Abdullah M. Basahel, Adnan Ahmed Abi Sen, Mohammad Yamin, N. Bahbouh
{"title":"保护移动设备及其应用程序隐私的硬件和软件解决方案","authors":"Abdullah M. Basahel, Adnan Ahmed Abi Sen, Mohammad Yamin, N. Bahbouh","doi":"10.1109/INDIACom51348.2021.00069","DOIUrl":null,"url":null,"abstract":"Smartphones have become one of the basic necessities for everyday life. People spend a lot of their time on smartphones to browse the internet, chat, listen to music, play games, watch movies, and even do job related processing. One of the most important challenges and problems of smartphones is protecting the privacy of users. As we know, we now have billions of applications, many of which attract a large number of malicious applications that can monitor mobile phone users and discover a lot of their sensitive and confidential information. This research proposes a minor modification in the design of the software and hardware of smart phones, to ensure stronger protection for the user from any malicious application, even from the manufacturer of the device. The idea is based on building a physical lockout mechanism for some of the sensored devices, such as the camera and microphone, in addition to relaying alerts, and forcing user to accept requests before accessing any information. Acceptance of user requests is forced by overriding predefined permissions, which are usually difficult to track and manage. The research also provides an overview of a specialized platform which can easily assess the credibility of applications which exhibit strange behavior. We provide the details of the method, with simulation, for realising the suggested ideas into practice. We also discuss the benefits of the proposed improvements in the level of privacy and security, compared to the current situation.","PeriodicalId":415594,"journal":{"name":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hardware and Software Solution for Preserving Privacy of Mobile Devices and their Applications\",\"authors\":\"Abdullah M. Basahel, Adnan Ahmed Abi Sen, Mohammad Yamin, N. Bahbouh\",\"doi\":\"10.1109/INDIACom51348.2021.00069\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Smartphones have become one of the basic necessities for everyday life. People spend a lot of their time on smartphones to browse the internet, chat, listen to music, play games, watch movies, and even do job related processing. One of the most important challenges and problems of smartphones is protecting the privacy of users. As we know, we now have billions of applications, many of which attract a large number of malicious applications that can monitor mobile phone users and discover a lot of their sensitive and confidential information. This research proposes a minor modification in the design of the software and hardware of smart phones, to ensure stronger protection for the user from any malicious application, even from the manufacturer of the device. The idea is based on building a physical lockout mechanism for some of the sensored devices, such as the camera and microphone, in addition to relaying alerts, and forcing user to accept requests before accessing any information. Acceptance of user requests is forced by overriding predefined permissions, which are usually difficult to track and manage. The research also provides an overview of a specialized platform which can easily assess the credibility of applications which exhibit strange behavior. We provide the details of the method, with simulation, for realising the suggested ideas into practice. We also discuss the benefits of the proposed improvements in the level of privacy and security, compared to the current situation.\",\"PeriodicalId\":415594,\"journal\":{\"name\":\"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-03-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INDIACom51348.2021.00069\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 8th International Conference on Computing for Sustainable Global Development (INDIACom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIACom51348.2021.00069","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hardware and Software Solution for Preserving Privacy of Mobile Devices and their Applications
Smartphones have become one of the basic necessities for everyday life. People spend a lot of their time on smartphones to browse the internet, chat, listen to music, play games, watch movies, and even do job related processing. One of the most important challenges and problems of smartphones is protecting the privacy of users. As we know, we now have billions of applications, many of which attract a large number of malicious applications that can monitor mobile phone users and discover a lot of their sensitive and confidential information. This research proposes a minor modification in the design of the software and hardware of smart phones, to ensure stronger protection for the user from any malicious application, even from the manufacturer of the device. The idea is based on building a physical lockout mechanism for some of the sensored devices, such as the camera and microphone, in addition to relaying alerts, and forcing user to accept requests before accessing any information. Acceptance of user requests is forced by overriding predefined permissions, which are usually difficult to track and manage. The research also provides an overview of a specialized platform which can easily assess the credibility of applications which exhibit strange behavior. We provide the details of the method, with simulation, for realising the suggested ideas into practice. We also discuss the benefits of the proposed improvements in the level of privacy and security, compared to the current situation.