Combining smart phone and infrastructure sensors to improve security in enterprise settings

Palanivel A. Kodeswaran, D. Chakraborty, Parikshit Sharma, Sougata Mukherjea, A. Joshi
{"title":"Combining smart phone and infrastructure sensors to improve security in enterprise settings","authors":"Palanivel A. Kodeswaran, D. Chakraborty, Parikshit Sharma, Sougata Mukherjea, A. Joshi","doi":"10.1145/2494091.2499773","DOIUrl":null,"url":null,"abstract":"There is an increasing trend among employees to bring in their own personal device to work, thereby making the enterprise more vulnerable to security attacks such as data leakage from phones. Additionally, users are increasingly running phone apps in a mixed-mode i.e. both for enterprise and personal commitments. For example, phone cameras and microphones are used to record business meetings, often resulting in the case that both employers and employees become unaware of the existence of business data on the phone at a later point in time. The lack of employer control over personal devices raises enterprise data leakage threats, when an employee's phone is lost or stolen. In this paper we describe a system that leverages sensors available on the phone as well as on the enterprise infrastructure to identify business data resident on the phone for further secure handling. Office spaces have traditionally been instrumented with badge swipe readers, cameras, wifi access points etc. that can be used to provide passive sensory data about employees. For example, badge swipes can be used provide approximate location information of an employee where as calendar entries provide information about their schedule and activities. We propose a distributed architecture that leverages the context of the user for speculatively identifying enterprise data from personal data. The basic idea is to understand whether a user is engaged in enterprise or personal work by inferring her context from a combination of phone and infrastructure sensors. The contextual attributes in our system, such as location, can be sourced from a plurality of sensors on the phone as well as on the infrastructure. We exploit this diversity and propose a cost optimized distributed rule execution framework that chooses the optimal set of predicates to sense on the phone as well as on the infrastructure to reduce sensing cost. Furthermore, the framework also chooses the appropriate site for rule evaluation, either on the infrastructure or phone, to optimize for network transfer cost incurred due to shipping of sensed predicates between the two sites. Combined together,the above two optimizations reduce the battery drain caused due to context inferencing on the phone.","PeriodicalId":220524,"journal":{"name":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","volume":"131 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2494091.2499773","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

There is an increasing trend among employees to bring in their own personal device to work, thereby making the enterprise more vulnerable to security attacks such as data leakage from phones. Additionally, users are increasingly running phone apps in a mixed-mode i.e. both for enterprise and personal commitments. For example, phone cameras and microphones are used to record business meetings, often resulting in the case that both employers and employees become unaware of the existence of business data on the phone at a later point in time. The lack of employer control over personal devices raises enterprise data leakage threats, when an employee's phone is lost or stolen. In this paper we describe a system that leverages sensors available on the phone as well as on the enterprise infrastructure to identify business data resident on the phone for further secure handling. Office spaces have traditionally been instrumented with badge swipe readers, cameras, wifi access points etc. that can be used to provide passive sensory data about employees. For example, badge swipes can be used provide approximate location information of an employee where as calendar entries provide information about their schedule and activities. We propose a distributed architecture that leverages the context of the user for speculatively identifying enterprise data from personal data. The basic idea is to understand whether a user is engaged in enterprise or personal work by inferring her context from a combination of phone and infrastructure sensors. The contextual attributes in our system, such as location, can be sourced from a plurality of sensors on the phone as well as on the infrastructure. We exploit this diversity and propose a cost optimized distributed rule execution framework that chooses the optimal set of predicates to sense on the phone as well as on the infrastructure to reduce sensing cost. Furthermore, the framework also chooses the appropriate site for rule evaluation, either on the infrastructure or phone, to optimize for network transfer cost incurred due to shipping of sensed predicates between the two sites. Combined together,the above two optimizations reduce the battery drain caused due to context inferencing on the phone.
结合智能手机和基础设施传感器,提高企业设置的安全性
越来越多的员工带着自己的个人设备上班,这使得企业更容易受到手机数据泄露等安全攻击。此外,用户越来越多地以混合模式运行手机应用程序,即既用于企业用途,也用于个人用途。例如,手机摄像头和麦克风被用来记录商务会议,这通常会导致雇主和雇员在稍后的时间点上都不知道手机上存在业务数据。当员工的手机丢失或被盗时,雇主对个人设备缺乏控制会增加企业数据泄露的威胁。在本文中,我们描述了一个利用手机和企业基础设施上可用的传感器来识别驻留在手机上的业务数据以进行进一步安全处理的系统。传统上,办公空间配备了徽章刷卡阅读器、摄像头、wifi接入点等设备,可用于提供有关员工的被动感知数据。例如,可以使用徽章滑动提供员工的大致位置信息,而日历条目则提供有关其日程安排和活动的信息。我们提出了一种分布式架构,利用用户的上下文从个人数据中推测地识别企业数据。其基本思路是,通过结合手机和基础设施传感器推断用户的环境,了解用户是在从事企业工作还是个人工作。我们系统中的上下文属性,比如位置,可以从手机和基础设施上的多个传感器中获取。我们利用这种多样性,提出了一个成本优化的分布式规则执行框架,该框架选择在手机上以及基础设施上感知的最优谓词集,以降低感知成本。此外,框架还选择适当的站点(在基础设施或电话上)进行规则评估,以优化由于在两个站点之间传输感知谓词而产生的网络传输成本。结合在一起,上述两种优化减少了由于手机上的上下文推断而导致的电池消耗。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信