A Context-Based Personalization for Mobile Applications' Network Access

In this paper, we propose a context-based framework for eliciting context information and adapting this information with mobile applications network access decision mechanism. The framework leverages the execution of mobile applications inside a sandbox to control the communication between mobile applications and mobile device resources. Applications’ access requests are analyzed based on user’s context information collected from the mobile device sensors and the application network access configuration. We validate our proposed framework in Android Operating System running on handheld smartphone devices. Preliminary results revealed the efficacy of our proposed context-based framework in providing network access control management based on users’ context information at run-time.

[1]  Lorrie Faith Cranor,et al.  Your Location has been Shared 5,398 Times!: A Field Study on Mobile App Privacy Nudging , 2015, CHI.

[2]  Marco Gruteser,et al.  A Field Study of Run-Time Location Access Disclosures on Android Smartphones , 2014 .

[3]  Lorrie Faith Cranor,et al.  "Little brothers watching you": raising awareness of data leaks on smartphones , 2013, SOUPS.

[4]  Lorrie Faith Cranor,et al.  Privacy as part of the app decision-making process , 2013, CHI.

[5]  E. Rosenbloom A probabilistic interpretation of the final rankings in AHP , 1997 .

[6]  N. Asokan,et al.  Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[7]  Elisa Bertino,et al.  Context-Based Access Control Systems for Mobile Devices , 2015, IEEE Transactions on Dependable and Secure Computing.

[8]  Liang Gu,et al.  Context-Aware Usage Control for Android , 2010, SecureComm.

[9]  George D. Magoulas,et al.  Context-Dependent Personalised Feedback Prioritisation in Exploratory Learning for Mathematical Generalisation , 2009, UMAP.

[10]  Giuseppe F. Italiano,et al.  SecureMyDroid: enforcing security in the mobile devices lifecycle , 2010, CSIIRW '10.

[11]  Jacques Klein,et al.  FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps , 2014, PLDI.

[12]  David A. Wagner,et al.  Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.

[13]  Thomas L. Saaty,et al.  Decision Making for Leaders: The Analytical Hierarchy Process for Decisions in a Complex World , 1982 .

[14]  Seungyeop Han,et al.  These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.

[15]  Hidetoshi Nonaka,et al.  A Proposal of Context-Aware Service Composition Method Based on Analytic Hierarchy Process , 2009 .

[16]  Yaser Mowafi,et al.  A Context-aware Adaptive Security Framework for Mobile Applications , 2014, ICCASA.

[17]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[18]  Paul Jen-Hwa Hu,et al.  A Web-based personalized recommendation system for mobile phone selection: Design, implementation, and evaluation , 2010, Expert Syst. Appl..

[19]  Denzil Ferreira,et al.  Securacy: an empirical investigation of Android applications' network usage, privacy and security , 2015, WISEC.

[20]  Gerhard Fischer,et al.  Context-aware systems: the 'right' information, at the 'right' time, in the 'right' place, in the 'right' way, to the 'right' person , 2012, AVI.

[21]  Songwu Lu,et al.  Accounting for roaming users on mobile data access: issues and root causes , 2013, MobiSys '13.

[22]  Ian Oakley,et al.  CASA: context-aware scalable authentication , 2013, SOUPS.

[23]  William Enck,et al.  AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.

[24]  Ralph E. Steuer,et al.  Multiple Criteria Decision Making, Multiattribute Utility Theory: The Next Ten Years , 1992 .