A SECURITY APPLICATION WITH AUTO-SWITCHING PROFILE MANAGER AND SECURE SMS TRANSACTION
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 2
Abstract
Mobile phone security has become more important in the mobile computing applications. Most data breaches on the mobile devices are typically due to basic security failure, such as weak passwords, data encryption failure and application software vulnerabilities. This paper proposes the Streamlined and Efficient Integrity Protection (SEIP) for the effective protection of mobile devices. The SEIP is implemented by utilizing the malware detection using security policy, permission viewer of mobile apps, memory read and write options, secure SMS transactions and security policy manager. The proposed SEIP can prevent major types of attacks towards system integrity through mobile malware. The security profile manager blocks the mobile app from accessing the internet and other permission, based on the security policy.If the security policy is enabled, permission is blocked and the internet connection is disabled. If the security policy is not enabled, the internet connection is enabled.The experimental result of the proposed SEIP,shows low overhead when compared to PC counterpart technology. The size of the security policy is less than 20 KB and requires less than 10 domains and types. The SEIP can be used within a commercially available Linux-based smart phone.
Authors and Affiliations
Suganya P. , Mary Praveena J
ROBUST SCENE TEXT RECOGNITION WITH SPARSE BELIEF PROPAGATION
Content-based image analysis task requires text detection in natural scene images. The character candidates in text detection on minimizing regularized variations termed as Maximally Stable Extremely Regi...
ANALYSIS OF HUMAN ACTIVITY RECOGNITION USING ACTION RECOGNITION METHODS
The labelling of image sequences with action labels is termed as human action recognition and the main goal of this process is the series observations on actions. Human activity recognition aims to make better representa...
PRIVACY POLICY FOR IMAGES IN SOCIAL NETWORK
Content sharing images within online content sharing sites, may quickly lead to unwanted disclosure and privacy violations. Further, the persistent nature of online media makes it possible for other users to...
Efficient Image Re-coloring Mechanism for Color Vision Deficient (CVD) Persons
Color blindness is the state of decreased ability to identify differences between colors. In order to help the persons having color blindness the colors in the images can be changed so that the persons can be able to rec...
CURRENT SURVEY OF WEB CONTENT MINING TECHNIQUES
Data mining is also called knowledge discovery in databases (KDD). Web Mining is the application of data mining techniques to discovery interesting patterns that can be useful from ever expanding dat...