CFP last date
22 April 2024
Reseach Article

Securities in Android using SELinux

by S. S. Sambare, Sneha Bhambhani, Ritesh Tejwani, Prerana Rai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 165 - Number 7
Year of Publication: 2017
Authors: S. S. Sambare, Sneha Bhambhani, Ritesh Tejwani, Prerana Rai
10.5120/ijca2017913931

S. S. Sambare, Sneha Bhambhani, Ritesh Tejwani, Prerana Rai . Securities in Android using SELinux. International Journal of Computer Applications. 165, 7 ( May 2017), 36-38. DOI=10.5120/ijca2017913931

@article{ 10.5120/ijca2017913931,
author = { S. S. Sambare, Sneha Bhambhani, Ritesh Tejwani, Prerana Rai },
title = { Securities in Android using SELinux },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 165 },
number = { 7 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 36-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume165/number7/27587-2017913931/ },
doi = { 10.5120/ijca2017913931 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:11:49.669254+05:30
%A S. S. Sambare
%A Sneha Bhambhani
%A Ritesh Tejwani
%A Prerana Rai
%T Securities in Android using SELinux
%J International Journal of Computer Applications
%@ 0975-8887
%V 165
%N 7
%P 36-38
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the increase in technology, the current use of mobile phones is increasing with a rigorous amount and so we need to assure that the information stored in our cell phones is secure and is not being misused. The apps when installed in Android do not provide high level security to the information present in our cell phones and thus the implementation of SELinux helps in securing the information more effectively. Android being a Linux based system can support SELinux and thus provide users with a robust Mandatory Access Control (MAC) to ensure full system security. It not only provides flexible security but also helps in reduction of performance overhead only by implementing a limited chip area.

References
  1. Simone Mutti, Enrico Bacis, “An SELinux based intent manager for Android”, IEEE CNS 2015.
  2. Prof Dr. Frank Bellosa, Stefan Brahler, “Analysis of Android Architecture”, IEEE 2015.
  3. Lukas Aron and Petr Hanacok at BRNO university of technology, “Introduction to Android 5 Security ”, CEUR-ws.org, 2014.
  4. Chetan C Kotkar, Pravin Game, “Exploring Security mechanisms to Android Device”, International Journal Of Advanced Computer Research, 2013.
  5. Han Bing at North China University of Technology,”Analysis and research of system security based on Android ”, 5th International Conference of Intelligent computation technology and automation, 2012
  6. Asaf Shabtai, Yuval Feldel and Yuval Elovici at Ben-Guiron University, “Securing Android Powered Mobile devices using SELinux ”, IEEE 2010.
  7. SELinux/Tutorials/Creating your own policy module file https://wiki.gentoo.org/wiki/SELinux/Tutorials/Creating_your_own_policy_module_file
  8. Building a Local Policy Module https://www.centos.org/docs/5/html/Deployment_Guide-en-US/sec-sel-building-policy-module.html
Index Terms

Computer Science
Information Sciences

Keywords

Android SELinux Security Mobile devices MAC.