Académique Documents
Professionnel Documents
Culture Documents
Blue Zone
Guided by
RAMESH P N
Asst prof - Dept of CSE
Batch 8
Abstract
Misuse of the data by malicious applications from
our android device may result in privacy breaches
and sensitive data leakage.
The problem arises from the fact that Android
users do not have control over the application
capabilities once the applications have been
granted the requested privileges upon installation.
so that context based access control restrictions
can be applied and executed.
Blue Zone
Batch 8
Existing system
Lacking of security for specific application services.
Not effective for complete system wide process.
All the services are disabled and enabled once and
for all yet results in non usability of the required
services
Application must be deactivated and activated for
each specific location.
Blue Zone
Batch 8
Limitations
Do not cover all the possible ways in which
applications can access user data and device
resources.
The User leakage of Their privacy.
not accurate enough to identify the location.
Blue Zone
Batch 8
Proposed system
Context-based access control (CBAC) mechanism for
Android systems that allows smartphone users to
set configuration policies
users can set restricted privileges for device
applications when using the device at work, and
device applications may re-gain their original
privileges when the device is used at home.
This change in device privileges is automatically
applied as soon as the user device matches a predefined context of a user-defined policy.
Blue Zone
Batch 8
Blue Zone
Batch 8
System Architecture
Blue Zone
Batch 8
Modules
1. Context Provider
2. Access Controller
3. Policy Manager
4. Policy Executor
Blue Zone
Batch 8
1. Context Provider
Providing content to applications.
The context Provider is the interface between the
provider and other applications.
Together, providers and provider clients offer a
consistent, standard interface to data that also
handles inter-process communication and secure
data access.
Blue Zone
Batch 8
2. Access Controller
The Access Controller controls the authorizations
of applications and prevents unauthorized usage
of device resources or services.
The Access Controller complements this system
with more control methods and specific finegrained control permissions that better reflect the
application capabilities and narrow down its
accessibility to resources.
10
Blue Zone
Batch 8
3.Policy Manager
The Policy Manager (PM) represents the interface
used to create policies, mainly assigning
application restrictions to contexts.
It mainly gives control to the user to configure
which resources and services are accessible by
applications at the given context provided by the
Context Provider.
11
Blue Zone
Batch 8
4. Policy Executor
The Policy Executor (PE) enforces device
restrictions by comparing the devices context
with the configured policies.
Once an application requests access to a resource
or service, the PE checks the user-configured
restrictions set at the Policy Manager to either
grant to deny access to the application request.
12
Blue Zone
Batch 8
13
Blue Zone
Batch 8
Screen Shots
14
Blue Zone
Batch 8
Screen Shots
15
Blue Zone
Batch 8
Screen Shots
16
Blue Zone
Batch 8
Screen Shots
17
Blue Zone
Batch 8
Screen Shots
18
Blue Zone
Batch 8
Screen Shots
19
Blue Zone
Batch 8
Screen Shots
20
Blue Zone
Batch 8
Screen Shots
21
Blue Zone
Batch 8
Conclusion
22
Blue Zone
Batch 8
TH
23
Blue Zone
U
O
Y
K
AN
Batch 8