Skip to main content

A Context-Based Personalization for Mobile Applications’ Network Access

  • Conference paper
  • First Online:
Book cover Mobile Web and Intelligent Information Systems (MobiWIS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9847))

Included in the following conference series:

  • 1175 Accesses

Abstract

In this paper, we propose a context-based framework for eliciting context information and adapting this information with mobile applications network access decision mechanism. The framework leverages the execution of mobile applications inside a sandbox to control the communication between mobile applications and mobile device resources. Applications’ access requests are analyzed based on user’s context information collected from the mobile device sensors and the application network access configuration. We validate our proposed framework in Android Operating System running on handheld smartphone devices. Preliminary results revealed the efficacy of our proposed context-based framework in providing network access control management based on users’ context information at run-time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fischer, G.: Context-aware systems—the ʻRightʼ information, at the ʻRightʼ time, in the ʻRightʼ place, in the ʻRightʼ way, to the ʻRightʼ person. In: AVI 2012, Capri Island, Italy (2012)

    Google Scholar 

  2. Almuhimed, H., et al.: Your location has been shared 5,398 times! A field study on mobile app privacy nudging. In: Proceeding CHI 2015 Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, New York (2015)

    Google Scholar 

  3. Tu, G.-H., et al.: Accounting for roaming users on mobile data access issues and root causes. In: Proceeding of the 11th Annual International Conference on Mobile Systems, Applications and Services. ACM (2013)

    Google Scholar 

  4. Fu, H., et al.: A field study of run-time location access disclosures on android smartphones. In: USEC 2014. Internet Society (2014)

    Google Scholar 

  5. Ferreira, D., et al.: Securacy: an empirical investigation of android applications’ network usage, privacy and security. In: WiSec 2015, New York (2015)

    Google Scholar 

  6. Distefano, A., et al.: Securemydroid: enforcing security in the mobile devices lifecycle. In: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, ser. CSIIRW 2010. ACM, New York (2010)

    Google Scholar 

  7. Hornyack, P., et al.: These aren’t the droids you’re looking for: retrofitting android to protect data from imperious applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, ser. CCS 2011. ACM, New York (2011)

    Google Scholar 

  8. Balebako, R., et al.: Little brothers watching you: raising awareness of data leaks on smartphones. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, ser. SOUPS 2013. ACM – Association for Computing Machinery (2013)

    Google Scholar 

  9. Rastogi, V., Chen, Y., Enck, W.: Appsplayground: automatic security analysis of smartphone applications. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. ACM (2013)

    Google Scholar 

  10. Mowafi, Y., et al.: A context-aware adaptive security framework for mobile computing applications. In: the 4th International Workshop on Context Aware Middleware for Ubiquitous Environments (PerCAM 2014), UAE, Dubai (2014)

    Google Scholar 

  11. Dyer, J.S., et al.: Multiple criteria decision making, multiattribute utility theory: the next ten years. Manag. Sci. 38(5), 645–654 (1992)

    Article  MATH  Google Scholar 

  12. Rosenbloom, E.S.: A probabilistic interpretation of the final rankings in AHP. Eur. J. Oper. Res. 96(2), 371–378 (1997)

    Article  MATH  Google Scholar 

  13. Koumoto, Y., Nonaka, H., Yanagida, T.: A proposal of context-aware service composition method based on analytic hierarchy process. In: Nakamatsu, K., Phillips-Wren, G., Jain, L.C., Howlett, R.J. (eds.) New Advances in Intelligent Decision Technologies. SCI, vol. 199, pp. 65–71. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  14. Cocea, M., Magoulas, G.: Context-dependent personalised feedback prioritisation in exploratory learning for mathematical generalisation. In: Houben, G.-J., McCalla, G., Pianesi, F., Zancanaro, M. (eds.) UMAP 2009. LNCS, vol. 5535, pp. 271–282. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  15. Chen, D.-N., et al.: A Web-based personalized recommendation system for mobile phone selection: design, implementation, and evaluation. Expert Syst. Appl. 37(12), 8201–8210 (2010)

    Article  Google Scholar 

  16. Saaty, T.L.: Decision Making for Leaders: The Analytic Hierarchy Process for Decisions in a Complex World. RWS Publications, Pittsburgh (1999)

    Google Scholar 

  17. Enck, W., et al.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, ser. OSDI 2010. USENIX Association, Berkeley (2010)

    Google Scholar 

  18. Kelley, P.G., Cranor, L.F., Sadeh, N.: Privacy as part of the app decision-making process. In: CHI 2013 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, New York (2013)

    Google Scholar 

  19. Arzt, S., et al.: Flowdroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. In: Proceedings of the 35th Annual ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI 2014) (2014)

    Google Scholar 

  20. Felt, A., et al.: Android permissions: user attention, comprehension, and behavior. In: SOUPS 2012 Proceedings of the Eighth Symposium on Usable Privacy and Security. ACM, New York (2012)

    Google Scholar 

  21. Fischer, K., Karsch, S.: Modelling security relevant context an approach towards adaptive security in volatile mobile web environments. In: International Conference on Web Science, Germany, Koblenz (2011)

    Google Scholar 

  22. Hayashi, E., et al.: CASA: context-aware scalable authentication. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, ser. SOUPS 2013. ACM, New York (2013)

    Google Scholar 

  23. Gupta, A., et al.: Intuitive security policy configuration in mobile devices using context profiling. In: Proceedings of the 2012 ASE/IEEE International Conference on Social Computing and 2012 ASE/IEEE International Conference on Privacy, Security, Risk and Trust, ser. SOCIALCOM-PASSAT 2012. IEEE Computer Society, Washington (2012)

    Google Scholar 

  24. Bai, G., Gu, L., Feng, T., Guo, Y., Chen, X.: Context-aware usage control for android. In: Jajodia, S., Zhou, J. (eds.) SecureComm 2010. LNICST, vol. 50, pp. 326–343. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  25. Prakash, S., et al.: A proposed approach for mobile devices with context based access control mechanism. Int. J. Adv. Res. Comput. Sci. Technol. (IJARCST) 3(1–2), 149–150 (2015)

    MathSciNet  Google Scholar 

  26. Shebaro, B., Oluwatimi, O., Bertino, E.: Context-based access control systems for mobile devices. IEEE Trans. Dependable Secure Comput. 12(2), 150–163 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yaser Mowafi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Mowafi, Y., Alaqarbeh, T., Alazrai, R. (2016). A Context-Based Personalization for Mobile Applications’ Network Access. In: Younas, M., Awan, I., Kryvinska, N., Strauss, C., Thanh, D. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2016. Lecture Notes in Computer Science(), vol 9847. Springer, Cham. https://doi.org/10.1007/978-3-319-44215-0_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44215-0_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44214-3

  • Online ISBN: 978-3-319-44215-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics