Survey Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016
A Survey Paper on Location Based Device Management Policy Framework for Smart Phone Users
Chinar Bhandari, M. D. Ingle
Smart Phone Apps have numerous sources to access the sensitive data and vital resources within the user mobile phone. This vital data can be a threat for the user from the malicious apps which use your sensitive data for numerous purpose like privacy leakage or security threat. For Example A mischievous app recording your private business data or an unwanted app capturing your personal data can lead it to a security threat. So the main cause of this situation starts from that the android phone user has no control over his own device which leads to no control over his own data. Once the mischievous app has been granted with its access privileges, the android user simply loses control over all his sensitive information. However whether the granted access should work at any specific context or region can be handled by the device user by disabling the permissions or simply by revoking them. So in this paper we present you Location based policy management framework for smart phone user which helps you to set your own user policies at a given context/region where the user demands that none of the misleading apps should access his sensitive data. We have performed several test at different regions with different user policies to check if they work accurately.
Keywords: Location Based Access, Context Based Management, Device policy, Device administration, Framework
Edition: Volume 5 Issue 5, May 2016
Pages: 375 - 377
How to Cite this Article?
Chinar Bhandari, M. D. Ingle, "A Survey Paper on Location Based Device Management Policy Framework for Smart Phone Users", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163299, Volume 5 Issue 5, May 2016, 375 - 377
123 PDF Views | 110 PDF Downloads
Similar Articles with Keyword 'Framework'
The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence
Vina Lomte, Saloni Shah
A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN
Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System
Digvijay A. Patil, Yogesh B. Gurav
Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
Parallel Data Shuffling for Hadoop Acceleration with Network Levitated Merge and RDMA for Interconnectivity
Kishorkumar Shinde, Venkatesan N.