SlideShare a Scribd company logo
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 1
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
SPE: Security and Privacy Enhancement
Framework for Mobile Devices
Abstract
A security and privacy enhancement (SPE) framework for unmodified
mobile operating systems. SPE introduces a new layer between the application and
the operating system and does not require a device be jail broken or utilize a
custom operating system. We utilize an existing ontology designed for enforcing
security and privacy policies on mobile devices to build a policy that is
customizable. Based on this policy, SPE provides enhancements to native controls
that currently exist on the platform for privacy and security sensitive components.
SPE allows access to these components in a way that allows the framework to
ensure the application is truthful in its declared intent and ensure that the user’s
policy is enforced. In our evaluation we verify the correctness of the framework
and the computing impact on the device. Additionally, we discovered security and
privacy issues in several open source applications by utilizing the SPE Framework.
From our findings, if SPE is adopted by mobile operating systems producers, it
would provide consumers and businesses the additional privacy and security
controls they demand and allow users to be more aware of security and privacy
issues with applications on their devices.
INTRODUCTION
Mobile computing devices are quickly becoming the platform of choice for
consumers and businesses. Given that mobile devices started to outsell PCs in 2011
and mobile applications are freely available in marketplaces, consumers are more
likely to focus on mobile devices as their primary personal computing platforms.
Additionally, users perform many of the same tasks that were performed
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 2
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
previously with traditional computers on their mobile devices. Most devices are
equipped with numerous sensors such as cameras, microphones, GPS,
accelerometers, and gyroscopes where users can share data about their
environment or habits quickly, but also unknowingly. Here are a few examples of
such unintentional sharing: (a) Facebook leaked the phone number from a mobile
device before the user logged into the application (b) Angry Birds collected user
data, which was found to be used by the NSA to profile users (c) out of 25,976
Android applications, 969 applications leaked location data and 347 recorded audio
without the user’s permission (d) Path was found to geotag photos even after a user
disabled location services , and sent user’s privacy data unknowingly by uploading
a user’s entire address book . Even when a user permits an application to access
data on the device, the user is not aware of what else the data is being used for,
how often it is being accessed, and with whom it is being shared there is no way to
confirm that the application is truthful in how it states the information will be used.
EXISTING SYSTEM
The rapid growth in the mobile device ecosystem demands viable solutions
security and privacy concerns. Even though mobile devices are becoming more
powerful, there still exist constraints on computing power, memory capacity, and a
virtual endless supply of energy that traditional computing platforms offer today.
These constraints limit mobile devices from performing computationally expensive
operations such as pattern-based intrusion detection or fuzzy checking of privacy
leakage. Even if computing power on mobile devices were to increase, the effect
on the device’s battery would be unacceptable for a user. Additionally, the user
experience may be affected if more computationally expensive operations are
being executed while the user is interacting with the device. Recent research in this
area has introduced novel methods for providing additional security and privacy
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 3
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
controls. However most of these methods require a modification to the operating
system or the device to be jailbroken
DRAWBACK OF EXISTING SYSTEM
 Privacy data is leaked immediately.
 Accessing information without user permission.
 Path are easily found, when the location services are disabled.
PROPOSED SYSTEM
In proposed system, we have presented the Security and Privacy Enhanced
(SPE) framework. We described the policy model it utilizes, the core design of the
framework, and details on an implementation that allows a consumer or business to
effectively ensure that security and privacy policies are enforced. Additionally, we
proposed a novel approach that uses intents to describe to the user how the
application will use their data and enforce these intents. Compared to recent
research that has focused on modifying open mobile operating systems or
jailbreaking closed-source operating systems like iOS, the SPE Framework takes a
different approach. While the SPE Framework does require modification to the
application, it does not require modification to the OS orfor a device to be
jailbroken or rooted. We believe this is a more sustainable approach as OS updates
do not impact the SPE Framework unless there are significant API changes.
Frequent updates to mobile operating systems have led to fragmentation, with
modifications to Android by both carriers and device manufacturers. Additionally,
a consumer does not need to compromise the built-in security of their device by
jail breaking or rooting the device; with SPE they add another layer of protection.
Lastly with SPE a consumer can use a stock device with a stock operating system.
Based on the results of our evaluation, SPE is highly effective and prevents several
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 4
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
privacy and security concerns from several iOS applications. In the near future we
plan on releasing the SPE Framework, SPE Conversion Assistant, and SPE Policy
application as open source projects. From this, an external entity can be created for
developers to retrieve the SPE Framework to incorporate within their application
or the framework could be tied into the workflow for application submission.
ADVANTAGE OF PROPOSED SYSTEM
 Highly effectiveness of ensure the security and privacy.
 In OS updation, customer need not wait a long time.
Hardware Requirement
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech
Ram : 512 Mb.
MOBILE : ANDROID
Software Requirement
Operating system : Windows 7.
Coding Language : Java 1.7
Tool Kit : Android 2.3 ABOVE
IDE : Eclipse

More Related Content

PPTX
Appsecurity, win or loose
PPTX
Getting secure in a mobile-first world with EMS
PDF
Symantec Mobility Suite -Workforce apps
PDF
Guide Preview: Ensuring your enterprise image-viewer if fully secure
PDF
Mobile Security: The 5 Questions Modern Organizations Are Asking
PDF
Android security a survey of issues, malware penetration, and defenses
PDF
The 1st Step to Zero Trust: Asset Management for Cybersecurity
PDF
Asset management for cybersecurity
Appsecurity, win or loose
Getting secure in a mobile-first world with EMS
Symantec Mobility Suite -Workforce apps
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Mobile Security: The 5 Questions Modern Organizations Are Asking
Android security a survey of issues, malware penetration, and defenses
The 1st Step to Zero Trust: Asset Management for Cybersecurity
Asset management for cybersecurity

What's hot (20)

PDF
Mobile Security
PDF
Challenges and Security Issues in Future IT Infrastructure Components
PDF
New trends in Payments Security: NFC & Mobile
PDF
U S Embassy Event - Today’S Cyber Threats
PDF
Symantec Mobile Security Whitepaper June 2011
PPT
Palo Alto Networks Soc Ent Okt2009
PPTX
Outside the Office: Mobile Security
PDF
Cs a multi-national oil and gas company
PDF
Huntsman - Internet of things (for IAP2015)
PDF
Cybersecurity in the Age of Mobility
PPTX
Internet of Things: Dealing with the enterprise network of things
PPTX
The Future of Mobile Application Security
PPTX
LoginCat - Zero Trust Integrated Cybersecurity
PDF
Ci31560566
PDF
Navigating Zero Trust Presentation Slides
PDF
Axonius Case Study: AppsFlyer
PDF
Safeguarding the Internet of Things
PDF
2015 Cybersecurity Predictions
PDF
EveryCloud 5-steps-cloud-confidence
PDF
IT Security Presentation - IIMC 2014 Conference
Mobile Security
Challenges and Security Issues in Future IT Infrastructure Components
New trends in Payments Security: NFC & Mobile
U S Embassy Event - Today’S Cyber Threats
Symantec Mobile Security Whitepaper June 2011
Palo Alto Networks Soc Ent Okt2009
Outside the Office: Mobile Security
Cs a multi-national oil and gas company
Huntsman - Internet of things (for IAP2015)
Cybersecurity in the Age of Mobility
Internet of Things: Dealing with the enterprise network of things
The Future of Mobile Application Security
LoginCat - Zero Trust Integrated Cybersecurity
Ci31560566
Navigating Zero Trust Presentation Slides
Axonius Case Study: AppsFlyer
Safeguarding the Internet of Things
2015 Cybersecurity Predictions
EveryCloud 5-steps-cloud-confidence
IT Security Presentation - IIMC 2014 Conference
Ad

Viewers also liked (16)

PPTX
Presentación curso ABP
PDF
Swedish_Technology_Time_Attendance
PDF
A new control strategy for distributed static compensators considering transm...
PDF
Bidirectional pwm converter integrating cell voltage equalizer using series r...
PDF
Novel single phase pwm ac–ac converters solving commutation problem using swi...
DOCX
Yeni grisales
PDF
A new railway power flow control system coupled with asymmetric double lc bra...
PDF
Jus' IPad
PDF
Camps gaëlle et lilou
DOCX
Incentive based data sharing in delay tolerant mobile networks
PDF
High gain resonant switched-capacitor cell-based dcdc converter for offshore ...
PPTX
Evaluation question 1 (digi pack)
PPTX
How to Get Involved in the Magento Community #mm16ar
PPTX
Lakkadi in Wayanad
PPTX
5.marec Svetový deň účinnosti
PDF
A nonisolated three port dc–dc converter and three-domain control method for ...
Presentación curso ABP
Swedish_Technology_Time_Attendance
A new control strategy for distributed static compensators considering transm...
Bidirectional pwm converter integrating cell voltage equalizer using series r...
Novel single phase pwm ac–ac converters solving commutation problem using swi...
Yeni grisales
A new railway power flow control system coupled with asymmetric double lc bra...
Jus' IPad
Camps gaëlle et lilou
Incentive based data sharing in delay tolerant mobile networks
High gain resonant switched-capacitor cell-based dcdc converter for offshore ...
Evaluation question 1 (digi pack)
How to Get Involved in the Magento Community #mm16ar
Lakkadi in Wayanad
5.marec Svetový deň účinnosti
A nonisolated three port dc–dc converter and three-domain control method for ...
Ad

Similar to Spe security and privacy enhancement framework for mobile devices (20)

PDF
I018145157
DOCX
Sample Discussion 1Security is one of the most important fun.docx
DOCX
Sample Discussion 1Security is one of the most important fun.docx
PDF
I want you to Read intensively papers and give me a summary for ever.pdf
PDF
Iaetsd future polling system using cloud computing in support with smart clie...
PDF
Securing mobile apps in a BYOD world
PDF
SecurityWhitepaper 7-1-2015
PPTX
Moses Supporting And Enforcing Security Profiles On Smartphones
PDF
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
PDF
Securing the network perimeter
PDF
PingPal infodeck: How to survive BYOD and mobile networks
PDF
10 Reasons to Strengthen Security with App & Desktop Virtualization
PDF
Providing privacy aware incentives in mobile sensing systems
PDF
Wireless Security on Context (disponible en español)
PDF
Context based access control systems for mobile devices
PDF
State ofmobilesecurity
PDF
Netskope Overview
PDF
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
PDF
ACCESS_WP_Security-web
PDF
Physical/Network Access Control
I018145157
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
I want you to Read intensively papers and give me a summary for ever.pdf
Iaetsd future polling system using cloud computing in support with smart clie...
Securing mobile apps in a BYOD world
SecurityWhitepaper 7-1-2015
Moses Supporting And Enforcing Security Profiles On Smartphones
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Securing the network perimeter
PingPal infodeck: How to survive BYOD and mobile networks
10 Reasons to Strengthen Security with App & Desktop Virtualization
Providing privacy aware incentives in mobile sensing systems
Wireless Security on Context (disponible en español)
Context based access control systems for mobile devices
State ofmobilesecurity
Netskope Overview
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
ACCESS_WP_Security-web
Physical/Network Access Control

More from LeMeniz Infotech (20)

PDF
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
PDF
A fast fault tolerant architecture for sauvola local image thresholding algor...
PDF
A dynamically reconfigurable multi asip architecture for multistandard and mu...
PDF
Interleaved digital power factor correction based on the sliding mode approach
PDF
Bumpless control for reduced thd in power factor correction circuits
PDF
A bidirectional single stage three phase rectifier with high-frequency isolat...
PDF
A bidirectional three level llc resonant converter with pwam control
PDF
Efficient single phase transformerless inverter for grid tied pvg system with...
PDF
Highly reliable transformerless photovoltaic inverters with leakage current a...
PDF
Grid current-feedback active damping for lcl resonance in grid-connected volt...
PDF
Delay dependent stability of single-loop controlled grid-connected inverters ...
PDF
Connection of converters to a low and medium power dc network using an induct...
PDF
Stamp enabling privacy preserving location proofs for mobile users
PDF
Sbvlc secure barcode based visible light communication for smartphones
PDF
Read2 me a cloud based reading aid for the visually impaired
PDF
Privacy preserving location sharing services for social networks
PDF
Pass byo bring your own picture for securing graphical passwords
PDF
Eplq efficient privacy preserving location-based query over outsourced encryp...
PDF
Analyzing ad library updates in android apps
PDF
An exploration of geographic authentication scheme
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast fault tolerant architecture for sauvola local image thresholding algor...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
Interleaved digital power factor correction based on the sliding mode approach
Bumpless control for reduced thd in power factor correction circuits
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional three level llc resonant converter with pwam control
Efficient single phase transformerless inverter for grid tied pvg system with...
Highly reliable transformerless photovoltaic inverters with leakage current a...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Delay dependent stability of single-loop controlled grid-connected inverters ...
Connection of converters to a low and medium power dc network using an induct...
Stamp enabling privacy preserving location proofs for mobile users
Sbvlc secure barcode based visible light communication for smartphones
Read2 me a cloud based reading aid for the visually impaired
Privacy preserving location sharing services for social networks
Pass byo bring your own picture for securing graphical passwords
Eplq efficient privacy preserving location-based query over outsourced encryp...
Analyzing ad library updates in android apps
An exploration of geographic authentication scheme

Recently uploaded (20)

PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
RMMM.pdf make it easy to upload and study
PPTX
Cell Types and Its function , kingdom of life
PDF
Computing-Curriculum for Schools in Ghana
PDF
Complications of Minimal Access Surgery at WLH
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Pre independence Education in Inndia.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Basic Mud Logging Guide for educational purpose
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Renaissance Architecture: A Journey from Faith to Humanism
RMMM.pdf make it easy to upload and study
Cell Types and Its function , kingdom of life
Computing-Curriculum for Schools in Ghana
Complications of Minimal Access Surgery at WLH
102 student loan defaulters named and shamed – Is someone you know on the list?
Microbial diseases, their pathogenesis and prophylaxis
PPH.pptx obstetrics and gynecology in nursing
Pre independence Education in Inndia.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Anesthesia in Laparoscopic Surgery in India
TR - Agricultural Crops Production NC III.pdf
Sports Quiz easy sports quiz sports quiz
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Basic Mud Logging Guide for educational purpose
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF

Spe security and privacy enhancement framework for mobile devices

  • 1. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 1 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com SPE: Security and Privacy Enhancement Framework for Mobile Devices Abstract A security and privacy enhancement (SPE) framework for unmodified mobile operating systems. SPE introduces a new layer between the application and the operating system and does not require a device be jail broken or utilize a custom operating system. We utilize an existing ontology designed for enforcing security and privacy policies on mobile devices to build a policy that is customizable. Based on this policy, SPE provides enhancements to native controls that currently exist on the platform for privacy and security sensitive components. SPE allows access to these components in a way that allows the framework to ensure the application is truthful in its declared intent and ensure that the user’s policy is enforced. In our evaluation we verify the correctness of the framework and the computing impact on the device. Additionally, we discovered security and privacy issues in several open source applications by utilizing the SPE Framework. From our findings, if SPE is adopted by mobile operating systems producers, it would provide consumers and businesses the additional privacy and security controls they demand and allow users to be more aware of security and privacy issues with applications on their devices. INTRODUCTION Mobile computing devices are quickly becoming the platform of choice for consumers and businesses. Given that mobile devices started to outsell PCs in 2011 and mobile applications are freely available in marketplaces, consumers are more likely to focus on mobile devices as their primary personal computing platforms. Additionally, users perform many of the same tasks that were performed
  • 2. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 2 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com previously with traditional computers on their mobile devices. Most devices are equipped with numerous sensors such as cameras, microphones, GPS, accelerometers, and gyroscopes where users can share data about their environment or habits quickly, but also unknowingly. Here are a few examples of such unintentional sharing: (a) Facebook leaked the phone number from a mobile device before the user logged into the application (b) Angry Birds collected user data, which was found to be used by the NSA to profile users (c) out of 25,976 Android applications, 969 applications leaked location data and 347 recorded audio without the user’s permission (d) Path was found to geotag photos even after a user disabled location services , and sent user’s privacy data unknowingly by uploading a user’s entire address book . Even when a user permits an application to access data on the device, the user is not aware of what else the data is being used for, how often it is being accessed, and with whom it is being shared there is no way to confirm that the application is truthful in how it states the information will be used. EXISTING SYSTEM The rapid growth in the mobile device ecosystem demands viable solutions security and privacy concerns. Even though mobile devices are becoming more powerful, there still exist constraints on computing power, memory capacity, and a virtual endless supply of energy that traditional computing platforms offer today. These constraints limit mobile devices from performing computationally expensive operations such as pattern-based intrusion detection or fuzzy checking of privacy leakage. Even if computing power on mobile devices were to increase, the effect on the device’s battery would be unacceptable for a user. Additionally, the user experience may be affected if more computationally expensive operations are being executed while the user is interacting with the device. Recent research in this area has introduced novel methods for providing additional security and privacy
  • 3. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 3 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com controls. However most of these methods require a modification to the operating system or the device to be jailbroken DRAWBACK OF EXISTING SYSTEM  Privacy data is leaked immediately.  Accessing information without user permission.  Path are easily found, when the location services are disabled. PROPOSED SYSTEM In proposed system, we have presented the Security and Privacy Enhanced (SPE) framework. We described the policy model it utilizes, the core design of the framework, and details on an implementation that allows a consumer or business to effectively ensure that security and privacy policies are enforced. Additionally, we proposed a novel approach that uses intents to describe to the user how the application will use their data and enforce these intents. Compared to recent research that has focused on modifying open mobile operating systems or jailbreaking closed-source operating systems like iOS, the SPE Framework takes a different approach. While the SPE Framework does require modification to the application, it does not require modification to the OS orfor a device to be jailbroken or rooted. We believe this is a more sustainable approach as OS updates do not impact the SPE Framework unless there are significant API changes. Frequent updates to mobile operating systems have led to fragmentation, with modifications to Android by both carriers and device manufacturers. Additionally, a consumer does not need to compromise the built-in security of their device by jail breaking or rooting the device; with SPE they add another layer of protection. Lastly with SPE a consumer can use a stock device with a stock operating system. Based on the results of our evaluation, SPE is highly effective and prevents several
  • 4. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 4 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com privacy and security concerns from several iOS applications. In the near future we plan on releasing the SPE Framework, SPE Conversion Assistant, and SPE Policy application as open source projects. From this, an external entity can be created for developers to retrieve the SPE Framework to incorporate within their application or the framework could be tied into the workflow for application submission. ADVANTAGE OF PROPOSED SYSTEM  Highly effectiveness of ensure the security and privacy.  In OS updation, customer need not wait a long time. Hardware Requirement System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech Ram : 512 Mb. MOBILE : ANDROID Software Requirement Operating system : Windows 7. Coding Language : Java 1.7 Tool Kit : Android 2.3 ABOVE IDE : Eclipse