The daily activities of mobile device users range from making calls and texting to accessing mobile applications, such as mobile banking and online social networks. Mobile phones are able to create, store, and process different types of data, and these data, whether personal, business, or governmental, are related to the owner of the mobile device. More specifically, user activities, such as posting on Facebook, is sensitive and confidential processes with varying degrees of social risk. The current point-of-entry authentication mechanisms, however, consider all applications on the mobile device as if they had the same level of importance; thus maintaining a single level of security for all applications, without any further access control rules. In this research, we argue that on a single mobile application there are different processes operating on the same data, with different social risks based on the user’s actions. More specifically, the unauthorised disclosure or modification of mobile applications data has the potential to lead to a number of undesirable consequences for the user, which in turn means that the risk is changing within the application. Thus, there is no single risk for using a single application. Accordingly, there is a severe lack of protection for user data stored in mobile phones due to the lack of further authentication or differentiated protection beyond the point-of-entry. To remedy that failing, this paper has introduced a new risk assessment model for mobile applications data, called MORI (Mobile Risk) that determines the risk level for each process on a single application. The findings demonstrate that this model has introduced a risk matrix which helps to move the access control system from the application level to the intraprocess application level, based on the risk for the user action being performed on these processes.
[1]
Stanislav Kurkovsky,et al.
Digital natives and mobile phones: A survey of practices and attitudes about privacy and security
,
2010,
2010 IEEE International Symposium on Technology and Society.
[2]
Steven Furnell,et al.
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
,
2007,
Comput. Secur..
[3]
J Davey.
Risk analysis and management.
,
1991,
Studies in health technology and informatics.
[4]
Dimitris Gritzalis,et al.
Assessing Privacy Risks in Android: A User-Centric Approach
,
2013,
RISK@ICTSS.
[5]
Aristide Fattori,et al.
CopperDroid: Automatic Reconstruction of Android Malware Behaviors
,
2015,
NDSS.
[6]
Adam J. Aviv,et al.
Smudge Attacks on Smartphone Touch Screens
,
2010,
WOOT.
[7]
M. G. Morgan,et al.
Risk analysis and management.
,
1993,
Scientific American.
[8]
Steven Furnell,et al.
Biometrics: making the mainstream
,
2014
.
[9]
Steven Furnell,et al.
A Novel Taxonomy for Mobile Applications Data
,
2016
.
[10]
Nathan L. Clarke,et al.
Risk Assessment for Mobile Devices
,
2011,
TrustBus.
[11]
Dimitris Gritzalis,et al.
A Risk Assessment Method for Smartphones
,
2012,
SEC.
[12]
Steven Furnell,et al.
Flexible and Transparent User Authentication for Mobile Devices
,
2009,
SEC.
[13]
Steven Furnell,et al.
Transparent authentication systems for mobile device security: A review
,
2015,
2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).