device policy manager in android - international journal of

4
Device Policy Manager in Android Sumaiya Patel 1 , Darshana Thakur 2 , Sujit Sherkar 3 , Priyanka Dhamane 4 , Nandkishor Karlekar 5 1,2,3,4,5 Information Technology Department PadmabhushanVasantdadaPatilPratishthan’s College of Engineering, Mumbai, India Abstract Android is a modern mobile platform that was designed to be truly open. Android has been subjected to a professional security program.Android uses permission based security model which has central role hence it creates security holes in Android OS. Hence we propose a security based application for Android OS. The application allows its user to have two accounts i.e. Administrator and Guest.This is similar to account we make in Desktop OS.The picture of user will be clicked using front camera if logged on using Guest account. Keywords: Android OS, Permission based security model, central role 1.Introduction Android provides an open source platform and application environment for mobile devices. Android core operating system[1] is built on top of the Linux kernel. All device resources, like camera functions, GPS data, Bluetooth functions, telephony functions, network connections, etc. are accessed through the operating system. It was designed with device users in mind. Users are provided visibility into how applications work, and control over those applications. This design includes the expectation that attackers would attempt to perform common attacks. The Android update service[2] delivers new capabilities and security updates to Android devices, including updates through the web. The need may arise for a person to share the mobile or tablet with other person. So the Owner of the device can secure it by having Administrator and Guest accounts, the same way in Desktop PC. Also the device can be accessed by the person who is not the owner of the device wants to make a call or share file. These features can be allowed for the guest. 2. Present System Android seeks to be the most secure and usable operating system for mobile platforms by re- purposing traditional operating system security controls to: Protect user data Protect system resources (including the network) Provide application isolation. By default the android phone having security that allows only a single user sign on. There is no guest option or the camera clicking option as well this person is the owner or the administrator for the phone. So there is chances to misuse of that data. The current android Operating System [3] does not have a facility to create user account. Sumaiya Patel et al , Int.J.Computer Technology & Applications,Vol 4 (3),374-377 374 ISSN:2229-6093

Upload: others

Post on 09-Feb-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

camera of device if available and then will be saved

on to the device.’

7. Future Scope

This application can be helpful in organizations

where the owner provide the employees tablets.

For maintaining the security and integrity of data

handle in organizations folder and file like .pdf and

.doc can also locked for guest implemented in

Device policy Manager.

8. Conclusion

In this paper, we presented full smart Android

security over existing System that allows android

users to create two account in phone and access these

account easily without any security fear. And also the

user share their phone with anyone without extra

activities like SIM lock from their DPM application

through our prototype, mobile security applications

installed in the phone easily. The provided security is high level, because you can’t access any function till

you does not enter the correct password.

Our prototype also boosts the performance of mobile

applications by providing face capturing and call

locking resources for admin beneficial, without

draining the device battery.

9. References

[1] "Android.com," Available:

http://www.android.com

[2] W. Enck, M. Ongtang, and P. McDaniel.

Understanding Android security. IEEE Security &

Privacy Magazine,7(1):10–17, 2009. [3] Technical Blog of SaiGeetha dedicated to

Android, http://saigeethamn.blogspot.com/

[4] Daecon, John. 2009. Model-View-Controller

(MVC) Architecture.

[5]Sayed Y Hashimi and SatyaKomatineni, “Pro

Android”, Wiley India Pvt Ltd. (2009)

[6]Android Developers official website,

http://developer.android.com/guide/topics/ui/index.ht

ml

[7] A visual interface editor for Android,

http://www.droiddraw.org/

[8]http://elinux.org/Android_Architecture.

Sumaiya Patel et al , Int.J.Computer Technology & Applications,Vol 4 (3),374-377

377

ISSN:2229-6093

IJCTA | May-June 2013 Available [email protected]