amazon

Sunday, November 23, 2014

Collaborative Policy Administration


Collaborative Policy Administration

ABSTRACT:
Policy-based management is a very effective method to protect sensitive information. However, the overclaim of privileges is widespread in emerging applications, including mobile applications and social network services, because the applications’ users involved in policy administration have little knowledge of policy-based management. The overclaim can be leveraged by malicious applications, then lead to serious privacy leakages and financial loss. To resolve this issue, this paper proposes a novel policy administration mechanism, referred to as collaborative policy administration (CPA for short), to simplify the policy administration. In CPA, a policy administrator can refer to other similar policies to set up their own policies to protect privacy and other sensitive information. This paper formally defines CPA and proposes its enforcement framework. Furthermore, to obtain similar policies more effectively, which is the key step of CPA, a text mining-based similarity measure method is presented. We evaluate CPA with the data of Android applications and demonstrate that the text mining-based similarity measure method is more effective in obtaining similar policies than the previous category-based method.

EXISTING SYSTEM:
The traditional framework of policy-based management consists of four core components policy decision point (PDP), policy enforcement point (PEP), policy administration point (PAP), and policy repository (PR). A well-trained policy administrator or group will specify, verify policies in PAP, and deploy the policies in PR. After a system runs, PDP will retrieve applicable policies from PR and make decisions. PEP takes charge of the decision, such as satisfying the request where a subject wants to open a file (authorization action), or launching a logger to record system context (obligation action). The overclaim of privileges, where a not well-trained administrator assigns more privileges than those which are normally required by a subject, is an increasingly serious problem, especially when the method of policy-based management is applied to emerging application scenarios, such as mobile applications  and social network services.

DISADVANTAGES OF EXISTING SYSTEM:
] Application users may not know what the requested permissions mean, thus approving all requests because they are eager to use the application.

] User will approve all requests from third-party applications, because User wants to run the applications, thus falling into the traps of malicious applications.

] The User leakage of their privacy.



PROPOSED SYSTEM:
This paper proposes collaborative policy administration (CPA). The essential idea of CPA is that applications with similar functionalities shall have similar policies that will be specified and deployed. Thus, to specify or verify policies, CPA will examine policies already specified by other similar applications and perform collaborative recommendation. The degree of similarity will be calculated by predefined algorithms, which could be a category-based algorithm, a text mining-based algorithm, novel method, enforcement framework and implement a prototype of CPA. The framework supports two types of user interfaces and provides functions of collaborative policy design and collaborative policy verification.

ADVANTAGES OF PROPOSED SYSTEM:
ü Collaborative policy verification helps the end users identify malicious permission requests.
ü Can develop securer and more acceptable applications for end users.

MODULES:
] Collaborative policy design
] Collaborative policy verification
] Enforcement framework


MODULES DESCRIPTION:

Collaborative policy design

Here, Admins refers to all involved policy administrators, including, e.g., developers, marketers, and end users in the Android framework. policy administrator Admins can obtain a refined policy set PSref according to a refinement function. We design the policy using the system such as a new user can register and logins and upload any file. The user can design the policy in it. That is the policy may be like download option available or not, client details view options such that options.



Collaborative policy verification

A policy administrator Admins can obtain a verification result. VeriResult for a target policy set PStarget , which contains all polices assigned to a target subject SUBJS, according to a verification function.

ENFORCEMENT FRAMEWORK

A policy administrator can leverage the framework to administrate policies via a phone, web browser, or development tool. The direction of arrows is the direction of key data flows. The history policy base and similarity measure methods are two key components in the enforcement framework. To enforce CPA, the administrator should prepare a sufficient number of policies at first. Furthermore, collaborative policy design and collaborative policy verification are the two key functions provided by the framework. These two functions depend on the history policy base and similarity measure methods. After obtaining the similar policies, the two functions call a refinement algorithm and a verification algorithm respectively. Finally, collaborative policy design and collaborative policy verification will display the results to the administrator on various user interfaces, e.g., a phone, web browser, or development tool.

SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:

Ø System                          :         Pentium IV 2.4 GHz.
Ø Hard Disk                      :         40 GB.
Ø Floppy Drive                 :         1.44 Mb.
Ø Monitor                         :         15 VGA Colour.
Ø Mouse                            :         Logitech.
Ø Ram                               :         512 Mb.
Ø MOBILE                        :         ANDROID

SOFTWARE REQUIREMENTS:

Ø Operating system           :         Windows XP/7.
Ø Coding Language :         Java 1.7
Ø Tool Kit               :         Android 2.3 ABOVE
Ø IDE                      :         Eclipse

REFERENCE:
Weili Han, Member, IEEE, Zheran Fang, Laurence Tianruo Yang, Member, IEEE, Gang Pan, Member, IEEE, and Zhaohui Wu, Senior Member, IEEE, “Collaborative Policy Administration”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014.





                                     

No comments:

Post a Comment