Privacy Panel: Usable and Quantifiable Mobile Privacy

作者: Debmalya Biswas , Imad Aad , Gian Paolo Perrucci

DOI: 10.1109/ARES.2013.29

关键词:

摘要: The ever increasing popularity of apps stems from their ability to provide highly customized services the user. flip side is that in order such services, need access very sensitive private information about This leads malicious collect personal user background and exploit it various ways. Studies have shown current app vetting processes which are mainly restricted install time verification mechanisms incapable detecting preventing attacks. We argue missing fundamental aspect here a comprehensive usable mobile privacy solution, one not only protects user's location information, but also other equally data as contacts documents. A solution by average who does understand or care low level technical details. To bridge this gap, we propose metrics quantify low-level accesses terms impact transforms them high-level understandable ratings. design architecture our Privacy Panel represents computed ratings graphical user-friendly format allows define policies based on them. Finally, experimental results given validate scalability proposed solution.

参考文章(11)
Yajin Zhou, Xinwen Zhang, Xuxian Jiang, Vincent W. Freeh, Taming information-stealing smartphone applications (on Android) trust and trustworthy computing. pp. 93- 107 ,(2011) , 10.1007/978-3-642-21599-5_7
David Basin, Matúš Harvan, Felix Klaedtke, Eugen Zălinescu, MONPOLY: monitoring usage-control policies runtime verification. pp. 360- 364 ,(2011) , 10.1007/978-3-642-29860-8_27
Michael Wibmer, Debmalya Biswas, Florian Kerschbaum, Leakage quantification of cryptographic operations international conference on move to meaningful internet systems. pp. 685- 700 ,(2010) , 10.1007/978-3-642-16934-2_50
William Enck, Patrick McDaniel, Jaeyeon Jung, Byung-Gon Chun, Peter Gilbert, Anmol N. Sheth, Landon P. Cox, TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones operating systems design and implementation. pp. 393- 407 ,(2010) , 10.5555/1924943.1924971
Debmalya Biswas, Nikolai Nefedov, Valtteri Niemi, Distributed and minimal usage control service-oriented computing and applications. ,vol. 6, pp. 393- 402 ,(2012) , 10.1007/S11761-012-0112-4
Debmalya Biswas, Privacy policies change management for smartphones pervasive computing and communications. pp. 70- 75 ,(2012) , 10.1109/PERCOMW.2012.6197606
Ling Liu, Privacy and location anonymization in location-based services SIGSPATIAL Special. ,vol. 1, pp. 15- 22 ,(2009) , 10.1145/1567253.1567257
B. Gedik, Ling Liu, Location Privacy in Mobile Systems: A Personalized Anonymization Model international conference on distributed computing systems. ,vol. 1, pp. 620- 629 ,(2005) , 10.1109/ICDCS.2005.48
C. E. Shannon, Communication theory of secrecy systems Bell System Technical Journal. ,vol. 28, pp. 656- 715 ,(1949) , 10.1002/J.1538-7305.1949.TB00928.X
Reza Shokri, George Theodorakopoulos, Jean-Yves Le Boudec, Jean-Pierre Hubaux, Quantifying Location Privacy ieee symposium on security and privacy. pp. 247- 262 ,(2011) , 10.1109/SP.2011.18