The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences
Open Access
- 1 May 2017
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 1077-1093
- https://doi.org/10.1109/sp.2017.51
Abstract
Current smartphone operating systems regulate application permissions by prompting users on an ask-on-first-use basis. Prior research has shown that this method is ineffective because it fails to account for context: the circumstances under which an application first requests access to data may be vastly different than the circumstances under which it subsequently requests access. We performed a longitudinal 131-person field study to analyze the contextuality behind user privacy decisions to regulate access to sensitive resources. We built a classifier to make privacy decisions on the user's behalf by detecting when context has changed and, when necessary, inferring privacy preferences based on the user's past decisions and behavior. Our goal is to automatically grant appropriate resource requests without further user intervention, deny inappropriate requests, and only prompt the user when the system is uncertain of the user's preferences. We show that our approach can accurately predict users' privacy decisions 96.8% of the time, which is a four-fold reduction in error rate compared to current systems.Keywords
This publication has 31 references indexed in Scilit:
- Your Location has been Shared 5,398 Times!Published by Association for Computing Machinery (ACM) ,2015
- Android taint flow analysis for app setsPublished by Association for Computing Machinery (ACM) ,2014
- DroidBarrierPublished by Association for Computing Machinery (ACM) ,2014
- ProtectMyPrivacyPublished by Association for Computing Machinery (ACM) ,2013
- PScoutPublished by Association for Computing Machinery (ACM) ,2012
- Android permissionsPublished by Association for Computing Machinery (ACM) ,2012
- AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large ScaleLecture Notes in Computer Science, 2012
- A Conundrum of Permissions: Installing Applications on an Android SmartphoneLecture Notes in Computer Science, 2012
- A note on Platt’s probabilistic outputs for support vector machinesMachine Learning, 2007
- The sampling of experiences in situJournal of Personality, 1986