Open Access Open Access  Restricted Access Subscription Access

Disabling Camera Features in a Mobile Phone in Restricted Zones


Affiliations
1 B. S. Abdur Rahman University, Seethakathi Estate, Vandalur, Chennai - 600048, Tamil Nadu, India
 

Objective: To provide a system that is effective in its objective of curtailing the vulnerable camera component access inside the restricted environment. Method: Failure to provide a standardized feature for industry purpose have left them vulnerable to some of the unwanted features in a mobile phone. This means that the mobile phone is able to have all components as a casual user. This maybe a source for the violation of some of the secure company’s policies. It may not be a viable option to deprive the user from possessing a phone with those components. Instead, it is a feasible solution to curb the user from using it in the restricted zone under consideration. Our solution involves a system where there is a well-defined architecture that provides the methods to curtail the vulnerable components. Findings: The method is an add-on on top of the existing solution and is a minimal effort to attempt at providing the necessary secure features for the organization using it. This allows the companies to enforce more productive ideas such as Bring Your Own Device (BYOD) without any concerns. Application: The proposed system effectively adds up to the mobile device management principles and serves the purpose of completely automated security for mobile device.

Keywords

Bring Your Own Device (BYOD), Camera Access, Mobile Device Management (MDM), Mobile Application
User

Abstract Views: 179

PDF Views: 0




  • Disabling Camera Features in a Mobile Phone in Restricted Zones

Abstract Views: 179  |  PDF Views: 0

Authors

Dhivahar Perumal
B. S. Abdur Rahman University, Seethakathi Estate, Vandalur, Chennai - 600048, Tamil Nadu, India
Sharmila Sankar
B. S. Abdur Rahman University, Seethakathi Estate, Vandalur, Chennai - 600048, Tamil Nadu, India
M. Sandhya
B. S. Abdur Rahman University, Seethakathi Estate, Vandalur, Chennai - 600048, Tamil Nadu, India

Abstract


Objective: To provide a system that is effective in its objective of curtailing the vulnerable camera component access inside the restricted environment. Method: Failure to provide a standardized feature for industry purpose have left them vulnerable to some of the unwanted features in a mobile phone. This means that the mobile phone is able to have all components as a casual user. This maybe a source for the violation of some of the secure company’s policies. It may not be a viable option to deprive the user from possessing a phone with those components. Instead, it is a feasible solution to curb the user from using it in the restricted zone under consideration. Our solution involves a system where there is a well-defined architecture that provides the methods to curtail the vulnerable components. Findings: The method is an add-on on top of the existing solution and is a minimal effort to attempt at providing the necessary secure features for the organization using it. This allows the companies to enforce more productive ideas such as Bring Your Own Device (BYOD) without any concerns. Application: The proposed system effectively adds up to the mobile device management principles and serves the purpose of completely automated security for mobile device.

Keywords


Bring Your Own Device (BYOD), Camera Access, Mobile Device Management (MDM), Mobile Application



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i33%2F127887