smart map with privacy protection

Mohammed Faisal.H,Azarudeen.A,Manikandan.V,M.Ahsan Shariff

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 27 March,2017         Pages:1286-1292

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

In smart city, all kinds of users data are stored in electronic devices to make everything intelligent. A Smartphone is the most widely used electronic device and it is the pivot of all smart systems. However, current smart phones are not competent to manage users sensitive data, and they are facing the privacy leakage caused by data over-collection. Data over-collection, which means smart phones apps collect users data more than its original function while within the permission scope, is rapidly becoming one of the most serious potential security hazards in smart city. In this paper, we study the current state of data over-collection and study some most frequent data over-collected cases. To prevent the data over-collection we show the smart things which is near by the user. We present a mobile-cloud framework, which is an active approach to eradicate the data over-collection. By putting all users data into a cloud, the security of users data can be greatly improved. We have done extensive experiments and the experimental results have demonstrated the effectiveness of our approach.

Kewords

Smart city, Smartphone, cyber security and privacy, data over-collection

Reference

[1] Schneider. (2014). Go green in the city [Online]. Available: http:// 2014.gogreeninthecity.com/smart-cities.html [2] M. Egele, C. Kruegel, E. Kirda, and G. Vigna, “PiOS: Detecting privacy leaks in iOS applications,” in Proc. 18th Annu. Netw. Distrib. Syst. Security Symp., 2011, pp. 1–15. [3] W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth, “Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones,” in Proc. USENIX 9th Conf. Oper. Syst. Design Implementation, 2010, pp. 1–6. [4] W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, “A study of Android application security,” in Proc. 20th USENIX Conf. Security, 2011, p. 21. [5] A. Bose, X. Hu, K. G. Shin, and T. Park, “Behavioral detection of malware on mobile handsets,” in Proc. ACM 6th Int. Conf. Mobile Syst., Appl., Services, 2008, pp. 225–238. [6] A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, “A survey of mobile malware in the wild,” in Proc. ACM 1st Workshop Security Privacy Smartphones Mobile Devices, 2011, pp. 3–14. [7] J. Cheng, S. H. Wong, H. Yang, and S. Lu, “Smartsiren: Virus detection and alert for smartphones,” in Proc. ACM 5th Int. Conf. Mobile Syst., Appl. Services, 2007, pp. 258–271. [8] Appthority. (2014). App reputation report [Online]. Available: https://www.appthority.com/app-reputation-report/report/ AppReputationReportS ummer14.pdf [9] L. Musthaler. (2013). At least 80% of mobile apps have security and privacy issues that put enterprises at risk [Online]. Available: http://www.networkworld.com/article/2163225/ infrastructure-management/at-least-80-of-mobile-apps-havesecurity- and-privacy-issues-that-put-ente.html