Performance Measuring in Smartphones Using MOSES Algorithm



Similar documents
Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm

The Behavioral Analysis of Android Malware

Analysis of advanced issues in mobile security in android operating system

Android Security Extensions

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN:

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY

Research on Situation and Key Issues of Smart Mobile Terminal Security

AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring

International Journal of Advance Research in Computer Science and Management Studies

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Fig. 1 BAN Architecture III. ATMEL BOARD

A Research on Camera Based Attack and Prevention Techniques on Android Mobile Phones

Studying Security Weaknesses of Android System

Understanding Android s Security Framework

Accessing Private Network via Firewall Based On Preset Threshold Value

Norton Mobile Privacy Notice

Control Theoretic Adaptive Monitoring Tools for the Android Platform

WIND RIVER SECURE ANDROID CAPABILITY

Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser

Fault-Tolerant Framework for Load Balancing System

A mobile monitoring and alert SMS system with remote configuration A case study for android and the fused location provider

Keyword: Cloud computing, service model, deployment model, network layer security.

A proposal to realize the provision of secure Android applications - ADMS: an application development and management system -

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

Features of AnyShare

Traffic Analyzer Based on Data Flow Patterns

Issues in Android on Mobile Platform and Their Resolution

CMR Journal of Engineering and Technology Vol.1 Issue.1 January 2016

Remote Android Assistant with Global Positioning System Tracking

Remote Desktop on Mobile

How To Protect Your Mobile From Attack From A Signalling Storm

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

9/26/2011. What is Virtualization? What are the different types of virtualization.

Analysis on Virtualization Technologies in Cloud

Architecture (SOSP 2011) 11/11/2011 Minsung Jang

Review of Malware Defense in Mobile Network using Dynamic Analysis of Android Application

Cloud Computing for Agent-based Traffic Management Systems

Firewall-based Solution for Preventing Privilege Escalation Attacks in Android

BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note

Research and Design of Universal and Open Software Development Platform for Digital Home

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

Lynn Margaret Batten. IT Security Research Services & Deakin University, Melbourne, Australia. June 2015

Cloud Computing Architecture: A Survey

A Review of Different Comparative Studies on Mobile Operating System

DiffUser: Differentiated User Access Control on Smartphones

Mobile Image Offloading Using Cloud Computing

Automation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty

RV-Droid: Runtime Verification and Enforcement for Android Applications

GoodData Corporation Security White Paper

3. Security Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

Securing Corporate on Personal Mobile Devices

Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices

QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing

Introduction to Android

In the pursuit of becoming smart

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Monitoring Performances of Quality of Service in Cloud with System of Systems

Detection and Identification of Android Malware Based on Information Flow Monitoring

Flexible Architecture for Internet of Things Utilizing an Local Manager

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load

DOCUMENT REFERENCE: SQ EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015

Application Based Access Control on Cloud Networks for Data Security

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

Interactive Voice Response System by Using Asterisk

Desktop Virtualization Technologies and Implementation

Micro-Environment Sensor based Android Application More Ketan Dadasaheb 1 Computer Department SCSCOE Pune, India Jagtap Pravin Vitthal 3

Influence of Load Balancing on Quality of Real Time Data Transmission*

Deploying iphone and ipad Security Overview

Feature List for Kaspersky Security for Mobile

A UPS Framework for Providing Privacy Protection in Personalized Web Search

Introduction to Android

Are free Android virus scanners any good?

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

Mobile Operating Systems. Week I

Overview - Snort Intrusion Detection System in Cloud Environment

International Journal of Applied Science and Technology Vol. 2 No. 3; March Green WSUS

Android Application for Vehicle Theft Prevention and Tracking System

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Transcription:

Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India, engg.malarvizhi@gmail.com Head of the department ECE, Department of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur,Tamilnadu, India, P.Rajeswari2k5@gmail.com ISSN: 2393-994X Abstract: Now a day s most of the people used in smart phones. Smartphone s usage will be increased. So the security level will be implemented in smart phones are important one. MOSES algorithm improves the security in smart phones. Because it will provide separate security in data and application using virtualization techniques. We run a set of experiments using MOSES algorithm. In the simulation results the Smartphone s performance overhead is high. we proposed a modified MOSES algorithm in order to reduce the performance overhead. Keywords Android Security, virtualization, Performance measuring, Performance overhead. 1.INTRODUCTION: Smartphones usage increasingly, and many users carry multiple phones to accommodate work, personal, and geographic mobility needs. Smartphones have become omnipresent devices. They combine the computing power previously known from desktop computers with the mobility and connectivity of cellular phones. Several device manufacturers are even following this trend by producing smart phones able to handle two subscriber identification modules (SIMs) at the same time. Here the third party application also installed. So security issues can arise any malicious person can open E-mail leakage of data. One possible solution to this problem by isolating applications and data related to work separated from recreational applications and private/personal data. Within the same device, separate security environments might exist: one security environment could be only restricted to sensitive/corporate data and trusted applications; a second security environment could be used for entertainment where third-party games and popular applications could be installed. The second environment cannot access data from first environment. Such a solution could be implemented by means of virtualization technologies. The network, storage and server these type of virtualization are used in the IT network companies. 2. ANDROID SECURITY: Android is open source platform, developers will work along to enhance it. Android platform is multitasking software; therefore no application will gain critical access to the components of OS. Android platform is UNIX based operating system that is the most secure operating system. The developers need a unique signature to publish their application on market. Users will report a possible security flaw through their Google account.all applications on android need permission from the user at the time of installation. 3. RELATED WORK: 3.1 A System for Enforcing Fine-Grained Context-Related Policies on Android: Current smartphone systems allow the user to use only marginally contextual information to specify the behavior of the applications: this hinders the wide adoption of this technology to its full potential. The concept of context-related access control is not new, this is the first work that brings this concept into the smartphone environment. In particular, a context can be defined by: the status of variables sensed by physical (lowlevel) sensors, like time and location; additional processing on these data via software (high level) sensors; or particular interactions with the users or third parties. CRêPE allows context-related policies to be set (even at runtime) by both the user and authorized third parties locally or remotely (via SMS, MMS, Bluetooth, and QR-code). 349

3.2 Bring Your Own Device Approaches: Besides approaches to improve Android security in general, some solutions specifically aimed at supporting the BYOD have been proposed. 3.2.1 Secure Container: ISSN: 2393-994X Secure container is a special mobile client application that creates an isolated environment on the phone at the application layer. The application allows an enterprise administrator to create policies which control this isolated environment but cannot control the behaviour of a user outside this container. 3.2.2 Mobile Virtualization: Virtualization provides environments that are isolated from each other. The hypervisor is responsible for guaranteeing such isolation and for coordinating the activities of the virtual machines. Virtualization has been widely used in traditional computers because it can: (i) increase security, and (ii) reduce the cost of deployment of applications (the hardware is shared in a secure way). 4. MOSES OVERVIEW: 4.1 Existing System: This section provides an overview of our approach named MOde-of-uses SEparation in Smartphones (MOSES). MOSES provides for separating data and apps dedicated to different contexts that are installed in a single device. For instance, corporate data and apps can be separated from personal data and apps within a single device. Our approach provides compartments where data and apps are stored. MOSES enforcement mechanism guarantees data and apps within a compartment are isolated from others compartments data and apps. These compartments are called Security Profiles in MOSES. Security profile have set of policies and regulation. MOSES is the automatic activation of SP depending on the context, in which the device is being used. A context definition is a Boolean expression defined over any information that can be obtained from the smartphone s raw sensors (e.g., GPS sensor) and logical sensors. Logical sensors are functions which combine raw data from physical sensors to capture specific user behaviours (such as detecting whether the user is running). When a context definition evaluates to true, the SP associated with such a context is activated. It is a possible situation when several contexts, which are associated with different SPs, may be active at the same time. Each SP is associated with an owner of the profile and can be protected with a password. A SP can be created edited locally through an app installed on the device. Additionally, MOSES supports remote SP management. The former possibility may be used by a user of the phone for managing her personal SP, while the latter may be employed by an enterprise administrator to control the work SP. To avoid that the user tampers with the work SP, the security administrator protects the work SP with a password. In this way, MOSES can be used for realising a Mobile Device Management solution to manage remotely the security settings of a fleet of mobile devices. The previous version of MOSES used on Taintdroid to split data between different profiles. In the current version of MOSES, the separation of application data is implemented on the Linux kernel level through file system virtualization approach. 350

Fig. 1 MOSES Architecture 4.2 Advantages: Each security profile can be associated to one (or) more contexts that determine when the profile become active. Both contexts and profiles can be easily and dynamically specified by users. Switching between security profiles can require user interaction (or) Be automatic, efficient, transparent to the user. Virtualization used for file system. Attribute based policies are supported. security profile management will be improved. One of the features introduced in MOSES is the automatic activation of SP depending on the context, in which the device is being used. MOSES can be used for realising a Mobile Device Management solution to manage remotely the security settings of a fleet of mobile devices. 4.3 Disadvantage: The currently working MOSES algorithm does not separate system data (e.g., system configuration files) and information on SD cards. Moreover, performance overheads are high. The energy, storage and security profile switching overhead is high. 5. ARCHITECTURE: MOSES COMPONENTS: 1. Security profile manager: The Security Profile Manager holds the information linking a SP with one or more Context. The Security Profile Manager is responsible for the activation and deactivation of SPs. 2. Moses Hypervisor: The Moses Hypervisor is the component that acts as a policy decision point (PDP) in MOSES. The Moses Hypervisor provides a central point for MOSES security checks against the policies defined for the active SP to regulate access to resources. The Moses Hypervisor delegates the policy checks to its two managers: 1. Moses App Manager 2. Moses Rules Manager. 3. Moses Policy Manager: The Moses Policy Manager acts as the policy administrator point (PAP) in MOSES. It provides the API for creating, updating and deleting MOSES policies. It also allows a user to define, modify, remove monitored Context sand assign them to SPs. Moreover, this component also controls access to MOSES policy database (moses.db) allowing only applications with special permissions to interact with this component. 4. Moses Taint Manager: The Moses Taint Manager component manages the shadow database which stores the taint values used by Taintdroid. In MOSES, we can taint specific rows of a content provider: to be able to perform per row filtering when an app access data in the content provider. For instance, it is possible to filter out from the query result data the rows which contain the information about device identifiers or user contacts. Given the fact that the enforcement of policies depends on the information provided by the Moses Taint Manager, this component acts as a policy information point (PIP). 5. Moses Hypervisor Components: The decisions taken by the Moses Hypervisor need to been forced by the policy enforcement point (PEP). MOSES affects several components within Android middleware where decisions need to be enforced. For this reason, the PEP includes several Android components offering system services such as 351

1. Location Manager 2. Activity Manager Service. 6. Moses Reaper: The enforcement of separated SPs requires special components to manage application processes and file system views The Moses Reaper is the component responsible for shutting down processes of applications no longer allowed in the new SP after the switch. 7. Moses Mounter : In MOSES, applications have access to different data depending on the active profile. To separate data between profiles different file system view are supported. This functionality is provided by the Moses Mounter. To allow the user of the device to interact with MOSES, we provide two MOSES applications: 1. Moses Sp Changer 2. Moses PolicyGui The Moses Sp Changer allows the user to manually activate SP. It communicate with the Moses Hypervisor and sends it a signal to switch to the profile required by the user. The Moses PolicyGui allows the user to manage SPs. 6. IMPLEMENTATION: 6.1 Context Detection: The context detection used for identifying which security profile will be activated. Here three types of security profiles are used. To separate different security profiles each security profile have own Context_id. 6.2 Filesystem Virtualization: The file system virtualization used for separate different data in to different security profile. Virtualization means creation of virtual something. Here the file will be created virtually and data stored in different security profiles. 6.3 Dynamic Application Activation: Each SP is assigned with a list of application UIDs that are allowed to be run when this profile is active. MOSES uses these identifiers to control which applications can be activated for each SP. During the SP switching, the MosesAppManager selects from the MOSES database the list of UIDs, which are allowed in the activated profile, and stores it into the set of allowed UIDs. When a new SP is activated, only the of the allowed applications for this profile will be displayed. 6.4 Attribute-Based Policies: Within each SP, MOSES enforces an attribute based access control (ABAC) model. In the concept the system want to installed the application otherwise it deny the application. 6.5 Security Profile Management: The security profile management used to manage the different security profiles with in a single device. 7.PROPOSED SYSTEM: 7.1 Modified MOSES algorithm : ISSN: 2393-994X In the existing system the Performance are measured energy, storage, security profile switching. These performance are measured using network simulator -2. In the simulation results the performance of energy, storage, security profile switch overhead is high. To overcome this problem this MOSES algorithm will be changed in small level. Energy consumption, Storage size and Security profile switching will be reduced by changing in the program. 352

7.2 Proposed system advantages: The modified MOSES algorithm reduce the performance overhead. Energy, storage and security profile switch usage reduced. System Operate in a speed manner. 7.3 Proposed system disadvantage: This algorithm not implemented in real time mobile phone because the cost in expensive. 8. PERFORMANCE EVALUATION: 8.1 Network Simulator NS-2: NS-2 is an open-source simulation tool running on Unix-like operating systems. It is a discreet event simulator. It has many advantages that make it a useful tool, such as support for multiple protocols and the capability of graphically detailing network traffic. 8.2 Simulation setting: ISSN: 2393-994X We conducted the simulation experiments using network simulator-2 and considered the network with 10 mobile nodes. Here the base station transmit the packets randomly. The MOSES algorithm will be running on background, it will measure the smartphones energy, storage and security profile switching. The simulation setting shows in fig.2. In the evaluation interval, packetsize, delay, control overhead, average energy consumption, residual energy consumption, normalized overhead. 8.3 Simulation results: 8.3.1 Energy Overhead: Fig.2Simulation setting To measure the energy overhead produced by MOSES, we performed the following tests. We charged the battery of our device to the 100 percent. Then, every 10 minutes we run in ten mobile application using moses algorithm. The different ten applications are running and moses the algorithm measured the total amount of usage energy. We executed this experiment for 353

two types of systems: MOSES without SP changes, and MOSES with SP changes. The results of this experiment are reported in Fig.3,4,5. Here interval, average energy consumption are calculated. Also residual energy is calculated, residual energy means remaining energy in the phone. Average energy consumption with security profile is high compare to without security profile switching in smartphone Fig. 3 Interval against delay Fig.4 Average energy consumption 354

Fig. 5Average residual energy consumption 8.3.2 Storage Overhead: One of the most significant overheads produced by MOSES is the storage overhead. In fact, the separation of data for different SPs means that some application information will be duplicated in different profiles. In general, the storage size consumed where OS. MOSES measure the storage performance show fig.6,7. Fig.6 Packetsize against control overhead 355

Fig.7 Packetsize against normalized overhead 7.3 Security Profile Switch Overhead: In this section, we present the results of the experiments measuring the time required to switch between SPs. We remind that during the profile switch (from an old to a new profile), MOSES performs the following security profile switching in fig.8,9. Fig.8 Interval against control overhead 356

Fig. 9 Interval against normalized overhead 8 CONCLUSIONS AND FUTURE WORK: Moses provide improve security by isolating data and application by using software. In the project provide security and measuring performance using with security profile and without security profile. Here the energy, storage and security profile switching performances are measured. In the results the performance overhead is present. In future this moses algorithm is modified and reduce the performance overhead and implemented in real time smartphone. REFERENCES [1] Gartner Says Smartphone Sales Accounted for 55 Percent of Overall Mobile Phone Sales in Third Quarter of 2013. [2] Are Your Sales Reps Missing Important Sales Opportunities? 2014. [3] Unisys Establishes a Bring Your Own Device (BYOD) Policy, 2014. [4] W. Enck, P. Gilbert, B.-G. Chun, L.P. Cox, J. Jung, P. McDaniel, and A.N. Sheth, Taintdroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, Proc. Ninth USENIX Conf. Operating Systems Design and Implementation (OSDI 10), pp. 1-6, 2010. [5] C. Gibler, J. Crussell, J. Erickson, and H. Chen, AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale, Proc. Fifth Int l Conf. Trust and Trustworthy Computing (TRUST 12), pp. 291-307, 2012. [6] Y. Xu, F. Bruns, E. Gonzalez, S. Traboulsi, K. Mott, and A. Bilgic, Performance Evaluation of Para-Virtualization on Modern Mobile Phone Platform, Proc. Int l Conf. Computer, Electrical, and Systems Science and Eng. (ICCESSE 10), 2010. 357