Friday, 23 October 2015

CONTEXT-BASED ACCESS CONTROL SYSTEMS FOR MOBILE DEVICES

ABSTRACT:
Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by malicious applications may result in privacy breaches and sensitive data leakage. An example would be a malicious application surreptitiously recording a confidential business conversation. The problem arises from the fact that Android users do not have control over the application capabilities once the applications have been granted the requested privileges upon installation. In many cases, however, whether an application may get a privilege depends on the specific user context and thus we need a context-based access control mechanism by which privileges can be dynamically granted or revoked to applications based on the specific context of the user. In this paper we propose such an access control mechanism. Our implementation of context differentiates between closely located sub-areas within the same location. We have modified the Android operating system so that context-based access control restrictions can be specified and enforced. We have performed several experiments to assess the efficiency of our access control mechanism and the accuracy of context detection.
AIM
The aim of this paper is our implementation of context differentiates between closely located sub-areas within the same location.
SCOPE
The scope of this paper tends to have performed several experiments to assess the efficiency of our access control mechanism and the accuracy of context detection.
EXISTING SYSTEM:
Security for mobile operating systems focuses on restricting applications from accessing sensitive data and resources, but mostly lacks efficient techniques for enforcing those restrictions according to fine-grained contexts that differentiate between closely located subareas. Moreover, most of this work has focused on developing policy systems that do not restrict privileges per application and are only effective system-wide. So User disable all applications from using the camera and any device resources and privileges that employers restrict while at work, while the user device can retain all its original privileges outside the work area.
DISADVANTAGES
·      Do not cover all the possible ways in which applications can access user data and device resources.
·      The User leakage of Their privacy.
·      Existing location-based policy systems are not accurate enough to differentiate between nearby locations without extra hardware or location devices.
PROPOSED SYSTEM:
In this paper, we propose a context-based access control (CBAC) mechanism for Android systems that allows smartphone users to set configuration policies over their applications’ usage of device resources and services at different contexts. Through the CBAC mechanism, users can, for example, set restricted privileges for device applications when using the device at work, and device applications may re-gain their original privileges when the device is used at home. This change in device privileges is automatically applied as soon as the user device matches a pre-defined context of a user-defined policy. The user can also specify a default set of policies to be applied when the user is located in a non-previously defined location. Configured policy restrictions are defined according to the accessible device resources, services, and permissions that are granted to applications at installation time. Such policies define which services are offered by the device and
limit the device and user information accessibility. Policy restrictions are linked to context and are configured by the device user. We define context according to location and time.
ADVANTAGES
 Applications should not be able to fake the location or time of the device.
 Can develop securer and more acceptable applications for end users.

SYSTEM ARCHITECTURE:


SYSTEM CONFIGURATION

HARDWARE REQUIREMENTS:-

·                Processor          -   Pentium –III

·                Speed                -    1.1 Ghz
·                RAM                 -    256 MB(min)
·                Hard Disk         -   20 GB
·                Floppy Drive    -    1.44 MB
·                Key Board                 -    Standard Windows Keyboard
·                Mouse               -    Two or Three Button Mouse
·                Monitor             -    SVGA

SOFTWARE REQUIREMENTS:-

·                Operating System      :Android OS             
·                Front End                  : JAVA
·                Database                  : SqLite
·                Tool                           :Eclipse

REFERENCE:
Oluwatimi, O. Bertino, E., “CONTEXT-BASED ACCESS CONTROL SYSTEMS FOR MOBILE DEVICES”, IEEE Transactions on Dependable and Secure Computing  Volume 12 ,  Issue 2 April 2014

Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications

ABSTRACT
Reducing the communication energy is essential to facilitate the growth of emerging mobile applications. In this paper, we introduce signal strength into location-based applications to reduce the energy consumption of mobile devices for data reception. First, we model the problem of data fetch scheduling, with the objective of minimizing the energy required to fetch location-based information without impacting the application’s semantics adversely. To solve the fundamental problem, we propose a dynamic-programming algorithm and prove its optimality in terms of energy savings. Then, we perform post optimal analysis to explore the tolerance of the algorithm to signal strength fluctuations. Finally, based on the algorithm, we consider implementation issues. We have also developed a virtual tour system integrated with existing Web applications to validate the practicability of the proposed concept. The results of experiments conducted based on real-world case studies are very encouraging and demonstrate the applicability of the proposed algorithm toward signal strength fluctuations.
AIM
The aim of this paper is propose a dynamic-programming algorithm and prove its optimality in terms of energy savings.
SCOPE
The scope of this paper is perform post optimal analysis to explore the tolerance of the algorithm to signal strength fluctuations
EXISTING SYSTEM
Many existing approaches leverage the complementary characteristics of WiFi and 3Gi.e., WiFi to improve energy efficiency, and 3G to maintain ubiquitous connectivity. Recently, it has been observed that signal strength has a direct impact on the communication energy consumption. The communication energy per bit when the signal is weak could be as much as six times more than that when the signal is strong . This phenomenon has proved evident in both WiFi  and 3G . The reason for such a phenomenon results mainly from the adaptive modulation and power control employed in wireless network systems. Based on the observation, it could be promising to exploit signal strength information to reduce the communication energy of mobile devices. However, the challenge is how to exploit this observation to gain energy efficiency. In particular, signal strength may fluctuate with time due to multipath fading, so attention has to be paid to the impact of signal fluctuations on the practicability of the proposed approaches in real-world environments.
DISADVANTAGES
·      The problem of data fetches scheduling, with the objective of minimizing the energy required to fetch location-based information without impacting the application’s semantics adversely.
·      Reducing the communication energy
 PROPOSED SYSTEM
In this project, propose a dynamic-programming algorithm to solve the fundamental problem. The solution involves scheduling the fetching of location-based information at appropriate locations so as to minimize the total energy consumption. We prove that the algorithm is optimal in terms of energy savings. Third, we perform post optimal analysis to explore how the algorithm responds to signal strength fluctuations, especially the fluctuation range within which the derived solution remains optimal or feasible. The analysis helps to understand the impact of signal fluctuations on the practicability of this new concept in real-world environments. Fourth, we discuss technical implementation issues that arise when introducing signal strength into location-based applications for energy savings. Fifth, we conducted a series of experiments in Taipei City, Taiwan, for real-world case studies. The results show that an Android smart phone of HTC EVO 3D can achieve a significant energy reduction when accessing location-based applications. Finally, we discuss the limitations of our work and highlight issues that require further investigation. The concept, once proved practicable and embraced gradually, could be extended and applied to other variants of location-based applications based on the knowledge learned from this work.
 ADVANTAGES
·      Smartphone can achieve energy savings of 46%–70% and 35%–60% for pedestrian users along the two routes,
·      The algorithm can tolerate signal strength fluctuations very well when the objects along a route is sparse.       

SYSTEM CONFIGURATION

HARDWARE REQUIREMENTS:-

·                Processor          -   Pentium –III

·                Speed                -    1.1 Ghz
·                RAM                 -    256 MB(min)
·                Hard Disk         -   20 GB
·                Floppy Drive    -    1.44 MB
·                Key Board        -    Standard Windows Keyboard
·                Mouse               -    Two or Three Button Mouse
·                Monitor             -    SVGA

SOFTWARE REQUIREMENTS:-

·                Operating System      :Android OS             
·                Front End                  : JAVA
·                Database                  : SqLite
·                Tool                           :Eclipse

REFERENCES
Pi-Cheng Hsiu, Chih-Chuan Cheng “Extend Your Journey: Considering Signal Strength and Fluctuation in Location-Based Applications” IEEE/ACM Transactions on Networking, Volume:23,  Issue: 2  February  2014.

User-Defined Privacy Grid System for Continuous Location-Based Services


ABSTRACT
Location-based services (LBS) require users to continuously report their location to a potentially untrusted server to obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques for LBS have several limitations, such as requiring a fully - trusted third party, offering limited privacy guarantees and incurring high communication overhead. In this paper, we propose a user-defined privacy grid system called dynamic grid system (DGS); the first holistic system that fulfills four essential requirements for privacy-preserving snapshot and continuous LBS. (1) The system only requires a semi-trusted third party, responsible for carrying out simple matching operations correctly. This semi-trusted third party does not have any information about a user’s location. (2) Secure snapshot and continuous location privacy is guaranteed under our defined adversary models. (3) The communication cost for the user does not depend on the user’s desired privacy level, it only depends on the number of relevant points of interest in the vicinity of the user. (4) Although we only focus on range and k-nearest-neighbor queries in this work, our system can be easily extended to support other spatial queries without changing the algorithms run by the semi-trusted third party and the database server, provided the required search area of a spatial query can be abstracted into spatial regions. Experimental results show that our DGS is more efficient than the state-of-the-art privacy-preserving technique for continuous LBS.
AIM
The aim of this paper is propose a user-defined privacy grid system called dynamic grid system (DGS); the first holistic system that fulfills four essential requirements for privacy-preserving snapshot and continuous LBS
SCOPE
The scope of this paper is show that our DGS is more efficient than the state-of-the-art privacy-preserving technique for continuous LBS.
EXISTING SYSTEM
LBS can be very valuable and as such users should be able to make use of them without having to give up their location privacy. A number of approaches have recently been proposed for preserving the user location privacy in LBS. In general, these approaches can be classified into two main categories.
·      Fully-trusted third party (TTP).
·      Privacy leakage.
·      Service termination
DISADVANTAGES
·      Requiring a fully - trusted third party
·      Offering limited privacy guarantees
·      Incurring high communication overhead
PROPOSED SYSTEM
In this project,  propose a user-defined privacy grid system called dynamic grid system (DGS) to provide privacy-preserving snapshot and continuous LBS. The main idea is to place a semitrusted third party, termed query server (QS), between the user and the service provider (SP). QS only needs to be semi-trusted because it will not collect/store or even have access to any user location information. Semi-trusted in this context means that while QS will try to determine the location of a user, it still correctly carries out the simple matching operations required in the protocol, i.e., it does not modify or drop messages or create new messages. An untrusted QS would arbitrarily modify and drop messages as well as inject fake messages, which is why our system depends on a semi-trusted QS.
ADVANTAGES
·      The system only requires a semi-trusted third party, responsible for carrying out simple matching operations correctly. This semi-trusted third party does not have any information about a user’s location.
·      The communication cost for the user does not depend on the user’s desired privacy level, it only depends on the number of relevant points of interest in the vicinity of the user

SYSTEM ARCHITECTURE
        


SYSTEM CONFIGURATION

HARDWARE REQUIREMENTS:-

·                Processor          -   Pentium –III

·                Speed                -    1.1 Ghz
·                RAM                 -    256 MB(min)
·                Hard Disk         -   20 GB
·                Floppy Drive    -    1.44 MB
·                Key Board                 -    Standard Windows Keyboard
·                Mouse               -    Two or Three Button Mouse
·                Monitor             -    SVGA

SOFTWARE REQUIREMENTS:-

·                Operating System      :Android OS             
·                Front End                  : JAVA
·                Database                  : SqLite
·                Tool                           :Eclipse


REFERENCES
Chow, C. ; Huang, Q. ; Wong, D. ; Schlegel, R “USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES” Mobile Computing, IEEE Transactions on  (Volume:PP ,  Issue: 99 ) January 2015

User Privacy and Data Trustworthiness in Mobile Crowd Sensing

ABSTRACT
Smart phones and other trendy mobile wearable devices are rapidly becoming the dominant sensing, computing and communication devices in peoples’ daily lives. Mobile crowd sensing is an emerging technology based on the sensing and networking capabilities of such mobile wearable devices. MCS has shown great potential in improving peoples’ quality of life, including healthcare and transportation, and thus has found a wide range of novel applications. However, user privacy and data trustworthiness are two critical challenges faced by MCS. In this article, we introduce the architecture of MCS and discuss its unique characteristics and advantages over traditional wireless sensor networks, which result in inapplicability of most existing WSN security solutions. Furthermore, we summarize recent advances in these areas and suggest some future research directions.
AIM
The aim of this paper is we introduce the architecture of MCS and discuss its unique characteristics and advantages over traditional wireless sensor networks, which result in inapplicability of most existing WSN security solutions
SCOPE
The scope of this paper is user privacy and data trustworthiness are two critical challenges faced by MCS.
EXISTING SYSTEM
MCS can provide fine grained monitoring of interested parameters without setting up the sensing infrastructure beforehand. Moreover, with the proliferation of mobile wearable devices and the ubiquity of wireless broadband connections, MCS can operate in an environment which is not feasible or economical for WSNs. Second, since mobile wearable devices have much more resources than sensor nodes in terms of computing power, memory, and energy, more requirements can be met by MCS applications. Third, sensing devices in MCS are mobile in nature. Therefore, they can collect spatio-temporal data in a much easier way than traditional WSNs. Fourth, the sensing process is more intelligent as participants can take control of the sensing process. Fifth, sometimes WSNs have high installation and maintenance cost, and possibly insufficient node coverage. However, as MCS leverages existing sensing devices and communication infrastructure, there is virtually no establishment cost.
DISADVANTAGES
  1. User privacy
  2. Data trustworthiness
PROPOSED SYSTEM
In this project, Although a lot of research and development activities on MCS have taken place, they mainly focus on new applications and the solution of data collection. There are a number of other issues that need to be addressed. Among these are user privacy and data trustworthiness. As MCS applications involve data collection across wide geographical areas, spatial-temporal information is invariably associated with the data uploaded by participants. This imposes possible threats to user privacy because the collected data may disclose their locations and trajectories. Other possible privacy invasions include recording intimate discussions and capturing private scenes. Such threats would discourage people from becoming participants in MCS. Since altruistic data collection is a critical element of MCS, this issue of privacy invasion needs to be addressed immediately before the success of MCS is explored further. Another security issue of MCS is the reliability of the uploaded data. As data are reported by participants, they could possibly be falsified. Hence, this raises the issue of data trustworthi-ness. Furthermore, this issue inherently conflicts with the privacy issue. This is because if participants’ identities are not disclosed, those participants reporting falsified or even fabricated data cannot be identified and eliminated. In other words, if full anonymity is provided to MCS participants, guaranteeing the trustworthiness of reported data is difficult. Hence, data trustworthiness in MCS becomes more crucial than in traditional wireless sensor networks (WSNs), which deploy a large number of wireless sensor devices managed by the network owner.
ADVANTAGES
·      Protecting the data trustworthiness counteracts the mechanisms for preserving privacy.
·      A good privacy-preserving reputation system for MCS should consider the link ability exposed by reputation values
SYSTEM ARCHITECTURE
        

SYSTEM CONFIGURATION

HARDWARE REQUIREMENTS:-

·                Processor          -   Pentium –III

·                Speed                -    1.1 Ghz
·                RAM                 -    256 MB(min)
·                Hard Disk         -   20 GB
·                Floppy Drive    -    1.44 MB
·                Key Board                 -    Standard Windows Keyboard
·                Mouse               -    Two or Three Button Mouse
·                Monitor             -    SVGA

SOFTWARE REQUIREMENTS:-

·                Operating System      :Android OS             
·                Front End                  : JAVA
·                Database                  : SqLite
·                Tool                           :Eclipse

REFERENCES
Suarez-Tangil, G.,Tapiador, J.E. ; Lombardi, F. ; Di Pietro, R. “ALTERDROID: Differential Fault Analysis of Obfuscated Smartphone Malware”, IEEE Transactions on Mobile Computing Volume PP ,  Issue 99  June 2015