Abstract
In this paper, we propose a context-based framework for eliciting context information and adapting this information with mobile applications network access decision mechanism. The framework leverages the execution of mobile applications inside a sandbox to control the communication between mobile applications and mobile device resources. Applications’ access requests are analyzed based on user’s context information collected from the mobile device sensors and the application network access configuration. We validate our proposed framework in Android Operating System running on handheld smartphone devices. Preliminary results revealed the efficacy of our proposed context-based framework in providing network access control management based on users’ context information at run-time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Fischer, G.: Context-aware systems—the ʻRightʼ information, at the ʻRightʼ time, in the ʻRightʼ place, in the ʻRightʼ way, to the ʻRightʼ person. In: AVI 2012, Capri Island, Italy (2012)
Almuhimed, H., et al.: Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In: Proceeding CHI 2015 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, New York (2015)
Tu, G.-H., et al.: Accounting for roaming users on mobile data access issues and root causes. In: Proceeding of the 11th Annual International Conference on Mobile Systems, Applications and Services. ACM (2013)
Fu, H., et al.: A field study of run-time location access disclosures on android smartphones. In: USEC 2014. Internet Society (2014)
Ferreira, D., et al.: Securacy: an empirical investigation of android applications’ network usage, privacy and security. In: WiSec 2015, New York (2015)
Distefano, A., et al.: Securemydroid: enforcing security in the mobile devices lifecycle. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, ser. CSIIRW 2010. ACM, New York (2010)
Hornyack, P., et al.: These aren’t the droids you’re looking for: retrofitting android to protect data from imperious applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. CCS 2011. ACM, New York (2011)
Balebako, R., et al.: Little brothers watching you: raising awareness of data leaks on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, ser. SOUPS 2013. ACM – Association for Computing Machinery (2013)
Rastogi, V., Chen, Y., Enck, W.: Appsplayground: automatic security analysis of smartphone applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. ACM (2013)
Mowafi, Y., et al.: A context-aware adaptive security framework for mobile computing applications. In: the 4th International Workshop on Context Aware Middleware for Ubiquitous Environments (PerCAM 2014), UAE, Dubai (2014)
Dyer, J.S., et al.: Multiple criteria decision making, multiattribute utility theory: the next ten years. Manag. Sci. 38(5), 645–654 (1992)
Rosenbloom, E.S.: A probabilistic interpretation of the final rankings in AHP. Eur. J. Oper. Res. 96(2), 371–378 (1997)
Koumoto, Y., Nonaka, H., Yanagida, T.: A proposal of context-aware service composition method based on analytic hierarchy process. In: Nakamatsu, K., Phillips-Wren, G., Jain, L.C., Howlett, R.J. (eds.) New Advances in Intelligent Decision Technologies. SCI, vol. 199, pp. 65–71. Springer, Heidelberg (2009)
Cocea, M., Magoulas, G.: Context-dependent personalised feedback prioritisation in exploratory learning for mathematical generalisation. In: Houben, G.-J., McCalla, G., Pianesi, F., Zancanaro, M. (eds.) UMAP 2009. LNCS, vol. 5535, pp. 271–282. Springer, Heidelberg (2009)
Chen, D.-N., et al.: A Web-based personalized recommendation system for mobile phone selection: design, implementation, and evaluation. Expert Syst. Appl. 37(12), 8201–8210 (2010)
Saaty, T.L.: Decision Making for Leaders: The Analytic Hierarchy Process for Decisions in a Complex World. RWS Publications, Pittsburgh (1999)
Enck, W., et al.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI 2010. USENIX Association, Berkeley (2010)
Kelley, P.G., Cranor, L.F., Sadeh, N.: Privacy as part of the app decision-making process. In: CHI 2013 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York (2013)
Arzt, S., et al.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: Proceedings of the 35th Annual ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014) (2014)
Felt, A., et al.: Android permissions: user attention, comprehension, and behavior. In: SOUPS 2012 Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, New York (2012)
Fischer, K., Karsch, S.: Modelling security relevant context an approach towards adaptive security in volatile mobile web environments. In: International Conference on Web Science, Germany, Koblenz (2011)
Hayashi, E., et al.: CASA: context-aware scalable authentication. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, ser. SOUPS 2013. ACM, New York (2013)
Gupta, A., et al.: Intuitive security policy configuration in mobile devices using context profiling. In: Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust, ser. SOCIALCOM-PASSAT 2012. IEEE Computer Society, Washington (2012)
Bai, G., Gu, L., Feng, T., Guo, Y., Chen, X.: Context-aware usage control for android. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 326–343. Springer, Heidelberg (2010)
Prakash, S., et al.: A proposed approach for mobile devices with context based access control mechanism. Int. J. Adv. Res. Comput. Sci. Technol. (IJARCST) 3(1–2), 149–150 (2015)
Shebaro, B., Oluwatimi, O., Bertino, E.: Context-based access control systems for mobile devices. IEEE Trans. Dependable Secure Comput. 12(2), 150–163 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Mowafi, Y., Alaqarbeh, T., Alazrai, R. (2016). A Context-Based Personalization for Mobile Applications’ Network Access. In: Younas, M., Awan, I., Kryvinska, N., Strauss, C., Thanh, D. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2016. Lecture Notes in Computer Science(), vol 9847. Springer, Cham. https://doi.org/10.1007/978-3-319-44215-0_34
Download citation
DOI: https://doi.org/10.1007/978-3-319-44215-0_34
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44214-3
Online ISBN: 978-3-319-44215-0
eBook Packages: Computer ScienceComputer Science (R0)