SlideShare a Scribd company logo
1 of 4
Download to read offline
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 1
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
SPE: Security and Privacy Enhancement
Framework for Mobile Devices
Abstract
A security and privacy enhancement (SPE) framework for unmodified
mobile operating systems. SPE introduces a new layer between the application and
the operating system and does not require a device be jail broken or utilize a
custom operating system. We utilize an existing ontology designed for enforcing
security and privacy policies on mobile devices to build a policy that is
customizable. Based on this policy, SPE provides enhancements to native controls
that currently exist on the platform for privacy and security sensitive components.
SPE allows access to these components in a way that allows the framework to
ensure the application is truthful in its declared intent and ensure that the user’s
policy is enforced. In our evaluation we verify the correctness of the framework
and the computing impact on the device. Additionally, we discovered security and
privacy issues in several open source applications by utilizing the SPE Framework.
From our findings, if SPE is adopted by mobile operating systems producers, it
would provide consumers and businesses the additional privacy and security
controls they demand and allow users to be more aware of security and privacy
issues with applications on their devices.
INTRODUCTION
Mobile computing devices are quickly becoming the platform of choice for
consumers and businesses. Given that mobile devices started to outsell PCs in 2011
and mobile applications are freely available in marketplaces, consumers are more
likely to focus on mobile devices as their primary personal computing platforms.
Additionally, users perform many of the same tasks that were performed
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 2
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
previously with traditional computers on their mobile devices. Most devices are
equipped with numerous sensors such as cameras, microphones, GPS,
accelerometers, and gyroscopes where users can share data about their
environment or habits quickly, but also unknowingly. Here are a few examples of
such unintentional sharing: (a) Facebook leaked the phone number from a mobile
device before the user logged into the application (b) Angry Birds collected user
data, which was found to be used by the NSA to profile users (c) out of 25,976
Android applications, 969 applications leaked location data and 347 recorded audio
without the user’s permission (d) Path was found to geotag photos even after a user
disabled location services , and sent user’s privacy data unknowingly by uploading
a user’s entire address book . Even when a user permits an application to access
data on the device, the user is not aware of what else the data is being used for,
how often it is being accessed, and with whom it is being shared there is no way to
confirm that the application is truthful in how it states the information will be used.
EXISTING SYSTEM
The rapid growth in the mobile device ecosystem demands viable solutions
security and privacy concerns. Even though mobile devices are becoming more
powerful, there still exist constraints on computing power, memory capacity, and a
virtual endless supply of energy that traditional computing platforms offer today.
These constraints limit mobile devices from performing computationally expensive
operations such as pattern-based intrusion detection or fuzzy checking of privacy
leakage. Even if computing power on mobile devices were to increase, the effect
on the device’s battery would be unacceptable for a user. Additionally, the user
experience may be affected if more computationally expensive operations are
being executed while the user is interacting with the device. Recent research in this
area has introduced novel methods for providing additional security and privacy
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 3
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
controls. However most of these methods require a modification to the operating
system or the device to be jailbroken
DRAWBACK OF EXISTING SYSTEM
 Privacy data is leaked immediately.
 Accessing information without user permission.
 Path are easily found, when the location services are disabled.
PROPOSED SYSTEM
In proposed system, we have presented the Security and Privacy Enhanced
(SPE) framework. We described the policy model it utilizes, the core design of the
framework, and details on an implementation that allows a consumer or business to
effectively ensure that security and privacy policies are enforced. Additionally, we
proposed a novel approach that uses intents to describe to the user how the
application will use their data and enforce these intents. Compared to recent
research that has focused on modifying open mobile operating systems or
jailbreaking closed-source operating systems like iOS, the SPE Framework takes a
different approach. While the SPE Framework does require modification to the
application, it does not require modification to the OS orfor a device to be
jailbroken or rooted. We believe this is a more sustainable approach as OS updates
do not impact the SPE Framework unless there are significant API changes.
Frequent updates to mobile operating systems have led to fragmentation, with
modifications to Android by both carriers and device manufacturers. Additionally,
a consumer does not need to compromise the built-in security of their device by
jail breaking or rooting the device; with SPE they add another layer of protection.
Lastly with SPE a consumer can use a stock device with a stock operating system.
Based on the results of our evaluation, SPE is highly effective and prevents several
Do Your Projects With Domain Experts…
Copyright © 2015 LeMeniz Infotech. All rights reserved
Page number 4
LeMeniz Infotech
36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue,
Pondicherry-605 005.
Call: 0413-4205444, +91 9566355386, 99625 88976.
Web : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
privacy and security concerns from several iOS applications. In the near future we
plan on releasing the SPE Framework, SPE Conversion Assistant, and SPE Policy
application as open source projects. From this, an external entity can be created for
developers to retrieve the SPE Framework to incorporate within their application
or the framework could be tied into the workflow for application submission.
ADVANTAGE OF PROPOSED SYSTEM
 Highly effectiveness of ensure the security and privacy.
 In OS updation, customer need not wait a long time.
Hardware Requirement
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech
Ram : 512 Mb.
MOBILE : ANDROID
Software Requirement
Operating system : Windows 7.
Coding Language : Java 1.7
Tool Kit : Android 2.3 ABOVE
IDE : Eclipse

More Related Content

What's hot

Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
Cs a multi-national oil and gas company
Cs  a multi-national oil and gas companyCs  a multi-national oil and gas company
Cs a multi-national oil and gas companyLiora R. Herman
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman Security
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsHuntsman Security
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesIvanti
 
Axonius Case Study: AppsFlyer
Axonius Case Study: AppsFlyerAxonius Case Study: AppsFlyer
Axonius Case Study: AppsFlyernathan-axonius
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity PredictionsLookout
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidencePaul Richards
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 

What's hot (20)

Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Cs a multi-national oil and gas company
Cs  a multi-national oil and gas companyCs  a multi-national oil and gas company
Cs a multi-national oil and gas company
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
Axonius Case Study: AppsFlyer
Axonius Case Study: AppsFlyerAxonius Case Study: AppsFlyer
Axonius Case Study: AppsFlyer
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
 
EveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidenceEveryCloud 5-steps-cloud-confidence
EveryCloud 5-steps-cloud-confidence
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 

Viewers also liked

Swedish_Technology_Time_Attendance
Swedish_Technology_Time_AttendanceSwedish_Technology_Time_Attendance
Swedish_Technology_Time_AttendanceSwedish Technology
 
A new control strategy for distributed static compensators considering transm...
A new control strategy for distributed static compensators considering transm...A new control strategy for distributed static compensators considering transm...
A new control strategy for distributed static compensators considering transm...LeMeniz Infotech
 
Bidirectional pwm converter integrating cell voltage equalizer using series r...
Bidirectional pwm converter integrating cell voltage equalizer using series r...Bidirectional pwm converter integrating cell voltage equalizer using series r...
Bidirectional pwm converter integrating cell voltage equalizer using series r...LeMeniz Infotech
 
Novel single phase pwm ac–ac converters solving commutation problem using swi...
Novel single phase pwm ac–ac converters solving commutation problem using swi...Novel single phase pwm ac–ac converters solving commutation problem using swi...
Novel single phase pwm ac–ac converters solving commutation problem using swi...LeMeniz Infotech
 
A new railway power flow control system coupled with asymmetric double lc bra...
A new railway power flow control system coupled with asymmetric double lc bra...A new railway power flow control system coupled with asymmetric double lc bra...
A new railway power flow control system coupled with asymmetric double lc bra...LeMeniz Infotech
 
Jus' IPad
Jus' IPadJus' IPad
Jus' IPadJustyC
 
Camps gaëlle et lilou
Camps   gaëlle et lilouCamps   gaëlle et lilou
Camps gaëlle et liloumdrouet44
 
Incentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networksIncentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networksLeMeniz Infotech
 
High gain resonant switched-capacitor cell-based dcdc converter for offshore ...
High gain resonant switched-capacitor cell-based dcdc converter for offshore ...High gain resonant switched-capacitor cell-based dcdc converter for offshore ...
High gain resonant switched-capacitor cell-based dcdc converter for offshore ...LeMeniz Infotech
 
Evaluation question 1 (digi pack)
Evaluation question 1 (digi pack)Evaluation question 1 (digi pack)
Evaluation question 1 (digi pack)Carly Davis
 
How to Get Involved in the Magento Community #mm16ar
How to Get Involved in the Magento Community #mm16arHow to Get Involved in the Magento Community #mm16ar
How to Get Involved in the Magento Community #mm16arSherrie Rohde
 
5.marec Svetový deň účinnosti
5.marec Svetový deň účinnosti5.marec Svetový deň účinnosti
5.marec Svetový deň účinnostidenisdudas00
 
A nonisolated three port dc–dc converter and three-domain control method for ...
A nonisolated three port dc–dc converter and three-domain control method for ...A nonisolated three port dc–dc converter and three-domain control method for ...
A nonisolated three port dc–dc converter and three-domain control method for ...LeMeniz Infotech
 

Viewers also liked (16)

Presentación curso ABP
Presentación curso ABPPresentación curso ABP
Presentación curso ABP
 
Swedish_Technology_Time_Attendance
Swedish_Technology_Time_AttendanceSwedish_Technology_Time_Attendance
Swedish_Technology_Time_Attendance
 
A new control strategy for distributed static compensators considering transm...
A new control strategy for distributed static compensators considering transm...A new control strategy for distributed static compensators considering transm...
A new control strategy for distributed static compensators considering transm...
 
Bidirectional pwm converter integrating cell voltage equalizer using series r...
Bidirectional pwm converter integrating cell voltage equalizer using series r...Bidirectional pwm converter integrating cell voltage equalizer using series r...
Bidirectional pwm converter integrating cell voltage equalizer using series r...
 
Novel single phase pwm ac–ac converters solving commutation problem using swi...
Novel single phase pwm ac–ac converters solving commutation problem using swi...Novel single phase pwm ac–ac converters solving commutation problem using swi...
Novel single phase pwm ac–ac converters solving commutation problem using swi...
 
Yeni grisales
Yeni grisalesYeni grisales
Yeni grisales
 
A new railway power flow control system coupled with asymmetric double lc bra...
A new railway power flow control system coupled with asymmetric double lc bra...A new railway power flow control system coupled with asymmetric double lc bra...
A new railway power flow control system coupled with asymmetric double lc bra...
 
Jus' IPad
Jus' IPadJus' IPad
Jus' IPad
 
Camps gaëlle et lilou
Camps   gaëlle et lilouCamps   gaëlle et lilou
Camps gaëlle et lilou
 
Incentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networksIncentive based data sharing in delay tolerant mobile networks
Incentive based data sharing in delay tolerant mobile networks
 
High gain resonant switched-capacitor cell-based dcdc converter for offshore ...
High gain resonant switched-capacitor cell-based dcdc converter for offshore ...High gain resonant switched-capacitor cell-based dcdc converter for offshore ...
High gain resonant switched-capacitor cell-based dcdc converter for offshore ...
 
Evaluation question 1 (digi pack)
Evaluation question 1 (digi pack)Evaluation question 1 (digi pack)
Evaluation question 1 (digi pack)
 
How to Get Involved in the Magento Community #mm16ar
How to Get Involved in the Magento Community #mm16arHow to Get Involved in the Magento Community #mm16ar
How to Get Involved in the Magento Community #mm16ar
 
Lakkadi in Wayanad
Lakkadi in WayanadLakkadi in Wayanad
Lakkadi in Wayanad
 
5.marec Svetový deň účinnosti
5.marec Svetový deň účinnosti5.marec Svetový deň účinnosti
5.marec Svetový deň účinnosti
 
A nonisolated three port dc–dc converter and three-domain control method for ...
A nonisolated three port dc–dc converter and three-domain control method for ...A nonisolated three port dc–dc converter and three-domain control method for ...
A nonisolated three port dc–dc converter and three-domain control method for ...
 

Similar to Spe security and privacy enhancement framework for mobile devices

Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxrtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxjeffsrosalyn
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd Iaetsd
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015Francisco Anes
 
Moses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On SmartphonesMoses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On SmartphonesPapitha Velumani
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileAlex Zaltsman
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeterinfra-si
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksHyker Security
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Providing privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systemsProviding privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systemsLeMeniz Infotech
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devicesLeMeniz Infotech
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurityGary Sandoval
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope OverviewNetskope
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
ACCESS_WP_Security-web
ACCESS_WP_Security-webACCESS_WP_Security-web
ACCESS_WP_Security-webPaul Plaquette
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 

Similar to Spe security and privacy enhancement framework for mobile devices (20)

I018145157
I018145157I018145157
I018145157
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
 
Securing mobile apps in a BYOD world
Securing mobile apps in a BYOD worldSecuring mobile apps in a BYOD world
Securing mobile apps in a BYOD world
 
SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015SecurityWhitepaper 7-1-2015
SecurityWhitepaper 7-1-2015
 
Moses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On SmartphonesMoses Supporting And Enforcing Security Profiles On Smartphones
Moses Supporting And Enforcing Security Profiles On Smartphones
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
PingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networksPingPal infodeck: How to survive BYOD and mobile networks
PingPal infodeck: How to survive BYOD and mobile networks
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Providing privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systemsProviding privacy aware incentives in mobile sensing systems
Providing privacy aware incentives in mobile sensing systems
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Context based access control systems for mobile devices
Context based access control systems for mobile devicesContext based access control systems for mobile devices
Context based access control systems for mobile devices
 
State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
ACCESS_WP_Security-web
ACCESS_WP_Security-webACCESS_WP_Security-web
ACCESS_WP_Security-web
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 

More from LeMeniz Infotech

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...LeMeniz Infotech
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...LeMeniz Infotech
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...LeMeniz Infotech
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachLeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsLeMeniz Infotech
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlLeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...LeMeniz Infotech
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...LeMeniz Infotech
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersLeMeniz Infotech
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedLeMeniz Infotech
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksLeMeniz Infotech
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...LeMeniz Infotech
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android appsLeMeniz Infotech
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication schemeLeMeniz Infotech
 

More from LeMeniz Infotech (20)

A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 

Recently uploaded

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

Spe security and privacy enhancement framework for mobile devices

  • 1. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 1 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com SPE: Security and Privacy Enhancement Framework for Mobile Devices Abstract A security and privacy enhancement (SPE) framework for unmodified mobile operating systems. SPE introduces a new layer between the application and the operating system and does not require a device be jail broken or utilize a custom operating system. We utilize an existing ontology designed for enforcing security and privacy policies on mobile devices to build a policy that is customizable. Based on this policy, SPE provides enhancements to native controls that currently exist on the platform for privacy and security sensitive components. SPE allows access to these components in a way that allows the framework to ensure the application is truthful in its declared intent and ensure that the user’s policy is enforced. In our evaluation we verify the correctness of the framework and the computing impact on the device. Additionally, we discovered security and privacy issues in several open source applications by utilizing the SPE Framework. From our findings, if SPE is adopted by mobile operating systems producers, it would provide consumers and businesses the additional privacy and security controls they demand and allow users to be more aware of security and privacy issues with applications on their devices. INTRODUCTION Mobile computing devices are quickly becoming the platform of choice for consumers and businesses. Given that mobile devices started to outsell PCs in 2011 and mobile applications are freely available in marketplaces, consumers are more likely to focus on mobile devices as their primary personal computing platforms. Additionally, users perform many of the same tasks that were performed
  • 2. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 2 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com previously with traditional computers on their mobile devices. Most devices are equipped with numerous sensors such as cameras, microphones, GPS, accelerometers, and gyroscopes where users can share data about their environment or habits quickly, but also unknowingly. Here are a few examples of such unintentional sharing: (a) Facebook leaked the phone number from a mobile device before the user logged into the application (b) Angry Birds collected user data, which was found to be used by the NSA to profile users (c) out of 25,976 Android applications, 969 applications leaked location data and 347 recorded audio without the user’s permission (d) Path was found to geotag photos even after a user disabled location services , and sent user’s privacy data unknowingly by uploading a user’s entire address book . Even when a user permits an application to access data on the device, the user is not aware of what else the data is being used for, how often it is being accessed, and with whom it is being shared there is no way to confirm that the application is truthful in how it states the information will be used. EXISTING SYSTEM The rapid growth in the mobile device ecosystem demands viable solutions security and privacy concerns. Even though mobile devices are becoming more powerful, there still exist constraints on computing power, memory capacity, and a virtual endless supply of energy that traditional computing platforms offer today. These constraints limit mobile devices from performing computationally expensive operations such as pattern-based intrusion detection or fuzzy checking of privacy leakage. Even if computing power on mobile devices were to increase, the effect on the device’s battery would be unacceptable for a user. Additionally, the user experience may be affected if more computationally expensive operations are being executed while the user is interacting with the device. Recent research in this area has introduced novel methods for providing additional security and privacy
  • 3. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 3 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com controls. However most of these methods require a modification to the operating system or the device to be jailbroken DRAWBACK OF EXISTING SYSTEM  Privacy data is leaked immediately.  Accessing information without user permission.  Path are easily found, when the location services are disabled. PROPOSED SYSTEM In proposed system, we have presented the Security and Privacy Enhanced (SPE) framework. We described the policy model it utilizes, the core design of the framework, and details on an implementation that allows a consumer or business to effectively ensure that security and privacy policies are enforced. Additionally, we proposed a novel approach that uses intents to describe to the user how the application will use their data and enforce these intents. Compared to recent research that has focused on modifying open mobile operating systems or jailbreaking closed-source operating systems like iOS, the SPE Framework takes a different approach. While the SPE Framework does require modification to the application, it does not require modification to the OS orfor a device to be jailbroken or rooted. We believe this is a more sustainable approach as OS updates do not impact the SPE Framework unless there are significant API changes. Frequent updates to mobile operating systems have led to fragmentation, with modifications to Android by both carriers and device manufacturers. Additionally, a consumer does not need to compromise the built-in security of their device by jail breaking or rooting the device; with SPE they add another layer of protection. Lastly with SPE a consumer can use a stock device with a stock operating system. Based on the results of our evaluation, SPE is highly effective and prevents several
  • 4. Do Your Projects With Domain Experts… Copyright © 2015 LeMeniz Infotech. All rights reserved Page number 4 LeMeniz Infotech 36, 100 Feet Road, Natesan Nagar, Near Indira Gandhi Statue, Pondicherry-605 005. Call: 0413-4205444, +91 9566355386, 99625 88976. Web : www.lemenizinfotech.com / www.ieeemaster.com Mail : projects@lemenizinfotech.com privacy and security concerns from several iOS applications. In the near future we plan on releasing the SPE Framework, SPE Conversion Assistant, and SPE Policy application as open source projects. From this, an external entity can be created for developers to retrieve the SPE Framework to incorporate within their application or the framework could be tied into the workflow for application submission. ADVANTAGE OF PROPOSED SYSTEM  Highly effectiveness of ensure the security and privacy.  In OS updation, customer need not wait a long time. Hardware Requirement System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Floppy Drive : 44 Mb. Monitor : 15 VGA Colour. Mouse : Logitech Ram : 512 Mb. MOBILE : ANDROID Software Requirement Operating system : Windows 7. Coding Language : Java 1.7 Tool Kit : Android 2.3 ABOVE IDE : Eclipse