A root privilege management scheme with revocable authorization for Android devices

Yu an Tan, Yuan Xue, Chen Liang, Jun Zheng, Quanxin Zhang, Jiamin Zheng, Yuanzhang Li*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

64 Citations (Scopus)

Abstract

As a critical part in mobile cloud computing, the vulnerability of Android devices can directly affect the security of the mobile cloud. The unsecured Android can be potentially exploited by malwares to obtain the root privilege. Root privilege misuse is the critical issue for Android security, which breaks the integrity of Android security and rises the risk of permission escalation from malwares. The existing solutions still fail to balance the trade-off between the users desires on using root privilege and the Android security, which lays risks in leading to the root privilege misuse. To address this issue, a root privilege management scheme named Root Privilege Manager (RPM) is proposed, which adopts the root privilege access control to guarantee the exclusive root access opportunity of the authenticated apps. RPM verifies the authorization and integrity of root requesting apps based on the extracted authorization files during app installation, and then root access management controls the granting of root privilege based on the authenticated results. In this way, the end users are free from the embarrassment of appropriate decision-making while confront root access management. The prototype of RPM is implemented to evaluate its effectiveness, efficiency and performance. The experiments show RPM can effectively control the granting of root privilege and the time consumption in root access management is increased by 0.21%–0.94% respectively compared with the user management.

Original languageEnglish
Pages (from-to)69-82
Number of pages14
JournalJournal of Network and Computer Applications
Volume107
DOIs
Publication statusPublished - 1 Apr 2018

Keywords

  • Android security
  • Mobile cloud computing
  • Revocable authorization
  • Root privilege management

Fingerprint

Dive into the research topics of 'A root privilege management scheme with revocable authorization for Android devices'. Together they form a unique fingerprint.

Cite this