DocumentCode :
595566
Title :
A trusted ecosystem for Android applications based on context-aware access control
Author :
Herpich, M. ; Batyuk, L. ; Camtepe, S.A. ; Albayrak, Sahin
Author_Institution :
DAI-Labor, Tech. Univ. Berlin, Berlin, Germany
fYear :
2012
fDate :
16-18 Oct. 2012
Firstpage :
73
Lastpage :
78
Abstract :
Private data stored on smartphones is a precious target for malware attacks. A constantly changing environment, e.g. switching network connections, can cause unpredictable threats, and require an adaptive approach to access control. Context-based access control is using dynamic environmental information, including it into access decisions. We propose an “ecosystem-in-an-ecosystem” which acts as a secure container for trusted software aiming at enterprise scenarios where users are allowed to use private devices. We have implemented a proof-of-concept prototype for an access control framework that processes changes to low-level sensors and semantically enriches them, adapting access control policies to the current context. This allows the user or the administrator to maintain fine-grained control over resource usage by compliant applications. Hence, resources local to the trusted container remain under control of the enterprise policy. Our results show that context-based access control can be done on smartphones without major performance impact.
Keywords :
authorisation; mobile computing; operating systems (computers); smart phones; trusted computing; Android applications; adaptive approach; context-aware access control; dynamic environmental information; ecosystem-in-an-ecosystem; fine-grained control; low-level sensors; malware attacks; private data; smartphones; switching network connections; trusted container; trusted ecosystem; trusted software; Access control; Containers; Context; Sensors; Smart phones; Software;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on
Conference_Location :
Fajardo, PR
Print_ISBN :
978-1-4673-4880-5
Type :
conf
DOI :
10.1109/MALWARE.2012.6461011
Filename :
6461011
Link To Document :
بازگشت