A Security Mechanism with Dynamic Runtime Adaptation for Mobile Devices

  • Alexandre Correia Cirqueira UFC
  • Rossana M. C. Andrade UFC
  • Miguel F. de Castro UFC

Abstract


The increasing use of mobile devices and their applications exchanging information in diverse environments highlights the importance of ensuring data security. Additionally, the trend in the use of sustainable practices advocated by green computing imposes the need for designing applications flexible enough to deal with them. This paper then proposes an adaptive security mechanism, focusing on confidentiality of information exchanged among applications for mobile devices, able to adapt their security degree according to the context and provide the efficient use of resources.

References

Bishop, M., Computer Security: Art and Science, Addison-Wesley, 2003.

Bosch, Jan. Design and Use of Software Architecture, Addison-Wesley, 2000

Bragg, R., et al. (2004). Network Security: The Complete Reference. McGraw-Hill.

Bringel, J. R. M. F., Viana, W., Braga, R., Andrade, R. M. C. (2005).FRAMESEC: A Framework for the Application Development with End-to-End Security Provision in the Mobile Computing Environment. In: AICT 2005. Proc. IEEE Computer Society.

Carvalho, A. F. M. (2008). M-CODE: Um Modelo para Medição de Confidencialidade e Desempenho para Aplicações Móveis Seguras. 96p. Dissertação (Mestrado em Ciência da Computação) – Universidade Federal do Ceará, Brasil.

Chen, J., Hu, C., Zeng, H., (2010). A Novel Model for Evaluating Optimal Parameters of Security and Quality of Service. Journal of Computers, vol 5, no. 6.

Dey, A.K. (2001). Understanding and Using Context. Personal Ubiq. Comp. v5, pp4-7

Darco, P., DE Santis, A., Feara, A. L., Massucci, B. (2010). Variations on a theme by Akl and Taylor: Security and tradeoffs. Theor. Comput. 411, 1, 213-227.

Elkhodary, A., Whittle, J. (2007). Survey of Approaches to Adaptive Application Security. ICSE Workshops SEAMS '07. pp. 16-16.

Gentry, C., Ramzan, Z. (2004). Provable cryptographic security and its applications to mobil wireless computing. Wireless Personal Communication, v. 29, pp.191-203.

Georgas, J.C., Hoek A.V.D., Taylor R.N. (2005). Architectural Runtime Configuration Management in Support of Dependable Self-Adaptive Software, WADS, v30,pp. 1-6.

Hamad, F., Smalov L., James A. (2009). Energy-aware Security in M-Commerce and the Internet of Things. IETE. 26:357-62.

Herrick, D. R., Ritschard, M. R. (2009). Greening your computing technology, the near and far perspectives. In Proceedings of the ACM SIGUCCS Fall Conference on User Services Conference. SIGUCCS '09. ACM, New York, NY, 297-304.

Izquierdo, A., Sierra, J.M., Torres, J. (2006). On the implementation of security policies with adaptative encryption. Comput. Commun. 29(15), 2750–2758.

Li, H.(2006).Multilievel Adaptive Security System.92p. Thesis(Doctor of Philosophy in Computer Engineering).New Jersey Institute of Technology(NJIT),New Jersey, USA

Maliki, T.E.; Seigner, J., (2010). A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments. Emerging Security Information Systems and Technologies. International Conference, pp.63-68, 18-25.

Oreiz, P., et. al(2008).Runtime Software Adaptation: Frameworks, Approach and Styles. 30th International Conference on Software Engineering. ICSE'08. ACM, pp 899-910.

Pirmez, M. (2009). Prometheus: Um Serviço de Segurança Adaptativa. 115p. Dissertação (Mestrado em Informática) Universidade Federal do Rio de Janeiro.RJ.

Rocha, B.P.S., Costa, D.N.O., Moreira,(2010).Adaptive security protocol selection for mobile computing. J. Netw. Comput. Appl. 33, 5 (September), 569-587.

Rocha, L.S., Castro, C. E. P. L., Machado, J. C., Andrade, R. M. C. (2007). Utilizando Reconfiguração Dinâmica e Notificação de Contextos para o Desenvolvimento de Software Ubíquo. In: XXI SBES. João Pessoa.

Salido, J., Lazos, L., Poovendran R. (2008). Energy and bandwidth-efficient key distribution in wireless Ad Hoc networks: A cross-layer approach. IEEE/ACM Transactions on Networking, vol. 15, No. 6, pp. 1527-1540. DEC.

Schilit, B., Adams, N., Want, R.(1994). Context-aware computing applications. In IEEE Workshop on Mobile Comp. Systems Applications. IEEE Comp. Soc. Press. p85-90.

Solyman, S. H., Omari M. (2004). An Efficient Application of a Dynamic Crypto System in Mobile Wireless Security. WCNC/IEEE C. Society, vol.2, pp. 837-842.

Stephen, Ruth. (2009). Green IT – More Than a Three Percent Solution, IEEE Internet Computing, vol. 13, no. 4, pp. 74-78, July/Aug., DOI: 10.1109/MIC.2009.82.

Szyperski, C. A. (1998). Component software: beyond object-oriented programming, ACM Press/Addison-Wesley Publishing Co., New York, NY.

Taddeo, A.V. et al.(2010).Gradual Adaptation of Security for Sensor Networks. In:IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

Viana, W., Cavalcante, P., Andrade, R. M. C. (2005).Mobile Adapter: Uma abordagem para a construção de Mobile Application Servers adaptativos utilizando as especificações CC/PP e UAProf. In: XXV Congresso da Sociedade Brasileira de Computação, 2005, Sao Leopoldo, RS-Brasil. Anais do XXXII SEMISH.

Wilbanks, L. (2008). Green, My Favorite Color. IT Pro v.10, n.6. pp.63-64. IEEE Comp Soc. Press.
Published
2011-07-19
CIRQUEIRA, Alexandre Correia; ANDRADE, Rossana M. C.; CASTRO, Miguel F. de. A Security Mechanism with Dynamic Runtime Adaptation for Mobile Devices. In: INTEGRATED SOFTWARE AND HARDWARE SEMINAR (SEMISH), 38. , 2011, Natal/RN. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2011 . p. 1337-1351. ISSN 2595-6205.