AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings

نویسندگان

  • Giuseppe Petracca
  • Ahmad Atamli-Reineh
  • Yuqiong Sun
  • Jens Grossklags
  • Trent Jaeger
چکیده

System designers have long struggled with the challenge of determining how to control when untrusted applications may perform operations using privacy-sensitive sensors securely and effectively. Current systems request that users authorize such operations once (i.e., on install or first use), but malicious applications may abuse such authorizations to collect data stealthily using such sensors. Proposed research methods enable systems to infer the operations associated with user input events, but malicious applications may still trick users into allowing unexpected, stealthy operations. To prevent users from being tricked, we propose to bind applications’ operation requests to the associated user input events and how they were obtained explicitly, enabling users to authorize operations on privacy-sensitive sensors unambiguously and reuse such authorizations. To demonstrate this approach, we implement the AWare authorization framework for Android, extending the Android Middleware to control access to privacy-sensitive sensors. We evaluate the effectiveness of AWare in: (1) a laboratory-based user study, finding that at most 7% of the users were tricked by examples of four types of attacks when using AWare, instead of 85% on average for prior approaches; (2) a field study, showing that the user authorization effort increases by only 2.28 decisions on average per application; (3) a compatibility study with 1,000 of the most-downloaded Android applications, demonstrating that such applications can operate effectively under AWare.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Privacy-Aware Service Protocol for Ubiquitous Computing Environments

In a ubiquitous computing environment, every service should have the characteristic of context-awareness and location information is an important factor to grasp a user’s context. Thus, location privacy is an major security issue of ubiquitous computing environment. Most research on location privacy is focused on protecting the location information itself. However, not only prohibiting acquirem...

متن کامل

Privacy of Mobile Users in Context-aware Computing Environments

This thesis provides a solution to address the difficulty of design and development of privacy-sensitive context-aware applications that can be used in peoples " everyday life without the concerns regarding potential abuse. Users would like to be able to control who can access their contextual information, with what granularity, and in which situations. These users " privacy preferences must be...

متن کامل

Sentry@Home - Leveraging the Smart Home for Privacy in Pervasive Computing

This article introduces a privacy framework for Smart Homes, supporting individuals roaming freely in pervasive computing environments. Such environments typically are equipped with different kinds of sensors and tracking devices for context-aware service provisioning. While on the one hand, people want to take advantage of the comfort and added value of personalized context-aware services, pri...

متن کامل

A Review on Privacy Control Techniques in Context-aware Web Services

A context is being termed as " some information which can be utilized to identify the present condition of any entity " [1]. In a real time scenario, numerous examples related to the context are given such as location, time, temperature, noise, the bandwidth of communication, connectivity of network etc. " A system is considered to be context aware if it utilizes the context in an effort to pro...

متن کامل

Security and Privacy in your Smart City

With the majority of the population living in urban environments today, the concept of Smart Cities has become an urgent necessity. It refers to an urban transformation which, using latest ICT technologies, makes cities more efficient. Composed of a growing Internet of networks, such as the one connecting humans via cellular systems, computers via broadband connections, or objects and sensors v...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017