Security Profiles With Fine-Grained Policies On Smartphone

A. Malathy*, T.A. Vijayalakshmi**, V. Kumar***, I. Rajesh****, M. Banuchitra*****
* Network Engineer, Mgauge, Chennai.
**, ***** Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem.
*** HOD, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem.
**** Associate Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem.
Periodicity:November - January'2015
DOI : https://doi.org/10.26634/jmt.1.4.3520

Abstract

Smart Phone is a single device that can be used in different environments, where corporate data and applications in it, are separated from the personal data and applications. Data and applications are stored in different compartments. Security profiles are created and applications are assigned to it. In general, access to data and applications will be implemented by a set of regulatory principles. In the case a Smartphone gets stolen and a third person tries to steal sensitive information it is currently prove to breach of the security system. To overcome this problem a new system is proposed. The user can protect their sensitive data and applications from hackers with the help of the security profiles they created and the profiles will be enabled automatically based on the location. If a third person tries to change the profile manually, the system may ask for security code. If he gives wrong code more than five times then the data will be deleted from the internal memory of the Smartphone. Hence data is secured and protected by means of the security profile.

Keywords

Android, Security profiles.

How to Cite this Article?

Malathy, A., Vijayalakshmi, T. A., Kumar, V., Rajesh, I., and Banuchitra, M. (2015). Security Profiles With Fine-Grained Policies On Smartphone. i-manager’s Journal on Mobile Applications and Technologies, 1(4), 39-43. https://doi.org/10.26634/jmt.1.4.3520

References

[1]. Yury Zhauniarovich, Giovanni Russello, Bruno Crispo (2014). “MOSES: Supporting and Enforcing Security Profiles on Smartphones”, IEEE Transactions on depandable and security computing, Vol.11, No. 3.
[2]. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S. and Glezer, C. (2010), “Google Android: A Comprehensive Security Assessment, IEEE Security and Privacy, Vol. 8, No. 2, pp. 35-44.
[3]. Russello, G., Crispo, B., Fernandes, E. and Zhauniarovich, Y. (2011). “YAASE: Yet Another Android Security Extension”, Proc. IEEE Third Intl Conf. Social Computing and Privacy, Security, Risk and Trust (SocialCom/PASSAT), pp. 1033-1040.
[4]. Dresden, T.U. and of Technology Berlin (2014), „L4Android, http://l4android.org/2014.
[5]. Conti, M., Crispo, B., Fernandes, E. and Zhauniarovich, Y. (2012). “CRePE: A System for Enforcing Fine-Grained Context-Related Policies on Android, IEEE Trans. Information Forensics and Security, Vol. 7, No. 5, pp. 1426-1438.
[6]. Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, L., McDaniel P. and Sheth, A.N. (2010). “Taintdroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones”, Proc. Ninth USENIX Conf. Operating Systems Design and Implementation (OSDI 10), pp. 1-6.
[7]. Beresford,A.R., Rice,A., and Skehin,N. (2011). “MockDroid: Trading Privacy for Application Functionality on Smartphones, Proc. 12th Workshop Mobile Computing Systems and Applications (HotMobile’ 11), pp. 49-54.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.