3P Framework: Customizable Permission Architecture for Mobile Applications

被引:8
作者
Biswas, Sujit [1 ,2 ]
Sharif, Kashif [1 ,2 ]
Li, Fan [1 ,2 ]
Liu, Yang [3 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci, Beijing, Peoples R China
[2] Beijing Engn Res Ctr High Volume Language Informa, Beijing, Peoples R China
[3] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing, Peoples R China
来源
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017 | 2017年 / 10251卷
基金
中国国家自然科学基金;
关键词
Privacy behaviors; Mobile app privacy; Android security; Users privacy consciousness;
D O I
10.1007/978-3-319-60033-8_39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile applications & smart devices have drastically changed our routine tasks, and have become an integral part of modern society. Along with the numerous benefits we get, major challenges like privacy and safety have become complicated than before. The permission based system for mobile applications is designed to empower the user to decide which resources and information they want the application to access. Most of these permissions are granted during installation of application, but our study shows that the users make weak decisions in protecting their information. Majority of the users, even with technical backgrounds, blindly grant all permissions requested by the application even if they are not necessary for the application to run. In order to give more control to the user, and to enable them to make informed decisions regarding permission, we have proposed a Privacy Permission Policy Framework in this paper. This framework enables the user to have greater control over the permission granting while installing the mobile applications. The implementation and testing of the framework also enabled us to run forensic analysis and understand the scope of permissions requested, based on which this framework can advise the user to select minimum required permissions for the application to work. This makes the users' privacy more secure, and grants full control over the process.
引用
收藏
页码:445 / 456
页数:12
相关论文
共 21 条
[11]  
Benenson Z, 2012, FED CONF COMPUT SCI, P1179
[12]  
Chin E., 2012, P S US PRIV SEC SOUP
[13]  
Felt A.P., 2011, P 1 ACM WORKSH SEC P, DOI DOI 10.1145/2046614.2046618
[14]   The Privacy Calculus: Mobile Apps and User Perceptions of Privacy and Security [J].
Fife, Elizabeth ;
Orjuela, Juan .
INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT, 2012, 4
[15]  
Hornyack P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P639
[16]  
Lin JL, 2012, UBICOMP'12: PROCEEDINGS OF THE 2012 ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, P501
[17]  
Mueller K., 2011, IEEE S SEC PRIV
[18]   Delegate the smartphone user? Security awareness in smartphone platforms [J].
Mylonas, Alexios ;
Kastania, Anastasia ;
Gritzalis, Dimitris .
COMPUTERS & SECURITY, 2013, 34 :47-66
[19]  
Thurm S., 2010, WALLSTREET J
[20]   FakeMask: A Novel Privacy Preserving Approach for Smartphones [J].
Zhang, Lichen ;
Cai, Zhipeng ;
Wang, Xiaoming .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2016, 13 (02) :335-348