skip to main content
10.1145/2245276.2232012acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Constroid: data-centric access control for android

Published:26 March 2012Publication History

ABSTRACT

We introduce Constroid, a data-centric security policy management framework for Android. It defines a new middleware which allows the developer to specify well defined data items of fine granularity. For these data items, Constroid administrates security policies which are based on the usage control model. They can only be modified by the user of an application not by the applications itself. We use Con-stroid's middle-ware to protect the security policies, ensure consistency between a data item and its corresponding security policy, and describe how our prototype implementation can enforce a subset of possible usage control policies. In this way, our contribution shows how we overcome the rigid API-driven approach to security in Android. The structure and implementation of our framework is presented and discussed in terms of security, performance, and usability.

References

  1. Apple Inc. Core Data Tutorial for iOS. Available at: http://developer.apple.com/library/ios/. June 2011.Google ScholarGoogle Scholar
  2. Apple Inc. Security Overview. Technical report, Cupertino, CA, USA, July 2010.Google ScholarGoogle Scholar
  3. A. Castrucci, F. Martinelli, P. Mori, and F. Roperti. Enhancing Java ME Security Support with Resource Usage Monitoring. In 10th International Conference on Information and Communications Security, volume 5308, pages 256--266, Birmingham, UK, October 2008. Springer-Verlag Berlin Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. G. Costa, A. Lazouski, N. Dragoni, R. Saadi, and D. Ingegneria. Security-by-Contract-with-Trust for Mobile Devices. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA), 1(4): 75--91, December 2010.Google ScholarGoogle Scholar
  5. L. Desmet, W. Joosen, F. Massacci, P. Philippaerts, F. Piessens, I. Siahaan, and D. Vanoverberghe. Security-by-contract on the .NET platform. Information Security Technical Report, 13(1): 25--32, January 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of OSDI 2010, pages 1--6, Vancouver, BC, USA, October 2010. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. W. Enck, M. Ongtang, and P. McDaniel. On lightweight mobile phone application certification. In Proceedings of the 16th ACM conference on Computer and communications security, pages 235--245, New York, NY, USA, 2009. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Enck, M. Ongtang, and P. McDaniel. Understanding Android Security. IEEE Security & Privacy Magazine, 7(1): 50--57, January 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. C. Heath. Symbian OS Platform Security, Software Development Using the Symbian OS Security Architecture. John Wiley & Sons Ltd., 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Liu, M. D. George, K. Vikram, L. Waye, and A. C. Myers. Fabric: A Platform for Secure Distributed Computation and Storage. In 22nd ACM Symposium on Operating Systems Principles, pages 312--334, Big Sky, MT, USA, October 2009. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Microsoft Corporation. Windows Phone 7 Security Model. Technical report, December 2010.Google ScholarGoogle Scholar
  12. S. Nair, P. Simpson, B. Crispo, and A. Tanenbaum. A Virtual Machine Based Information Flow Control System for Policy Enforcement. Electronic Notes in Theoretical Computer Science, 197(1): 3--16, February 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Nair, P. Simpson, B. Crispo, and A. Tanenbaum. Trishul: A Policy Enforcement Architecture for Java Virtual Machines. Technical report, Vrije Universiteit, Amsterdam, Netherlands, 2008.Google ScholarGoogle Scholar
  14. S. Nair, A. Tanenbaum, G. Gheorghe, and B. Crispo. Enforcing DRM policies across applications. In Proceedings of the 8th ACM workshop on Digital rights management - DRM '08, page 87, New York, New York, USA, 2008. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Nauman, S. Khan, and X. Zhang. Apex: Extending Android Permission Model and Enforcement with User-defined Runtime Constraints. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pages 328--332, Beijing, China, 2010. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. Ongtang, K. Butler, and P. McDaniel. Porscha: Policy Oriented Secure Content Handling in Android. In Proceedings of the 26th Annual Computer Security Applications Conference, New York, NY, USA, December 2010. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically Rich Application-Centric Security in Android. In 2009 Annual Computer Security Applications Conference, pages 340--349. IEEE Computer Society, December 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. J. Park and R. Sandhu. The UCONABC usage control model. ACM Transactions on Information and System Security, 7(1): 128--174, February 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Philippaerts. Security of Software on Mobile Devices. PhD thesis, Department of Computer Science, Faculty of Engineering, Leuven, Belgium, October 2010.Google ScholarGoogle Scholar
  20. Research in Motion Ltd. BlackBerry Enterprise Solution, Security Technical Overview for BlackBerry Enterprise Server Version 4.1 Service Pack 6 and BlackBerry Device Software Version 4.6. Technical report, Canada, March 2009.Google ScholarGoogle Scholar
  21. R. Rogers, J. Lombardo, Z. Mednieks, and B. Meike. Android Application Development: Programming with the Google SDK. O'Reilly, Beijing, China, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Schaefer. Usage Control Reference Monitor Architecture. In Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007), pages 13--18. Ieee, July 2007.Google ScholarGoogle Scholar
  23. H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing System-Wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security, pages 116--127, New York, NY, USA, 2007. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Constroid: data-centric access control for android

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SAC '12: Proceedings of the 27th Annual ACM Symposium on Applied Computing
              March 2012
              2179 pages
              ISBN:9781450308571
              DOI:10.1145/2245276
              • Conference Chairs:
              • Sascha Ossowski,
              • Paola Lecca

              Copyright © 2012 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 26 March 2012

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              SAC '12 Paper Acceptance Rate270of1,056submissions,26%Overall Acceptance Rate1,650of6,669submissions,25%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader