Research Article

Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones

by  Poonam N. Railkar, Parikshit N. Mahalle
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Issue 25
Published: May 2013
Authors: Poonam N. Railkar, Parikshit N. Mahalle
10.5120/12224-8462
PDF

Poonam N. Railkar, Parikshit N. Mahalle . Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones. International Journal of Computer Applications. 70, 25 (May 2013), 26-31. DOI=10.5120/12224-8462

                        @article{ 10.5120/12224-8462,
                        author  = { Poonam N. Railkar,Parikshit N. Mahalle },
                        title   = { Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 70 },
                        number  = { 25 },
                        pages   = { 26-31 },
                        doi     = { 10.5120/12224-8462 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Poonam N. Railkar
                        %A Parikshit N. Mahalle
                        %T Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones%T 
                        %J International Journal of Computer Applications
                        %V 70
                        %N 25
                        %P 26-31
                        %R 10.5120/12224-8462
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile technology and Internet is becoming an integral part of our daily life. Widespread usage of smart phones and its greater in-built functionality have provided portability to perform transaction like shopping, ticket booking and banking transactions on the fly. In mobile computing, the characteristic like context awareness allows to provide proactively adapted services to user according to the context. Especially in combination with mobile devices, these mechanisms carries high value and are used to increase usability tremendously. Equally being an Android operating system as open source, it is prone to attack. In this view there is need to define new attack taxonomy and its modeling. This paper presents a novel taxonomy for Context Aware Proactive System (CAPS) in smart phone. This paper also presents activity modeling of proposed taxonomy to get an actual view of happening of attack like Cross Service attack, spyware and Battery Exhaustion attack. At the end this paper also discusses mitigation techniques to address few of the mentioned attacks.

References
  • Poonam N. Railkar, Parikshit N. Mahalle, "Proposed secure context aware profile translation" IJITS, Vol. 1; No. 2: ISSN: 2277-9825
  • Ketaki Shah, Anuja Raundal, Gouri Bhandari, Santwana Rathi, Poonam Railkar ,Parikshit Mahalle "Proposed profile translation In context aware proactive system" IJCSE ISSN : 0976-5166 Vol. 3 No. 6 Dec 2012-Jan 2013
  • Poonam N Railkar, Parikshit N Mahalle, "Proposed Profile Translation based Proactive Adaptation using Context Management (PTPACM) in Smartphones", pp 356-361 2013 3rd IEEE International Advance Computing Conference(IACC),Feb 2013
  • Wuest, Bjoern; Droegehorn, Olaf; David,Klaus, "Architecture for profile translation", IST summit 2005, 12.
  • Daniel Gallego Vico; Wolfgang Woerndl; Roland Bader "A Study on Proactive Delivery of Restaurant recommendations for Android Smartphones". In ACM Recsys Workshop on Personalization in Mobile Applications, Chicago, USA, October 2011
  • Jaewoo Chang; Sora Na; Min Yoon; "Intelligent Context-Aware System Architecture in Pervasive Computing Environment", Parallel and Distributed Processing with Applications, 2008. ISPA '08. International Symposium on , vol. , no. , pp. 745-750, 10-12 Dec. 2008
  • Khan,S. ; Nauman,M. ; Othman,A. T. ; Musa,S. "How Secure is your Smartphone: An Analysis of Smartphone Security Mechanisms" IEEE, Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012
  • Mobile Malware Evolution: Part 6 Available from: http://www. securelist. com/en/analysis/204792283/Mobile_Malware_Evolution_Part_6#8
  • "Android Reference: Application Fundamentals-Components," available at: http://developer. android. com/guide/topics/fundamentals. html.
  • "Android Reference: Security and Permissions," available at: http://developer. android. com/guide/topics/security/security. html.
  • Dey, Anind K. ; "Understanding and Using Context", Personal ubiquitous comput. , Springer-verlag, vol. no. , 5, pp. 4-7,25 July. 2007
  • Dey, A. K. Abowd, G. D. "Towards a Better Understanding of Context and Context-Awareness", CHI 2000 Workshop on the What, Who, Where, When, and How of Context-Awareness (2000)
  • Hofer T. ; Schwinger W. ; Pichler M. ; Leonhartsberger G. ; Altmann J. ; Retschitzegger W. ; "Context-awareness on mobile devices - the hydrogen approach", System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on , vol. , no. , pp. 10 pp. , 6-9 Jan. 2003
  • Tae Oh ; Stackpole, B. ; Cummins, E. ; Gonzalez, C. ;Ramachandran, R. ; Shinyoung Lim "Best Security Practices for Android, BlackBerry, and iOS", First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT), 2012
  • Gaeil An ; Daehee Seo ; Jonghyun Kim ; Kiyoung Kim ;Dongil Seo "Context-based Remote Security Control for Mobile Communication Device", IEEE, International Symposium on Communications and Information Technologies (ISCIT), 2010
  • Muslukhov, I. ; Boshmaf, Y. ; Kuo, C. ; Lester,J. ; Beznosov, K. "Understanding Users' Requirements for Data Protection in Smartphones", IEEE 28th International Conference on Data Engineering Workshops (ICDEW), 2012
  • Amamra, A. ; Talhi, C. ; Robert, J. " Smartphone Malware Detection: From a Survey Towards Taxonomy", IEEE 7th International Conference on Malicious and Unwanted Software (MALWARE), 2012
  • Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry, "Towards Taming Privilege-Escalation Attacks on Android", 19th Annual Network & Distributed System Security Symposium (NDSS) 2012.
  • W. Enck, M. Ongtang, and P. McDaniel, "On lightweight mobile phone application certi?cation," in Proceedings of the 16th ACM conference on Computer and Communications Security. ACM, 2009, pp. 235–245.
  • Dorflinger,T. ; Voth, A. ; Kramer,J. ; Fromm,R. "MY SMARTPHONE IS A SAFE!" The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones", IEEE, Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT).
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Threat Taxonomy Security Context Context-Awareness Mobile Proactive system Profile translation Smartphone Android User profile

Powered by PhDFocusTM