SlideShare a Scribd company logo
1 of 3
Download to read offline
@ IJTSRD | Available Online @ www.ijtsrd.com
ISSN No: 2456
International
Research
Security and Privacy Enhancement Framework
for Mobile Devices
S Udith Narayanan, P Vignesh, T Manigandan
Department of Co
G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu, India
ABSTRACT
The techniques we used to develop and
separation of enterprise content and personal data on
an end-user's device. Although the enterprise manages
the environment in which work-related activities are
conducted, referred to as a work person
applications installed on the mobile devices may
make the enterprise content vulnerable to misuse or
exfiltration.An application restriction policy is
configured through our Application Restriction
Manager (ARM) Policy Manager that allows one to
set different restrictions for each installed application.
Our approach, that we refer to as DroidARM, focuses
on post-installation application restriction policies.
Such policies dynamically restrict the capabilities of
mobile applications at run-time. An application
restriction policy is configured through our
Application Restriction Manager (ARM) Policy
Manager that allows one to set different restrictions
for each installed application. Adhering to the policy,
our ARM system limits the capabilities of an
application by restricting access to data and system
resources contained within the work persona. Data
shadowing is a data and system resource protection
technique we have chosen to leverage. We have
implemented DroidARM and integrated it into the
Android operating system. Our experimental
show that our approach is efficient and effective.
Keywords: Text, application usage, web browsing,
and location
I. INTRODUCTION
Main objective of this project is to Mobile Android
applications often have access to sensitive data and
resources on the user device. Misuse of this data by
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
Security and Privacy Enhancement Framework
for Mobile Devices using Active Authentication
S Udith Narayanan, P Vignesh, T Manigandan
Department of Computer Science and Engineering,
G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu, India
and to ensure the
separation of enterprise content and personal data on
user's device. Although the enterprise manages
related activities are
conducted, referred to as a work persons third-party
he mobile devices may
make the enterprise content vulnerable to misuse or
An application restriction policy is
configured through our Application Restriction
Manager (ARM) Policy Manager that allows one to
nstalled application.
Our approach, that we refer to as DroidARM, focuses
installation application restriction policies.
Such policies dynamically restrict the capabilities of
time. An application
nfigured through our
Application Restriction Manager (ARM) Policy
Manager that allows one to set different restrictions
for each installed application. Adhering to the policy,
our ARM system limits the capabilities of an
o data and system
resources contained within the work persona. Data
shadowing is a data and system resource protection
technique we have chosen to leverage. We have
implemented DroidARM and integrated it into the
Android operating system. Our experimental results
show that our approach is efficient and effective.
pplication usage, web browsing,
Main objective of this project is to Mobile Android
applications often have access to sensitive data and
resources on the user device. Misuse of this data by
malicious applications may result in privacy breaches
and sensitive data leakage. In our paper,
sensor positioning techniques to retrieve the location
of the device. In addition to these techniques, we also
set the restrictions of mobile device in login sessions
and message passing system to admin control
introduced the design of our a
describing the components of our access control
framework with the corresponding role of its entities.
II. RELATED WORKS
The sampling error, question wording and practical
difficulties in conducting telephone surveys may
introduce some error or bias into the findings of
opinion polls.“M. Duggan, “Cell phone activities
2013,” PewResearchCenter, Washington, DC, USA,
2013”. Andreas Saltos, Daniel Smith, Kristin
Schreiber, Sarah Lichenstein, Richard Lichenstein
(Corresponding author), May 26, 20
Safety Studies). The various potential solutions to this
problem, one promising technique is mouse dynamics,
a procedure for measuring and assessing a user’s
mouse behavioral characteristics for use as a
biometric.“On the Effectiveness and Ap
Mouse Dynamics Biometric for Static Authentication:
A Benchmark Study”.Chao Shen Zhongmin Cai1,
Xiaohong Guan Jialin Wang ,In
ICB, 2012.The special-character placeholders, some
features capture aspects of computer.org/I
user’s style usually not found in standard authorship
problem settings. “Decision fusion for multimodal
active authentication”.A. Fridman
Professional july 2013. As a result of this, not only
phone numbers and addresses are stor
Apr 2018 Page: 1196
6470 | www.ijtsrd.com | Volume - 2 | Issue – 3
Scientific
(IJTSRD)
International Open Access Journal
Security and Privacy Enhancement Framework
sing Active Authentication
G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu, India
malicious applications may result in privacy breaches
and sensitive data leakage. In our paper, we rely on
sensor positioning techniques to retrieve the location
of the device. In addition to these techniques, we also
set the restrictions of mobile device in login sessions
and message passing system to admin control .We
introduced the design of our architecture through
describing the components of our access control
framework with the corresponding role of its entities.
The sampling error, question wording and practical
difficulties in conducting telephone surveys may
r or bias into the findings of
opinion polls.“M. Duggan, “Cell phone activities
2013,” PewResearchCenter, Washington, DC, USA,
2013”. Andreas Saltos, Daniel Smith, Kristin
Schreiber, Sarah Lichenstein, Richard Lichenstein
(Corresponding author), May 26, 2015(Journal of
Safety Studies). The various potential solutions to this
problem, one promising technique is mouse dynamics,
a procedure for measuring and assessing a user’s
mouse behavioral characteristics for use as a
biometric.“On the Effectiveness and Applicability of
Mouse Dynamics Biometric for Static Authentication:
A Benchmark Study”.Chao Shen Zhongmin Cai1,
Xiaohong Guan Jialin Wang ,In Proc. IEEE 5th IAPR
character placeholders, some
features capture aspects of computer.org/ITPro 3 1 the
user’s style usually not found in standard authorship
problem settings. “Decision fusion for multimodal
active authentication”.A. Fridman et al, IEEE IT
As a result of this, not only
phone numbers and addresses are stored in the mobile
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1197
device but also financial information and business
details which definitely should be kept private.
“Unobtrusive User-Authentication on Mobile Phones
using Biometric Gait Recognition”.Mohammad O.
Derawi , Claudia Nickel , Patrick Bours and Christoph
Busch.In Proc. IEEE 6th Int. Conf. IIH-MSP, 2010.
III. PROPOSED SYSTEM
In this paper we have proposed the restriction system
for application, there is the application blocking that
is internal and external application want to block
through the admin panel the particular application
connectivity The Administrator has set the privileges
to access the persons. The person has no permission to
access the restriction apps. She/he cannot access the
restriction application, and the menu options with the
message passing system into admin panel , the user
want to use restriction application for emergency
purpose incase user can pass the message into the
admin panel , if it’s the valid reason then the
administrator can allow to use application for that
user. There is extra propose in this, such that the
alarm notify the system to remind if the user forget to
logout the application. When the person login the
application it will be shown in the admin and can
restrict. There are also logout options in case if the
user logout then the person device cannot control.
Fig.2 Block diagram of ARS
A. Admin panel creation:
Develop the admin panel using the localhost
(wampserver & myphpadmin) and create the default
login account for all the application user along with
restriction menus.
B. Policy Manager:
The admin can control the android application only if
the terms and conditions (policy) are accepted by the
android user.
C. Authentication:
The authentication process will be done between the
mobile device & admin panel in the login account if
and only if login is successful and gets the user
permission to access the admin panel.
D. Admin restriction system:
If the user login the account in android mobile it will
be shown in the admin panel who are logging in
&being in online list only then admin can set the
privileges for users.
CONCLUSIONS
In this paper, we proposed parallel binary decision-
level fusion architecture for classifiers based on four
biometric modalities: text, application usage, web
browsing, and location. Using this fusion method we
addressed the problem of active authentication and
characterized its performance on a real-world data set
of 200 subjects, each using their personal Android
mobile device for a period of at least 30 days.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1198
REFERENCES
1. “Biometric Authentication Using Wavelet
Probabilistic Neural Network”.Ching-Han Chen,
Ching-Yi Chen2,2013 IEEE 17th International
Symposium on Consumer Electronics (ISCE).
2. “Towards Multiple User Active Authentication
in Mobile Devices”, Mattias Andersson ,
Hironao Okada, IEEE TENCON 2013 Journal
Publication.
3. “ Extracting IM evidence of Android apps Sign
In or Purchase”,Dr. Sridhar Mandapati , Sravya
Pamidi , Sriharitha Ambati,Journal of Computer
Engineering 2015.
4. “Monitoring Temperature Changes in
Body”,Abdul Hadi H. Nograles, Felicito S.
Caluyo, IEEE INDICON 2013 Journal
Publication.
5. “Toward Writing Style Anonymization”,Akshata
V.S, Rumana Pathan, Poornima Patil, Farjana
Nadaf.International Journal of Core Engineering
and Management(IJCEM) 2014.

More Related Content

What's hot

IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection SystemIRJET Journal
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face RecognitionNanditaDutta4
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence Athari_1996
 
Attribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesAttribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesIJCSIS Research Publications
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...IRJET Journal
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesCSCJournals
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSIJNSA Journal
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEMIMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEMAM Publications,India
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition SystemIRJET Journal
 
IRJET- Travel Sequence Application
IRJET- Travel Sequence ApplicationIRJET- Travel Sequence Application
IRJET- Travel Sequence ApplicationIRJET Journal
 
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET Journal
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
 

What's hot (17)

IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection System
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Business Intelligence
Business Intelligence Business Intelligence
Business Intelligence
 
Attribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android SmartphonesAttribute-based Permission Model for Android Smartphones
Attribute-based Permission Model for Android Smartphones
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
 
Biometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris FeaturesBiometric Authentication Based on Hash Iris Features
Biometric Authentication Based on Hash Iris Features
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEMIMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
IMPLEMENT FINGERPRINT AUTHENTICATION FOR EMPLOYEE AUTOMATION SYSTEM
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
IRJET- Travel Sequence Application
IRJET- Travel Sequence ApplicationIRJET- Travel Sequence Application
IRJET- Travel Sequence Application
 
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 

Similar to Security and Privacy Enhancement Framework for Mobile Devices using Active Authentication

Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniquesgerogepatton
 
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESijaia
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection SystemIRJET Journal
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine LearningIRJET Journal
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisIRJET Journal
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesIRJET Journal
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET Journal
 
Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1lverb
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningIRJET Journal
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET Journal
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSBRNSSPublicationHubI
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification ToolIRJET Journal
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...IRJET Journal
 
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET Journal
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’seSAT Journals
 

Similar to Security and Privacy Enhancement Framework for Mobile Devices using Active Authentication (20)

Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
 
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUESBEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 
Android Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and DefensesAndroid Security: A Survey of Security Issues and Defenses
Android Security: A Survey of Security Issues and Defenses
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
 
Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1Technology overview of_mobil_247134-1
Technology overview of_mobil_247134-1
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
 
O1803017981
O1803017981O1803017981
O1803017981
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
 
Permission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OSPermission based malware detection by using k means algorithm in Android OS
Permission based malware detection by using k means algorithm in Android OS
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification Tool
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
 
IRJET- UID Secure Travel Identity
IRJET- UID Secure Travel IdentityIRJET- UID Secure Travel Identity
IRJET- UID Secure Travel Identity
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 

Security and Privacy Enhancement Framework for Mobile Devices using Active Authentication

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com ISSN No: 2456 International Research Security and Privacy Enhancement Framework for Mobile Devices S Udith Narayanan, P Vignesh, T Manigandan Department of Co G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu, India ABSTRACT The techniques we used to develop and separation of enterprise content and personal data on an end-user's device. Although the enterprise manages the environment in which work-related activities are conducted, referred to as a work person applications installed on the mobile devices may make the enterprise content vulnerable to misuse or exfiltration.An application restriction policy is configured through our Application Restriction Manager (ARM) Policy Manager that allows one to set different restrictions for each installed application. Our approach, that we refer to as DroidARM, focuses on post-installation application restriction policies. Such policies dynamically restrict the capabilities of mobile applications at run-time. An application restriction policy is configured through our Application Restriction Manager (ARM) Policy Manager that allows one to set different restrictions for each installed application. Adhering to the policy, our ARM system limits the capabilities of an application by restricting access to data and system resources contained within the work persona. Data shadowing is a data and system resource protection technique we have chosen to leverage. We have implemented DroidARM and integrated it into the Android operating system. Our experimental show that our approach is efficient and effective. Keywords: Text, application usage, web browsing, and location I. INTRODUCTION Main objective of this project is to Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal Security and Privacy Enhancement Framework for Mobile Devices using Active Authentication S Udith Narayanan, P Vignesh, T Manigandan Department of Computer Science and Engineering, G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu, India and to ensure the separation of enterprise content and personal data on user's device. Although the enterprise manages related activities are conducted, referred to as a work persons third-party he mobile devices may make the enterprise content vulnerable to misuse or An application restriction policy is configured through our Application Restriction Manager (ARM) Policy Manager that allows one to nstalled application. Our approach, that we refer to as DroidARM, focuses installation application restriction policies. Such policies dynamically restrict the capabilities of time. An application nfigured through our Application Restriction Manager (ARM) Policy Manager that allows one to set different restrictions for each installed application. Adhering to the policy, our ARM system limits the capabilities of an o data and system resources contained within the work persona. Data shadowing is a data and system resource protection technique we have chosen to leverage. We have implemented DroidARM and integrated it into the Android operating system. Our experimental results show that our approach is efficient and effective. pplication usage, web browsing, Main objective of this project is to Mobile Android applications often have access to sensitive data and resources on the user device. Misuse of this data by malicious applications may result in privacy breaches and sensitive data leakage. In our paper, sensor positioning techniques to retrieve the location of the device. In addition to these techniques, we also set the restrictions of mobile device in login sessions and message passing system to admin control introduced the design of our a describing the components of our access control framework with the corresponding role of its entities. II. RELATED WORKS The sampling error, question wording and practical difficulties in conducting telephone surveys may introduce some error or bias into the findings of opinion polls.“M. Duggan, “Cell phone activities 2013,” PewResearchCenter, Washington, DC, USA, 2013”. Andreas Saltos, Daniel Smith, Kristin Schreiber, Sarah Lichenstein, Richard Lichenstein (Corresponding author), May 26, 20 Safety Studies). The various potential solutions to this problem, one promising technique is mouse dynamics, a procedure for measuring and assessing a user’s mouse behavioral characteristics for use as a biometric.“On the Effectiveness and Ap Mouse Dynamics Biometric for Static Authentication: A Benchmark Study”.Chao Shen Zhongmin Cai1, Xiaohong Guan Jialin Wang ,In ICB, 2012.The special-character placeholders, some features capture aspects of computer.org/I user’s style usually not found in standard authorship problem settings. “Decision fusion for multimodal active authentication”.A. Fridman Professional july 2013. As a result of this, not only phone numbers and addresses are stor Apr 2018 Page: 1196 6470 | www.ijtsrd.com | Volume - 2 | Issue – 3 Scientific (IJTSRD) International Open Access Journal Security and Privacy Enhancement Framework sing Active Authentication G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu, India malicious applications may result in privacy breaches and sensitive data leakage. In our paper, we rely on sensor positioning techniques to retrieve the location of the device. In addition to these techniques, we also set the restrictions of mobile device in login sessions and message passing system to admin control .We introduced the design of our architecture through describing the components of our access control framework with the corresponding role of its entities. The sampling error, question wording and practical difficulties in conducting telephone surveys may r or bias into the findings of opinion polls.“M. Duggan, “Cell phone activities 2013,” PewResearchCenter, Washington, DC, USA, 2013”. Andreas Saltos, Daniel Smith, Kristin Schreiber, Sarah Lichenstein, Richard Lichenstein (Corresponding author), May 26, 2015(Journal of Safety Studies). The various potential solutions to this problem, one promising technique is mouse dynamics, a procedure for measuring and assessing a user’s mouse behavioral characteristics for use as a biometric.“On the Effectiveness and Applicability of Mouse Dynamics Biometric for Static Authentication: A Benchmark Study”.Chao Shen Zhongmin Cai1, Xiaohong Guan Jialin Wang ,In Proc. IEEE 5th IAPR character placeholders, some features capture aspects of computer.org/ITPro 3 1 the user’s style usually not found in standard authorship problem settings. “Decision fusion for multimodal active authentication”.A. Fridman et al, IEEE IT As a result of this, not only phone numbers and addresses are stored in the mobile
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1197 device but also financial information and business details which definitely should be kept private. “Unobtrusive User-Authentication on Mobile Phones using Biometric Gait Recognition”.Mohammad O. Derawi , Claudia Nickel , Patrick Bours and Christoph Busch.In Proc. IEEE 6th Int. Conf. IIH-MSP, 2010. III. PROPOSED SYSTEM In this paper we have proposed the restriction system for application, there is the application blocking that is internal and external application want to block through the admin panel the particular application connectivity The Administrator has set the privileges to access the persons. The person has no permission to access the restriction apps. She/he cannot access the restriction application, and the menu options with the message passing system into admin panel , the user want to use restriction application for emergency purpose incase user can pass the message into the admin panel , if it’s the valid reason then the administrator can allow to use application for that user. There is extra propose in this, such that the alarm notify the system to remind if the user forget to logout the application. When the person login the application it will be shown in the admin and can restrict. There are also logout options in case if the user logout then the person device cannot control. Fig.2 Block diagram of ARS A. Admin panel creation: Develop the admin panel using the localhost (wampserver & myphpadmin) and create the default login account for all the application user along with restriction menus. B. Policy Manager: The admin can control the android application only if the terms and conditions (policy) are accepted by the android user. C. Authentication: The authentication process will be done between the mobile device & admin panel in the login account if and only if login is successful and gets the user permission to access the admin panel. D. Admin restriction system: If the user login the account in android mobile it will be shown in the admin panel who are logging in &being in online list only then admin can set the privileges for users. CONCLUSIONS In this paper, we proposed parallel binary decision- level fusion architecture for classifiers based on four biometric modalities: text, application usage, web browsing, and location. Using this fusion method we addressed the problem of active authentication and characterized its performance on a real-world data set of 200 subjects, each using their personal Android mobile device for a period of at least 30 days.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1198 REFERENCES 1. “Biometric Authentication Using Wavelet Probabilistic Neural Network”.Ching-Han Chen, Ching-Yi Chen2,2013 IEEE 17th International Symposium on Consumer Electronics (ISCE). 2. “Towards Multiple User Active Authentication in Mobile Devices”, Mattias Andersson , Hironao Okada, IEEE TENCON 2013 Journal Publication. 3. “ Extracting IM evidence of Android apps Sign In or Purchase”,Dr. Sridhar Mandapati , Sravya Pamidi , Sriharitha Ambati,Journal of Computer Engineering 2015. 4. “Monitoring Temperature Changes in Body”,Abdul Hadi H. Nograles, Felicito S. Caluyo, IEEE INDICON 2013 Journal Publication. 5. “Toward Writing Style Anonymization”,Akshata V.S, Rumana Pathan, Poornima Patil, Farjana Nadaf.International Journal of Core Engineering and Management(IJCEM) 2014.