Stateful Data Usage Control for Android Mobile Devices

被引:0
作者
Aliaksandr Lazouski
Fabio Martinelli
Paolo Mori
Andrea Saracino
机构
[1] Consiglio Nazionale delle Ricerche,Istituto di Informatica e Telematica
来源
International Journal of Information Security | 2017年 / 16卷
关键词
Usage control; Mobile devices; XACML; Android;
D O I
暂无
中图分类号
学科分类号
摘要
Modern mobile devices allow their users to download data from the network, such as documents or photos, to store local copies and to use them. Many real scenarios would benefit from this capability of mobile devices to easily and quickly share data among a set of users but, in case of critical data, the usage of these copies must be regulated by proper security policies. To this aim, we propose a framework for regulating the usage of data when they have been downloaded on mobile devices, i.e., they have been copied outside the producer’s domain. Our framework regulates the usage of the local copy by enforcing the Usage Control policy which has been embedded in the data by the producer. Such policy is written in UXACML, an extension of the XACML language for expressing Usage Control model-based policies, whose main feature is to include predicates which must be satisfied for the whole execution of the access to the data. Hence, the proposed framework goes beyond the traditional access control capabilities, being able to interrupt an ongoing access to the data as soon as the policy is no longer satisfied. This paper details the proposed approach, defines the architecture and the workflow of the main functionalities of the proposed framework, describes the implementation of a working prototype for Android devices, presents the related performance figures, and discusses the security of the prototype.
引用
收藏
页码:345 / 369
页数:24
相关论文
共 43 条
[1]  
Conti M(2012)Crêpe: a system for enforcing fine-grained context-related policies on android IEEE Trans. Inf. Forensics Secur. 7 1426-1438
[2]  
Crispo B(2010)Runtime monitoring for next generation Java ME platform Comput. Secur. 29 74-87
[3]  
Fernandes E(2014)TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones Commun. ACM 57 99-106
[4]  
Zhauniarovich Y(2013)A survey on security for mobile devices Commun. Surv. Tutor. IEEE 15 446-471
[5]  
Costa G(2004)The ACM Trans. Inf. Syst. Secur. 7 128-174
[6]  
Martinelli F(2005) usage control model ACM Trans. Inf. Syst. Secur. 8 351-387
[7]  
Mori P(2006)Formal model and policy specification of usage control Commun. ACM 49 39-44
[8]  
Schaefer C(2008)Distributed usage control ACM Trans. Inf. Syst. Secur. 11 3:1-3:36
[9]  
Walter T(2010)Toward a usage-based security framework for collaborative computing systems Future Gener. Comput. Syst. 26 1032-1042
[10]  
Enck W(2014)On usage control for grid systems Softw. Qual. J. 22 241-271