Security and Privacy Enhancement Framework for Mobile Devices using Active Authentication

Abstract

The techniques we used to develop and to ensure the separation of enterprise content and personal data on an end-users device. Although the enterprise manages the environment in which work-related activities are conducted, referred to as a work persons third-party applications installed on the mobile devices may make the enterprise content vulnerable to misuse or exfiltration.An application restriction policy is configured through our Application Restriction Manager (ARM) Policy Manager that allows one to set different restrictions for each installed application. Our approach, that we refer to as DroidARM, focuses on post-installation application restriction policies. Such policies dynamically restrict the capabilities of mobile applications at run-time. An application restriction policy is configured through our Application Restriction Manager (ARM) Policy Manager that allows one to set different restrictions for each installed application. Adhering to the policy, our ARM system limits the capabilities of an application by restricting access to data and system resources contained within the work persona. Data shadowing is a data and system resource protection technique we have chosen to leverage. We have implemented DroidARM and integrated it into the Android operating system. Our experimental results show that our approach is efficient and effective. S Udith Narayanan | P Vignesh | T Manigandan"Security and Privacy Enhancement Framework for Mobile Devices using Active Authentication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11175.pdf http://www.ijtsrd.com/engineering/computer-engineering/11175/security-and-privacy-enhancement-framework-for-mobile-devices-using-active-authentication/s-udith-narayanan

Authors and Affiliations

Keywords

Related Articles

Synchronization and Reactive Current Support of PMSG Based Wind Farm during Severe Grid Fault

Grid codes require wind farm to remain on grid and inject specific reactive current when grid fault occurs. To satisfy the requirements, reactive power devices such as the static synchronous compensator STATCOM are usual...

Flexible Antennadesign for Wave Applications

In this paper, a three dimensional compact antenna is designed for the automotive industry is proposed. The Antenna is designed by using the flexible substrate that can fix on the top layer of the car. The antenna can be...

Household Finance and its Effective Organization of Financial Resources

This article provides information on the effective organization of household finance, its main functions, the balance of income and expenses. The article also examines the composition of household financial resources and...

The Macrofungi in the Island of San Antonio, Northern Samar, Philippines

This study aimed primarily to identify the different macro fungi species in the Island of San Antonio, Northern Samar. Specifically, its objectives were to identify the different species of macro fungi in the study are t...

Einstein's Relativity, Simultaneity and Young's Double Slit Experiment

In the present work we have discussed the well known topic of simultaneous passing of photon through both the slit of Young double slit experiment. With the help of the example of Newton's sailor in the special theory of...

Download PDF file
  • EP ID EP359951
  • DOI -
  • Views 73
  • Downloads 0

How To Cite

(2018). Security and Privacy Enhancement Framework for Mobile Devices using Active Authentication. International Journal of Trend in Scientific Research and Development, 2(3), -. https://europub.co.uk/articles/-A-359951