A SECURITY APPLICATION WITH AUTO-SWITCHING PROFILE MANAGER AND SECURE SMS TRANSACTION
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 2
Abstract
Mobile phone security has become more important in the mobile computing applications. Most data breaches on the mobile devices are typically due to basic security failure, such as weak passwords, data encryption failure and application software vulnerabilities. This paper proposes the Streamlined and Efficient Integrity Protection (SEIP) for the effective protection of mobile devices. The SEIP is implemented by utilizing the malware detection using security policy, permission viewer of mobile apps, memory read and write options, secure SMS transactions and security policy manager. The proposed SEIP can prevent major types of attacks towards system integrity through mobile malware. The security profile manager blocks the mobile app from accessing the internet and other permission, based on the security policy.If the security policy is enabled, permission is blocked and the internet connection is disabled. If the security policy is not enabled, the internet connection is enabled.The experimental result of the proposed SEIP,shows low overhead when compared to PC counterpart technology. The size of the security policy is less than 20 KB and requires less than 10 domains and types. The SEIP can be used within a commercially available Linux-based smart phone.
Authors and Affiliations
Suganya P. , Mary Praveena J
SECURE PRIVACY PRESERVING TECHNIQUES IN SMART PHONES : A REVIEW
The context aware applications are blooming with increasing the popularity of smartphones with sensors, these sensor applications arises the privacy is the major challenging issue because users...
AN EFFECTIVE ATTACK ELIMINATION METHOD FOR TOP-K QUERY PROCESSING IN MANETS
The query processing in mobile ad hoc network (MANETs) is optimized using top K-query concepts but this process in affected by the presence of malicious nodes in the environment where it ma...
A SURVEY ON REDUNDANT ELIMINATION [RE] PROTOCOL FOR AVOID COLLUSION ATTACK VIDEO DELIVERY
Now a days video delivery is the major challenging issue because during the time of video access arises the various issues such as the collusion attack, redundant traffic and security problem. Ou...
HIGH SPEED AND LOW POWER CMOS TECHNOLOGY BASED RAM-CAM MEMORY DESIGN
ontent-Addressable Memory (CAM) is a special type of memory, which is used in very-high speed searching applications. The other names of CAM are the associative memory, associative storage and the assoc...
REAL TIME SECTIONALIZATION OF ENHANCED SHARPNESS VIDEO USING FPGA
Background Identification is a general feature in many video privilege systems. Gaussian Mixture Models (GMM) is one of the popular fashionable and winning approaches to complete Background identification...