when the device is used at home. This change in device
privileges is automatically applied as soon as the user device matches a pre-defined
context of a user-defined policy. The user can also specify a default set of policies
to be applied when the user is located in a non-previously defined location.
Configured policy restrictions are defined according to the accessible device
resources, services, and permissions that are granted to applications at installation
time. Such policies define which services are offered by the device and
limit the device and user information accessibility. Policy restrictions are linked to
context and are configured by the device user. We define context according to
location and time.
ADVANTAGES OF PROPOSED SYSTEM:
 Applications should not be able to fake the location or time of the device.
 Can develop securer and more acceptable applications for end users.
Softroniics
Softroniics www.softroniics.in
Calicut||Coimbatore||Palakkad 9037291113, 9037061113
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
 MOBILE : ANDROID
SOFTWARE REQUIREMENTS:
Softroniics
Softroniics www.softroniics.in
Calicut||Coimbatore||Palakkad 9037291113, 9037061113
 Operating system : Windows XP/7.
 Coding Language : Java 1.7
 Tool Kit : Android 2.3 ABOVE
 IDE : Eclipse
REFERENCE:
Bilal Shebaro, Oyindamola Oluwatimi, Elisa Bertino, “Context-based Access
Control Systems for Mobile Devices”, IEEE Transactions on Dependable and
Secure Computing, 2014.

More Related Content

DOCX
JPA1404 Context-based Access Control Systems for Mobile Devices
PDF
Ieee project-2014-2015-context-based-access-control-systems
PDF
Context based access control systems for mobile devices
PDF
Android security a survey of issues, malware penetration, and defenses
DOCX
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
PDF
Mobile app security
DOC
Accuracy constrained privacy-preserving access control mechanism for relation...
PPTX
JPA1404 Context-based Access Control Systems for Mobile Devices
Ieee project-2014-2015-context-based-access-control-systems
Context based access control systems for mobile devices
Android security a survey of issues, malware penetration, and defenses
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
Mobile app security
Accuracy constrained privacy-preserving access control mechanism for relation...

What's hot (19)

PDF
Basics of IoT Testing
PPT
Security and information assurance
DOCX
Sunil A 3+ years Resume
PPTX
Uses , misuses and risk of software
PDF
Covert compositional analysis of android inter app permission leakage
DOCX
Effective risk communication for android apps
PPTX
Uses,mis uses and risk of software
PDF
Risk-based Authentication In Cloud | Sysfore
PPTX
Mobile security
PDF
Who is the privileged user
 
PPTX
SeaCat: and SDN End-to-end Application Containment ArchitecTure
PDF
Windows Network Access Control for Government Traffic Department
PPTX
Enhancing user privacy by permission removal in android phones
PDF
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
PDF
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
PDF
Ld3420072014
DOCX
2014 android ieee
PDF
Whitepaper - CISO Guide_6pp
PDF
OWASP Top 10 Overview
Basics of IoT Testing
Security and information assurance
Sunil A 3+ years Resume
Uses , misuses and risk of software
Covert compositional analysis of android inter app permission leakage
Effective risk communication for android apps
Uses,mis uses and risk of software
Risk-based Authentication In Cloud | Sysfore
Mobile security
Who is the privileged user
 
SeaCat: and SDN End-to-end Application Containment ArchitecTure
Windows Network Access Control for Government Traffic Department
Enhancing user privacy by permission removal in android phones
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Ld3420072014
2014 android ieee
Whitepaper - CISO Guide_6pp
OWASP Top 10 Overview
Ad

Viewers also liked (14)

PDF
Cross-Platform Data Access for Android and iPhone
PPTX
End of third period
PPTX
Chapter11 new
PDF
Access Control Models: Controlling Resource Authorization
PDF
Context-Aware Access Control and Presentation of Linked Data
PPT
Access control
PPTX
Access control presentation
PPTX
Bug Tracking System
PDF
Access Control: Principles and Practice
PPSX
8 Access Control
PDF
Access Control Presentation
PDF
Tao zhang
PDF
An overview of access control
PPTX
Final Year Project Presentation
Cross-Platform Data Access for Android and iPhone
End of third period
Chapter11 new
Access Control Models: Controlling Resource Authorization
Context-Aware Access Control and Presentation of Linked Data
Access control
Access control presentation
Bug Tracking System
Access Control: Principles and Practice
8 Access Control
Access Control Presentation
Tao zhang
An overview of access control
Final Year Project Presentation
Ad

Similar to Context based access control systems for mobile devices (20)

DOCX
Context based access control systems for mobile devices
PDF
I018145157
PPT
Access Control for Home Data Sharing: Attitudes, Needs and Practices
PPT
ch14 protection use in operating sys.ppt
PPT
2. access control
PPT
lec-10 Design-Principles.ppt
KEY
High-Confidence Ubiquitous Computing Systems (invited talk at ISHCS 2011)
PPTX
ch17.pptx
PDF
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
PPT
ch1sdsdsdsdsdsdsdsdsdsdsdsdsdsdsdsdsds4.ppt
PPT
ch14.ppt hajaj shsjsj hsjsj to ni h na tb tk
PDF
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
PDF
final_writeup
PPT
3. security architecture and models
PDF
Collaborative policy administration
PDF
A Framework for Providing Selective Permissions to Android Applications
PPT
system protection.ppt
PDF
Praetorian Veracode Webinar - Mobile Privacy
PPTX
LIS3353 SP12 Week 9
Context based access control systems for mobile devices
I018145157
Access Control for Home Data Sharing: Attitudes, Needs and Practices
ch14 protection use in operating sys.ppt
2. access control
lec-10 Design-Principles.ppt
High-Confidence Ubiquitous Computing Systems (invited talk at ISHCS 2011)
ch17.pptx
RSA 2013 Session: Mobile Security Smackdown: How Government “Pwned” The Priva...
ch1sdsdsdsdsdsdsdsdsdsdsdsdsdsdsdsdsds4.ppt
ch14.ppt hajaj shsjsj hsjsj to ni h na tb tk
PHYSICAL ACCESS CONTROL - AN UNDERSTANDING.pdf
final_writeup
3. security architecture and models
Collaborative policy administration
A Framework for Providing Selective Permissions to Android Applications
system protection.ppt
Praetorian Veracode Webinar - Mobile Privacy
LIS3353 SP12 Week 9

More from shanofa sanu (12)

PDF
Dynamic google-remote-data-collection-docx
PDF
Mobile phone-based-drunk-driving-detection-system-docx
PDF
Bluetooth based-chatting-system-using-android-docx
PDF
Face to-face proximity estimation using bluetooth on smartphones
PDF
A novel high step
PDF
Mobile data gathering with load balanced clustering and dual data uploading i...
PDF
electronics-embedded-project-topics-list-softroniics
PDF
Power decoupling
PDF
11.paqcs physical design aware fault-tolerant quantum circuit synthesis
PDF
11.1 automatic moving object extraction (1)
PDF
272465451 raspberry-pi-based-project-abstracts
PDF
Discovering latent semantics in web documents
Dynamic google-remote-data-collection-docx
Mobile phone-based-drunk-driving-detection-system-docx
Bluetooth based-chatting-system-using-android-docx
Face to-face proximity estimation using bluetooth on smartphones
A novel high step
Mobile data gathering with load balanced clustering and dual data uploading i...
electronics-embedded-project-topics-list-softroniics
Power decoupling
11.paqcs physical design aware fault-tolerant quantum circuit synthesis
11.1 automatic moving object extraction (1)
272465451 raspberry-pi-based-project-abstracts
Discovering latent semantics in web documents

Recently uploaded (20)

PPTX
master seminar digital applications in india
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
01-Introduction-to-Information-Management.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Lesson notes of climatology university.
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
RMMM.pdf make it easy to upload and study
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Insiders guide to clinical Medicine.pdf
master seminar digital applications in india
Microbial diseases, their pathogenesis and prophylaxis
Pharmacology of Heart Failure /Pharmacotherapy of CHF
01-Introduction-to-Information-Management.pdf
Complications of Minimal Access Surgery at WLH
2.FourierTransform-ShortQuestionswithAnswers.pdf
Lesson notes of climatology university.
Module 4: Burden of Disease Tutorial Slides S2 2025
Renaissance Architecture: A Journey from Faith to Humanism
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Supply Chain Operations Speaking Notes -ICLT Program
RMMM.pdf make it easy to upload and study
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Cell Structure & Organelles in detailed.
O5-L3 Freight Transport Ops (International) V1.pdf
Final Presentation General Medicine 03-08-2024.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Insiders guide to clinical Medicine.pdf

Context based access control systems for mobile devices

  • 1. Softroniics Softroniics www.softroniics.in Calicut||Coimbatore||Palakkad 9037291113, 9037061113 CONTEXT-BASED ACCESS CONTROL SYSTEMS FOR MOBILE DEVICES ABSTRACT: Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by malicious applications may result in privacy breaches and sensitive data leakage. An example would be a malicious application surreptitiously recording a confidential business conversation. The problem arises from the fact that Android users do not have control over the application capabilities once the applications have been granted the requested privileges upon installation. In many cases, however, whether an application may get a privilege depends on the specific user context and thus we need a context-based access control mechanism by which privileges can be dynamically granted or revoked to applications based on the specific context of the user. In this paper we propose such an access control mechanism. Our implementation of context differentiates between closely located sub-areas within the same location. We have modified the Android operating system so that context-based access control restrictions can be specified and enforced. We have performed several experiments to assess the efficiency of our access control mechanism and the accuracy of context detection. EXISTING SYSTEM: Security for mobile operating systems focuses on restricting applications from accessing sensitive data and resources, but mostly lacks efficient techniques for
  • 2. Softroniics Softroniics www.softroniics.in Calicut||Coimbatore||Palakkad 9037291113, 9037061113 enforcing those restrictions according to fine-grained contexts that differentiate between closely located subareas. Moreover, most of this work has focused on developing policy systems that do not restrict privileges per application and are only effective system-wide. So User disable all applications from using the camera and any device resources and privileges that employers restrict while at work, while the user device can retain all its original privileges outside the work area. DISADVANTAGES OF EXISTING SYSTEM:  Do not cover all the possible ways in which applications can access user data and device resources.  The User leakage of Their privacy.  Existing location-based policy systems are not accurate enough to differentiate between nearby locations without extra hardware or location devices. PROPOSED SYSTEM: In this paper, we propose a context-based access control (CBAC) mechanism for Android systems that allows smartphone users to set configuration policies over their applications’ usage of device resources and services at different contexts. Through the CBAC mechanism, users can, for example, set restricted privileges for device
  • 3. Softroniics Softroniics www.softroniics.in Calicut||Coimbatore||Palakkad 9037291113, 9037061113 applications when using the device at work, and device applications may re-gain their original privileges when the device is used at home. This change in device privileges is automatically applied as soon as the user device matches a pre-defined context of a user-defined policy. The user can also specify a default set of policies to be applied when the user is located in a non-previously defined location. Configured policy restrictions are defined according to the accessible device resources, services, and permissions that are granted to applications at installation time. Such policies define which services are offered by the device and limit the device and user information accessibility. Policy restrictions are linked to context and are configured by the device user. We define context according to location and time. ADVANTAGES OF PROPOSED SYSTEM:  Applications should not be able to fake the location or time of the device.  Can develop securer and more acceptable applications for end users.
  • 4. Softroniics Softroniics www.softroniics.in Calicut||Coimbatore||Palakkad 9037291113, 9037061113 SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.  MOBILE : ANDROID SOFTWARE REQUIREMENTS:
  • 5. Softroniics Softroniics www.softroniics.in Calicut||Coimbatore||Palakkad 9037291113, 9037061113  Operating system : Windows XP/7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE  IDE : Eclipse REFERENCE: Bilal Shebaro, Oyindamola Oluwatimi, Elisa Bertino, “Context-based Access Control Systems for Mobile Devices”, IEEE Transactions on Dependable and Secure Computing, 2014.