Vous êtes sur la page 1sur 23

Blue Zone

Context Based Access


Control
Android application
Presented by
SHYAM SUNDAR S
VENKATESH S
GAYATHRI K
PRIYABHAARATHI R

Blue Zone

Guided by
RAMESH P N
Asst prof - Dept of CSE

Batch 8

Abstract
Misuse of the data by malicious applications from
our android device may result in privacy breaches
and sensitive data leakage.
The problem arises from the fact that Android
users do not have control over the application
capabilities once the applications have been
granted the requested privileges upon installation.
so that context based access control restrictions
can be applied and executed.

Blue Zone

Batch 8

Existing system
Lacking of security for specific application services.
Not effective for complete system wide process.
All the services are disabled and enabled once and
for all yet results in non usability of the required
services
Application must be deactivated and activated for
each specific location.

Blue Zone

Batch 8

Limitations
Do not cover all the possible ways in which
applications can access user data and device
resources.
The User leakage of Their privacy.
not accurate enough to identify the location.

Blue Zone

Batch 8

Proposed system
Context-based access control (CBAC) mechanism for
Android systems that allows smartphone users to
set configuration policies
users can set restricted privileges for device
applications when using the device at work, and
device applications may re-gain their original
privileges when the device is used at home.
This change in device privileges is automatically
applied as soon as the user device matches a predefined context of a user-defined policy.

Blue Zone

Batch 8

Overcoming the limitations in existing


system
Applications should not be able to fake the
location of the device.
Can develop securer and more acceptable
applications for end users.

Blue Zone

Batch 8

System Architecture

Blue Zone

Batch 8

Modules

1. Context Provider
2. Access Controller
3. Policy Manager
4. Policy Executor

Blue Zone

Batch 8

1. Context Provider
Providing content to applications.
The context Provider is the interface between the
provider and other applications.
Together, providers and provider clients offer a
consistent, standard interface to data that also
handles inter-process communication and secure
data access.

Blue Zone

Batch 8

2. Access Controller
The Access Controller controls the authorizations
of applications and prevents unauthorized usage
of device resources or services.
The Access Controller complements this system
with more control methods and specific finegrained control permissions that better reflect the
application capabilities and narrow down its
accessibility to resources.

10

Blue Zone

Batch 8

3.Policy Manager
The Policy Manager (PM) represents the interface
used to create policies, mainly assigning
application restrictions to contexts.
It mainly gives control to the user to configure
which resources and services are accessible by
applications at the given context provided by the
Context Provider.

11

Blue Zone

Batch 8

4. Policy Executor
The Policy Executor (PE) enforces device
restrictions by comparing the devices context
with the configured policies.
Once an application requests access to a resource
or service, the PE checks the user-configured
restrictions set at the Policy Manager to either
grant to deny access to the application request.

12

Blue Zone

Batch 8

Use Case Diagram

13

Blue Zone

Batch 8

Screen Shots

14

Blue Zone

Batch 8

Screen Shots

15

Blue Zone

Batch 8

Screen Shots

16

Blue Zone

Batch 8

Screen Shots

17

Blue Zone

Batch 8

Screen Shots

18

Blue Zone

Batch 8

Screen Shots

19

Blue Zone

Batch 8

Screen Shots

20

Blue Zone

Batch 8

Screen Shots

21

Blue Zone

Batch 8

Conclusion

We proposed a modified version of the


Android OS supporting context-based
access control policies.
The restrictions specified in a policy are
automatically applied as soon as the user
device matches the pre-defined context
associated with the policy.

22

Blue Zone

Batch 8

TH

23

Blue Zone

U
O
Y
K
AN

Batch 8

Vous aimerez peut-être aussi