We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones

by Poonam N. Railkar, Parikshit N. Mahalle
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 25
Year of Publication: 2013
Authors: Poonam N. Railkar, Parikshit N. Mahalle
10.5120/12224-8462

Poonam N. Railkar, Parikshit N. Mahalle . Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones. International Journal of Computer Applications. 70, 25 ( May 2013), 26-31. DOI=10.5120/12224-8462

@article{ 10.5120/12224-8462,
author = { Poonam N. Railkar, Parikshit N. Mahalle },
title = { Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 25 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number25/12224-8462/ },
doi = { 10.5120/12224-8462 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:33:49.461994+05:30
%A Poonam N. Railkar
%A Parikshit N. Mahalle
%T Activity Modeling and Threat Taxonomy for Context Aware Proactive System (CAPS) in Smart Phones
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 25
%P 26-31
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile technology and Internet is becoming an integral part of our daily life. Widespread usage of smart phones and its greater in-built functionality have provided portability to perform transaction like shopping, ticket booking and banking transactions on the fly. In mobile computing, the characteristic like context awareness allows to provide proactively adapted services to user according to the context. Especially in combination with mobile devices, these mechanisms carries high value and are used to increase usability tremendously. Equally being an Android operating system as open source, it is prone to attack. In this view there is need to define new attack taxonomy and its modeling. This paper presents a novel taxonomy for Context Aware Proactive System (CAPS) in smart phone. This paper also presents activity modeling of proposed taxonomy to get an actual view of happening of attack like Cross Service attack, spyware and Battery Exhaustion attack. At the end this paper also discusses mitigation techniques to address few of the mentioned attacks.

References
  1. Poonam N. Railkar, Parikshit N. Mahalle, "Proposed secure context aware profile translation" IJITS, Vol. 1; No. 2: ISSN: 2277-9825
  2. Ketaki Shah, Anuja Raundal, Gouri Bhandari, Santwana Rathi, Poonam Railkar ,Parikshit Mahalle "Proposed profile translation In context aware proactive system" IJCSE ISSN : 0976-5166 Vol. 3 No. 6 Dec 2012-Jan 2013
  3. Poonam N Railkar, Parikshit N Mahalle, "Proposed Profile Translation based Proactive Adaptation using Context Management (PTPACM) in Smartphones", pp 356-361 2013 3rd IEEE International Advance Computing Conference(IACC),Feb 2013
  4. Wuest, Bjoern; Droegehorn, Olaf; David,Klaus, "Architecture for profile translation", IST summit 2005, 12.
  5. Daniel Gallego Vico; Wolfgang Woerndl; Roland Bader "A Study on Proactive Delivery of Restaurant recommendations for Android Smartphones". In ACM Recsys Workshop on Personalization in Mobile Applications, Chicago, USA, October 2011
  6. Jaewoo Chang; Sora Na; Min Yoon; "Intelligent Context-Aware System Architecture in Pervasive Computing Environment", Parallel and Distributed Processing with Applications, 2008. ISPA '08. International Symposium on , vol. , no. , pp. 745-750, 10-12 Dec. 2008
  7. Khan,S. ; Nauman,M. ; Othman,A. T. ; Musa,S. "How Secure is your Smartphone: An Analysis of Smartphone Security Mechanisms" IEEE, Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012
  8. Mobile Malware Evolution: Part 6 Available from: http://www. securelist. com/en/analysis/204792283/Mobile_Malware_Evolution_Part_6#8
  9. "Android Reference: Application Fundamentals-Components," available at: http://developer. android. com/guide/topics/fundamentals. html.
  10. "Android Reference: Security and Permissions," available at: http://developer. android. com/guide/topics/security/security. html.
  11. Dey, Anind K. ; "Understanding and Using Context", Personal ubiquitous comput. , Springer-verlag, vol. no. , 5, pp. 4-7,25 July. 2007
  12. Dey, A. K. Abowd, G. D. "Towards a Better Understanding of Context and Context-Awareness", CHI 2000 Workshop on the What, Who, Where, When, and How of Context-Awareness (2000)
  13. Hofer T. ; Schwinger W. ; Pichler M. ; Leonhartsberger G. ; Altmann J. ; Retschitzegger W. ; "Context-awareness on mobile devices - the hydrogen approach", System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on , vol. , no. , pp. 10 pp. , 6-9 Jan. 2003
  14. Tae Oh ; Stackpole, B. ; Cummins, E. ; Gonzalez, C. ;Ramachandran, R. ; Shinyoung Lim "Best Security Practices for Android, BlackBerry, and iOS", First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT), 2012
  15. Gaeil An ; Daehee Seo ; Jonghyun Kim ; Kiyoung Kim ;Dongil Seo "Context-based Remote Security Control for Mobile Communication Device", IEEE, International Symposium on Communications and Information Technologies (ISCIT), 2010
  16. Muslukhov, I. ; Boshmaf, Y. ; Kuo, C. ; Lester,J. ; Beznosov, K. "Understanding Users' Requirements for Data Protection in Smartphones", IEEE 28th International Conference on Data Engineering Workshops (ICDEW), 2012
  17. Amamra, A. ; Talhi, C. ; Robert, J. " Smartphone Malware Detection: From a Survey Towards Taxonomy", IEEE 7th International Conference on Malicious and Unwanted Software (MALWARE), 2012
  18. Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, Ahmad-Reza Sadeghi, Bhargava Shastry, "Towards Taming Privilege-Escalation Attacks on Android", 19th Annual Network & Distributed System Security Symposium (NDSS) 2012.
  19. W. Enck, M. Ongtang, and P. McDaniel, "On lightweight mobile phone application certi?cation," in Proceedings of the 16th ACM conference on Computer and Communications Security. ACM, 2009, pp. 235–245.
  20. Dorflinger,T. ; Voth, A. ; Kramer,J. ; Fromm,R. "MY SMARTPHONE IS A SAFE!" The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones", IEEE, Proceedings of the 2010 International Conference on Security and Cryptography (SECRYPT).
Index Terms

Computer Science
Information Sciences

Keywords

Threat Taxonomy Security Context Context-Awareness Mobile Proactive system Profile translation Smartphone Android User profile