AppMonitor: restricting information leakage to third-party applications

被引:0
|
作者
Nemi Chandra Rathore
Somanath Tripathy
机构
[1] Indian Institute of Technology,Department of Computer Science and Engineering
[2] CUSB,undefined
来源
关键词
Online social network; Third-party application; Privacy; Access control; Answer set programming;
D O I
暂无
中图分类号
学科分类号
摘要
Nowadays, the popularity of online social networks (OSNs) has been increased tremendously. Meanwhile, a wide range of third-party applications (TPAs) facilitated by OSNs has made a significant contribution to their popularity. TPAs offer many attractive functionalities and services to the OSN users but pose serious privacy threats to the users. Therefore, it is essential to strictly regulate the divulgence of user data to TPAs. In this paper, we propose an access control framework called AppMonitor to monitor and curb the user data to TPA. Further, we also introduce a relation-based access control policy model that uses predicate calculus to express data access policies. Analysis of the usability and correctness of the introduced policy model has been made, based on a logical model using answer set programming. A simplified prototype has been developed to show the feasibility of AppMonitor, and its effectiveness is shown through a user study.
引用
收藏
相关论文
共 50 条
  • [41] Compliance Monitoring of Third-Party Applications in Online Social Networks
    Kelbert, Florian
    Fromm, Alexander
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 9 - 16
  • [42] A Comprehensive Study on Third-Party User Tracking in Mobile Applications
    Paci, Federica
    Pizzoli, Jacopo
    Zannone, Nicola
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [43] Fine Grained Confinement of Untrusted Third-Party Applications in Android
    Pande, Prateek
    Mallaiah, Kurra
    Gandhi, Rishi Kumar
    Medatiya, Amit Kumar
    Srinivasachary, S.
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, AND INTELLIGENT SYSTEMS (ICCCIS), 2021, : 372 - 376
  • [44] LibSift: Automated Detection of Third-Party Libraries in Android Applications
    Soh, Charlie
    Tan, Hee Beng Kuan
    Arnatovich, Yauhen Leanidavich
    Narayanan, Annamalai
    Wang, Lipo
    2016 23RD ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2016), 2016, : 41 - 48
  • [45] Topology and Geometry of the Third-Party Domains Ecosystem: Measurement and Applications
    Iordanou, Costas
    Papadopoulos, Fragkiskos
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2022, 52 (04) : 13 - 25
  • [46] Investigating Mobile Applications Quality in Official and Third-party Marketplaces
    Fasano, Fausto
    Martinelli, Fabio
    Mercaldo, Francesco
    Santone, Antonella
    PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON EVALUATION OF NOVEL APPROACHES TO SOFTWARE ENGINEERING (ENASE), 2019, : 169 - 178
  • [47] AndroLib: Third-Party Software Library Recommendation for Android Applications
    Chouchen, Moataz
    Ouni, Ali
    Mkaouer, Mohamed Wiem
    REUSE IN EMERGING SOFTWARE ENGINEERING PRACTICES, ICSR 2020, 2020, 12541 : 208 - 225
  • [48] Interdependent Privacy Issues Are Pervasive Among Third-Party Applications
    Liu, Shuaishuai
    Herendi, Barbara
    Biczok, Gergely
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2021, 2022, 13140 : 70 - 86
  • [49] The Impact of Third-Party Medical Applications on Trust in Clinical Practice
    Daly, Alexander Gerard
    ACADEMIC MEDICINE, 2019, 94 (04) : 462 - 462
  • [50] LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications
    Qiu, Jun
    Yang, Xuewu
    Wu, Huamao
    Zhou, Yajin
    Li, Jinku
    Ma, Jianfeng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2873 - 2889