Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Securities in Android using SELinux

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
S. S. Sambare, Sneha Bhambhani, Ritesh Tejwani, Prerana Rai
10.5120/ijca2017913931

S S Sambare, Sneha Bhambhani, Ritesh Tejwani and Prerana Rai. Securities in Android using SELinux. International Journal of Computer Applications 165(7):36-38, May 2017. BibTeX

@article{10.5120/ijca2017913931,
	author = {S. S. Sambare and Sneha Bhambhani and Ritesh Tejwani and Prerana Rai},
	title = {Securities in Android using SELinux},
	journal = {International Journal of Computer Applications},
	issue_date = {May 2017},
	volume = {165},
	number = {7},
	month = {May},
	year = {2017},
	issn = {0975-8887},
	pages = {36-38},
	numpages = {3},
	url = {http://www.ijcaonline.org/archives/volume165/number7/27587-2017913931},
	doi = {10.5120/ijca2017913931},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

With the increase in technology, the current use of mobile phones is increasing with a rigorous amount and so we need to assure that the information stored in our cell phones is secure and is not being misused. The apps when installed in Android do not provide high level security to the information present in our cell phones and thus the implementation of SELinux helps in securing the information more effectively. Android being a Linux based system can support SELinux and thus provide users with a robust Mandatory Access Control (MAC) to ensure full system security. It not only provides flexible security but also helps in reduction of performance overhead only by implementing a limited chip area.

References

  1. Simone Mutti, Enrico Bacis, “An SELinux based intent manager for Android”, IEEE CNS 2015.
  2. Prof Dr. Frank Bellosa, Stefan Brahler, “Analysis of Android Architecture”, IEEE 2015.
  3. Lukas Aron and Petr Hanacok at BRNO university of technology, “Introduction to Android 5 Security ”, CEUR-ws.org, 2014.
  4. Chetan C Kotkar, Pravin Game, “Exploring Security mechanisms to Android Device”, International Journal Of Advanced Computer Research, 2013.
  5. Han Bing at North China University of Technology,”Analysis and research of system security based on Android ”, 5th International Conference of Intelligent computation technology and automation, 2012
  6. Asaf Shabtai, Yuval Feldel and Yuval Elovici at Ben-Guiron University, “Securing Android Powered Mobile devices using SELinux ”, IEEE 2010.
  7. SELinux/Tutorials/Creating your own policy module file https://wiki.gentoo.org/wiki/SELinux/Tutorials/Creating_your_own_policy_module_file
  8. Building a Local Policy Module https://www.centos.org/docs/5/html/Deployment_Guide-en-US/sec-sel-building-policy-module.html

Keywords

Android, SELinux, Security, Mobile devices, MAC.