SlideShare a Scribd company logo
1 of 9
Collaborative Policy Administration 
ABSTRACT: 
Policy-based management is a very effective method to protect sensitive 
information. However, the overclaim of privileges is widespread in emerging 
applications, including mobile applications and social network services, because 
the applications’ users involved in policy administration have little knowledge of 
policy-based management. The overclaim can be leveraged by malicious 
applications, then lead to serious privacy leakages and financial loss. To resolve 
this issue, this paper proposes a novel policy administration mechanism, referred to 
as collaborative policy administration (CPA for short), to simplify the policy 
administration. In CPA, a policy administrator can refer to other similar policies to 
set up their own policies to protect privacy and other sensitive information. This 
paper formally defines CPA and proposes its enforcement framework. 
Furthermore, to obtain similar policies more effectively, which is the key step of 
CPA, a text mining-based similarity measure method is presented. We evaluate 
CPA with the data of Android applications and demonstrate that the text mining-based 
similarity measure method is more effective in obtaining similar policies 
than the previous category-based method.
EXISTING SYSTEM: 
The traditional framework of policy-based management consists of four core 
components policy decision point (PDP), policy enforcement point (PEP), policy 
administration point (PAP), and policy repository (PR). A well-trained policy 
administrator or group will specify, verify policies in PAP, and deploy the policies 
in PR. After a system runs, PDP will retrieve applicable policies from PR and 
make decisions. PEP takes charge of the decision, such as satisfying the request 
where a subject wants to open a file (authorization action), or launching a logger to 
record system context (obligation action). The overclaim of privileges, where a not 
well-trained administrator assigns more privileges than those which are normally 
required by a subject, is an increasingly serious problem, especially when the 
method of policy-based management is applied to emerging application scenarios, 
such as mobile applications and social network services. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Application users may not know what the requested permissions mean, thus 
approving all requests because they are eager to use the application.
 User will approve all requests from third-party applications, because User 
wants to run the applications, thus falling into the traps of malicious 
applications. 
 The User leakage of their privacy. 
PROPOSED SYSTEM: 
This paper proposes collaborative policy administration (CPA). The essential idea 
of CPA is that applications with similar functionalities shall have similar policies 
that will be specified and deployed. Thus, to specify or verify policies, CPA will 
examine policies already specified by other similar applications and perform 
collaborative recommendation. The degree of similarity will be calculated by 
predefined algorithms, which could be a category-based algorithm, a text mining-based 
algorithm, novel method, enforcement framework and implement a
prototype of CPA. The framework supports two types of user interfaces and 
provides functions of collaborative policy design and collaborative policy 
verification. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Collaborative policy verification helps the end users identify malicious 
permission requests. 
 Can develop securer and more acceptable applications for end users.
SYSTEM ARCHITECTURE: 
 
Register 
Login 
Upload file 
Policy 
Administration 
User 
Set Policy 
Verify Policy
MODULES: 
 Collaborative policy design 
 Collaborative policy verification 
 Enforcement framework 
MODULES DESCRIPTION: 
Collaborative policy design 
Here, Admins refers to all involved policy administrators, including, e.g., 
developers, marketers, and end users in the Android framework. policy 
administrator Admins can obtain a refined policy set PSref according to a 
refinement function. We design the policy using the system such as a new user can 
register and logins and upload any file. The user can design the policy in it. That is 
the policy may be like download option available or not, client details view options 
such that options.
Collaborative policy verification 
A policy administrator Admins can obtain a verification result. VeriResult for a 
target policy set PStarget , which contains all polices assigned to a target subject 
SUBJS, according to a verification function. 
ENFORCEMENT FRAMEWORK 
A policy administrator can leverage the framework to administrate policies via a 
phone, web browser, or development tool. The direction of arrows is the direction 
of key data flows. The history policy base and similarity measure methods are two 
key components in the enforcement framework. To enforce CPA, the administrator 
should prepare a sufficient number of policies at first. Furthermore, collaborative 
policy design and collaborative policy verification are the two key functions 
provided by the framework. These two functions depend on the history policy base 
and similarity measure methods. After obtaining the similar policies, the two 
functions call a refinement algorithm and a verification algorithm respectively. 
Finally, collaborative policy design and collaborative policy verification will 
display the results to the administrator on various user interfaces, e.g., a phone, 
web browser, or development tool.
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
 MOBILE : ANDROID 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : Java 1.7 
 Tool Kit : Android 2.3 ABOVE 
 IDE : Eclipse
REFERENCE: 
Weili Han, Member, IEEE, Zheran Fang, Laurence Tianruo Yang, Member, IEEE, 
Gang Pan, Member, IEEE, and Zhaohui Wu, Senior Member, IEEE, 
“Collaborative Policy Administration”, IEEE TRANSACTIONS ON PARALLEL 
AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014.

More Related Content

Viewers also liked

Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...JPINFOTECH JAYAPRAKASH
 
Delay based network utility maximization
Delay based network utility maximizationDelay based network utility maximization
Delay based network utility maximizationJPINFOTECH JAYAPRAKASH
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsJPINFOTECH JAYAPRAKASH
 
CH.3: POPULATION AND TERRITORY
CH.3: POPULATION AND TERRITORYCH.3: POPULATION AND TERRITORY
CH.3: POPULATION AND TERRITORYPHAISTOS DISC
 
HIV/AIDS - Can We Turn The Tide?
HIV/AIDS - Can We Turn The Tide?HIV/AIDS - Can We Turn The Tide?
HIV/AIDS - Can We Turn The Tide?Maps of World
 
Securing class initialization in java like languages
Securing class initialization in java like languagesSecuring class initialization in java like languages
Securing class initialization in java like languagesJPINFOTECH JAYAPRAKASH
 
MITUTOYO promo soluzioni di misura scad 30-06-14
MITUTOYO promo soluzioni di misura scad 30-06-14MITUTOYO promo soluzioni di misura scad 30-06-14
MITUTOYO promo soluzioni di misura scad 30-06-14Utensileria Modenese srl
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksJPINFOTECH JAYAPRAKASH
 
First fare 2010 lab-view creating custom dashboards
First fare 2010 lab-view creating custom dashboardsFirst fare 2010 lab-view creating custom dashboards
First fare 2010 lab-view creating custom dashboardsOregon FIRST Robotics
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...JPINFOTECH JAYAPRAKASH
 
Cults, Biker Gangs, Sports Teams
Cults, Biker Gangs, Sports Teams Cults, Biker Gangs, Sports Teams
Cults, Biker Gangs, Sports Teams BOLO Conference
 
Hayden -- Mobile Super Forum
Hayden -- Mobile Super ForumHayden -- Mobile Super Forum
Hayden -- Mobile Super ForumBOLO Conference
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...JPINFOTECH JAYAPRAKASH
 
Remarketing - Heaven or hell?
Remarketing - Heaven or hell?Remarketing - Heaven or hell?
Remarketing - Heaven or hell?Sven De Meyere
 
4Ps of Business Development: Value Pricing
4Ps of Business Development: Value Pricing4Ps of Business Development: Value Pricing
4Ps of Business Development: Value PricingBOLO Conference
 
WordPress as a CMS – Why and How
WordPress as a CMS – Why and HowWordPress as a CMS – Why and How
WordPress as a CMS – Why and HowWordCamp Cape Town
 
Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...JPINFOTECH JAYAPRAKASH
 
Target tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networksTarget tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networksJPINFOTECH JAYAPRAKASH
 

Viewers also liked (20)

Promo Mitutoyo Autunno 2013
Promo Mitutoyo Autunno 2013 Promo Mitutoyo Autunno 2013
Promo Mitutoyo Autunno 2013
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
 
Delay based network utility maximization
Delay based network utility maximizationDelay based network utility maximization
Delay based network utility maximization
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
 
CH.3: POPULATION AND TERRITORY
CH.3: POPULATION AND TERRITORYCH.3: POPULATION AND TERRITORY
CH.3: POPULATION AND TERRITORY
 
HIV/AIDS - Can We Turn The Tide?
HIV/AIDS - Can We Turn The Tide?HIV/AIDS - Can We Turn The Tide?
HIV/AIDS - Can We Turn The Tide?
 
Securing class initialization in java like languages
Securing class initialization in java like languagesSecuring class initialization in java like languages
Securing class initialization in java like languages
 
MITUTOYO promo soluzioni di misura scad 30-06-14
MITUTOYO promo soluzioni di misura scad 30-06-14MITUTOYO promo soluzioni di misura scad 30-06-14
MITUTOYO promo soluzioni di misura scad 30-06-14
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networks
 
First fare 2010 lab-view creating custom dashboards
First fare 2010 lab-view creating custom dashboardsFirst fare 2010 lab-view creating custom dashboards
First fare 2010 lab-view creating custom dashboards
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
Cults, Biker Gangs, Sports Teams
Cults, Biker Gangs, Sports Teams Cults, Biker Gangs, Sports Teams
Cults, Biker Gangs, Sports Teams
 
Hayden -- Mobile Super Forum
Hayden -- Mobile Super ForumHayden -- Mobile Super Forum
Hayden -- Mobile Super Forum
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Remarketing - Heaven or hell?
Remarketing - Heaven or hell?Remarketing - Heaven or hell?
Remarketing - Heaven or hell?
 
4Ps of Business Development: Value Pricing
4Ps of Business Development: Value Pricing4Ps of Business Development: Value Pricing
4Ps of Business Development: Value Pricing
 
WordPress as a CMS – Why and How
WordPress as a CMS – Why and HowWordPress as a CMS – Why and How
WordPress as a CMS – Why and How
 
Maloney -- 4P
Maloney -- 4PMaloney -- 4P
Maloney -- 4P
 
Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...Security analysis of a privacy preserving decentralized key-policy attribute-...
Security analysis of a privacy preserving decentralized key-policy attribute-...
 
Target tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networksTarget tracking and mobile sensor navigation in wireless sensor networks
Target tracking and mobile sensor navigation in wireless sensor networks
 

Similar to Collaborative policy administration

Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...IOSR Journals
 
IRJET- Hybrid Recommendation System for Movies
IRJET-  	  Hybrid Recommendation System for MoviesIRJET-  	  Hybrid Recommendation System for Movies
IRJET- Hybrid Recommendation System for MoviesIRJET Journal
 
System analysis and_design.docx
System analysis and_design.docxSystem analysis and_design.docx
System analysis and_design.docxAlaJebnoun
 
235429094 jobportal-documentation
235429094 jobportal-documentation235429094 jobportal-documentation
235429094 jobportal-documentationsireesha nimmagadda
 
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docxONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docxcherishwinsland
 
Recommender system and big data (design a smartphone recommender system based...
Recommender system and big data (design a smartphone recommender system based...Recommender system and big data (design a smartphone recommender system based...
Recommender system and big data (design a smartphone recommender system based...Siwar Abidi
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking SystemBharat Kalia
 
What Does it Take to Achieve Software License Optimization?
What Does it Take to Achieve Software License Optimization?What Does it Take to Achieve Software License Optimization?
What Does it Take to Achieve Software License Optimization?Flexera
 
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENTAUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENTEditor IJCATR
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideHCLSoftware
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerHCLSoftware
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
IRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User InterestIRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User InterestIRJET Journal
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringConvetit
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based ApproachIRJET Journal
 
Moskowitz Whitepaper Microsoft App Locker And Beyond
Moskowitz Whitepaper  Microsoft App Locker And BeyondMoskowitz Whitepaper  Microsoft App Locker And Beyond
Moskowitz Whitepaper Microsoft App Locker And BeyondCoreTrace Corporation
 

Similar to Collaborative policy administration (20)

Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
Corporate Policy Governance in Secure MD5 Data Changes and Multi Hand Adminis...
 
D017141823
D017141823D017141823
D017141823
 
IRJET- Hybrid Recommendation System for Movies
IRJET-  	  Hybrid Recommendation System for MoviesIRJET-  	  Hybrid Recommendation System for Movies
IRJET- Hybrid Recommendation System for Movies
 
System analysis and_design.docx
System analysis and_design.docxSystem analysis and_design.docx
System analysis and_design.docx
 
235429094 jobportal-documentation
235429094 jobportal-documentation235429094 jobportal-documentation
235429094 jobportal-documentation
 
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docxONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
ONLINE APPOINTMENT SYSTEM1ONLINE APPOINTMENT SYSTEM18.docx
 
Recommender system and big data (design a smartphone recommender system based...
Recommender system and big data (design a smartphone recommender system based...Recommender system and big data (design a smartphone recommender system based...
Recommender system and big data (design a smartphone recommender system based...
 
Mingle box - Online Job seeking System
Mingle box - Online Job seeking SystemMingle box - Online Job seeking System
Mingle box - Online Job seeking System
 
What Does it Take to Achieve Software License Optimization?
What Does it Take to Achieve Software License Optimization?What Does it Take to Achieve Software License Optimization?
What Does it Take to Achieve Software License Optimization?
 
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENTAUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
AUTHENTICATE SYSTEM OBJECTS USING ACCESS CONTROL POLICY BASED MANAGEMENT
 
Selecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuideSelecting an App Security Testing Partner: An eGuide
Selecting an App Security Testing Partner: An eGuide
 
Procuring an Application Security Testing Partner
Procuring an Application Security Testing PartnerProcuring an Application Security Testing Partner
Procuring an Application Security Testing Partner
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
IRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User InterestIRJET- Analysis of Rating Difference and User Interest
IRJET- Analysis of Rating Difference and User Interest
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
Top 8 Trends in Performance Engineering
Top 8 Trends in Performance EngineeringTop 8 Trends in Performance Engineering
Top 8 Trends in Performance Engineering
 
IRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based ApproachIRJET- Social Network Message Credibility: An Agent-based Approach
IRJET- Social Network Message Credibility: An Agent-based Approach
 
IRJET - Social Network Message Credibility: An Agent-based Approach
IRJET -  	  Social Network Message Credibility: An Agent-based ApproachIRJET -  	  Social Network Message Credibility: An Agent-based Approach
IRJET - Social Network Message Credibility: An Agent-based Approach
 
Moskowitz Whitepaper Microsoft App Locker And Beyond
Moskowitz Whitepaper  Microsoft App Locker And BeyondMoskowitz Whitepaper  Microsoft App Locker And Beyond
Moskowitz Whitepaper Microsoft App Locker And Beyond
 

Collaborative policy administration

  • 1. Collaborative Policy Administration ABSTRACT: Policy-based management is a very effective method to protect sensitive information. However, the overclaim of privileges is widespread in emerging applications, including mobile applications and social network services, because the applications’ users involved in policy administration have little knowledge of policy-based management. The overclaim can be leveraged by malicious applications, then lead to serious privacy leakages and financial loss. To resolve this issue, this paper proposes a novel policy administration mechanism, referred to as collaborative policy administration (CPA for short), to simplify the policy administration. In CPA, a policy administrator can refer to other similar policies to set up their own policies to protect privacy and other sensitive information. This paper formally defines CPA and proposes its enforcement framework. Furthermore, to obtain similar policies more effectively, which is the key step of CPA, a text mining-based similarity measure method is presented. We evaluate CPA with the data of Android applications and demonstrate that the text mining-based similarity measure method is more effective in obtaining similar policies than the previous category-based method.
  • 2. EXISTING SYSTEM: The traditional framework of policy-based management consists of four core components policy decision point (PDP), policy enforcement point (PEP), policy administration point (PAP), and policy repository (PR). A well-trained policy administrator or group will specify, verify policies in PAP, and deploy the policies in PR. After a system runs, PDP will retrieve applicable policies from PR and make decisions. PEP takes charge of the decision, such as satisfying the request where a subject wants to open a file (authorization action), or launching a logger to record system context (obligation action). The overclaim of privileges, where a not well-trained administrator assigns more privileges than those which are normally required by a subject, is an increasingly serious problem, especially when the method of policy-based management is applied to emerging application scenarios, such as mobile applications and social network services. DISADVANTAGES OF EXISTING SYSTEM:  Application users may not know what the requested permissions mean, thus approving all requests because they are eager to use the application.
  • 3.  User will approve all requests from third-party applications, because User wants to run the applications, thus falling into the traps of malicious applications.  The User leakage of their privacy. PROPOSED SYSTEM: This paper proposes collaborative policy administration (CPA). The essential idea of CPA is that applications with similar functionalities shall have similar policies that will be specified and deployed. Thus, to specify or verify policies, CPA will examine policies already specified by other similar applications and perform collaborative recommendation. The degree of similarity will be calculated by predefined algorithms, which could be a category-based algorithm, a text mining-based algorithm, novel method, enforcement framework and implement a
  • 4. prototype of CPA. The framework supports two types of user interfaces and provides functions of collaborative policy design and collaborative policy verification. ADVANTAGES OF PROPOSED SYSTEM:  Collaborative policy verification helps the end users identify malicious permission requests.  Can develop securer and more acceptable applications for end users.
  • 5. SYSTEM ARCHITECTURE:  Register Login Upload file Policy Administration User Set Policy Verify Policy
  • 6. MODULES:  Collaborative policy design  Collaborative policy verification  Enforcement framework MODULES DESCRIPTION: Collaborative policy design Here, Admins refers to all involved policy administrators, including, e.g., developers, marketers, and end users in the Android framework. policy administrator Admins can obtain a refined policy set PSref according to a refinement function. We design the policy using the system such as a new user can register and logins and upload any file. The user can design the policy in it. That is the policy may be like download option available or not, client details view options such that options.
  • 7. Collaborative policy verification A policy administrator Admins can obtain a verification result. VeriResult for a target policy set PStarget , which contains all polices assigned to a target subject SUBJS, according to a verification function. ENFORCEMENT FRAMEWORK A policy administrator can leverage the framework to administrate policies via a phone, web browser, or development tool. The direction of arrows is the direction of key data flows. The history policy base and similarity measure methods are two key components in the enforcement framework. To enforce CPA, the administrator should prepare a sufficient number of policies at first. Furthermore, collaborative policy design and collaborative policy verification are the two key functions provided by the framework. These two functions depend on the history policy base and similarity measure methods. After obtaining the similar policies, the two functions call a refinement algorithm and a verification algorithm respectively. Finally, collaborative policy design and collaborative policy verification will display the results to the administrator on various user interfaces, e.g., a phone, web browser, or development tool.
  • 8. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.  MOBILE : ANDROID SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : Java 1.7  Tool Kit : Android 2.3 ABOVE  IDE : Eclipse
  • 9. REFERENCE: Weili Han, Member, IEEE, Zheran Fang, Laurence Tianruo Yang, Member, IEEE, Gang Pan, Member, IEEE, and Zhaohui Wu, Senior Member, IEEE, “Collaborative Policy Administration”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014.