3P Framework: Customizable Permission Architecture for Mobile Applications

被引:8
作者
Biswas, Sujit [1 ,2 ]
Sharif, Kashif [1 ,2 ]
Li, Fan [1 ,2 ]
Liu, Yang [3 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci, Beijing, Peoples R China
[2] Beijing Engn Res Ctr High Volume Language Informa, Beijing, Peoples R China
[3] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
来源
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017 | 2017年 / 10251卷
基金
中国国家自然科学基金;
关键词
Privacy behaviors; Mobile app privacy; Android security; Users privacy consciousness;
D O I
10.1007/978-3-319-60033-8_39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile applications & smart devices have drastically changed our routine tasks, and have become an integral part of modern society. Along with the numerous benefits we get, major challenges like privacy and safety have become complicated than before. The permission based system for mobile applications is designed to empower the user to decide which resources and information they want the application to access. Most of these permissions are granted during installation of application, but our study shows that the users make weak decisions in protecting their information. Majority of the users, even with technical backgrounds, blindly grant all permissions requested by the application even if they are not necessary for the application to run. In order to give more control to the user, and to enable them to make informed decisions regarding permission, we have proposed a Privacy Permission Policy Framework in this paper. This framework enables the user to have greater control over the permission granting while installing the mobile applications. The implementation and testing of the framework also enabled us to run forensic analysis and understand the scope of permissions requested, based on which this framework can advise the user to select minimum required permissions for the application to work. This makes the users' privacy more secure, and grants full control over the process.
引用
收藏
页码:445 / 456
页数:12
相关论文
共 21 条
[1]  
Android S. D. K., ANDR MAN PERM API 25
[2]  
[Anonymous], 2012, Financial cryptography and data security
[3]  
[Anonymous], Number of smartphone users worldwide from 2013 to 2028
[4]  
[Anonymous], 2012, P 2 ACM WORKSHOP SEC
[5]  
[Anonymous], 2016, P 1 ACM WORKSHOP PRI
[6]  
[Anonymous], SHAR MOB PHON US US
[7]  
[Anonymous], 2011, Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, DOI [10.1145/2184489.2184500, DOI 10.1145/2184489.2184500]
[8]  
Au K. W. Y., 2012, Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, ACM, New York, NY, USA, P217, DOI 10.1145/2382196.2382222
[9]  
Balebako R., 2014, WORKSH US SEC USEC F
[10]  
Balebako R, 2013, P 9 S US PRIV SEC, DOI DOI 10.1145/2501604.2501616