=Paper= {{Paper |id=Vol-3176/paper7 |storemode=property |title=MAM Security Enhancement: Proposed Control Mechanism |pdfUrl=https://ceur-ws.org/Vol-3176/paper7.pdf |volume=Vol-3176 |authors=Radhia Khellaf,Souheila Boudouda,Salima Hacini |dblpUrl=https://dblp.org/rec/conf/rif/KhellafBH22 }} ==MAM Security Enhancement: Proposed Control Mechanism == https://ceur-ws.org/Vol-3176/paper7.pdf
MAM Security Enhancement: Proposed Control Mechanism
Radhia Khellaf1, Souheila Boudouda1, Salima Hacini1
1
LIRE Laboratory, Abdelhamid Mehri- Constantine2, University Constantine, Algeria

                 Abstract
                 With the advent of the mobile enterprise, the need for a dynamic and flexible security
                 framework to balance risk and trust becomes urgent. This need has led to the rapid expansion
                 and growth of enterprise security technologies for mobility. In this article, the two most used
                 mobile ecosystem management tools (Mobile Device Management and Mobile Application
                 Management) are analyzed from a security point of view. In addition, a protection mechanism
                 which strengthens the security aspect of the Mobile Device Management application is
                 proposed. It fixes the Mobile Device Management security vulnerabilities and reduces the
                 impact of attacks. On the basis of the characteristics of proposed approach activities, a
                 functional diagram is presented.

                 Keywords
                 Security; mobile security; mobile enterprise; Mobile Device Management; Mobile
                 Application Management.

1. Introduction
   The use and development of the mobile application is a new and rapidly growing sector. Mobile
applications are executed on a small mobile device, easy to use and accessible from anywhere and any
place. According to research works presented in[1][2], the advantages of a mobile workforce are
obvious: First, remote workers will be more productive and happier. Second, they work an additional
five hours per week adding more than 250 hours of work every year. Furthermore, Teleworkers
continue to work when they are sick and do not come to the office to potentially infect their
coworkers. Finally, companies can reduce their expenditures on real estate and office operations. The
benefits of mobility in enterprise are therefore numerous. However, companies are also raising many
security issues and challenges with mobility [3]. A huge challenge is therefore to protect the data from
unauthorized access.
   Consequently, it is a question of finding a security compromise between the use of different types
of personal mobile devices and the control that the company must put in place on these devices. The
main goal is to limit the security risks [4]. Therefore, in a heterogeneous environment imposed by
mobility, it is very difficult, if not impossible, to build a single approach that adjusts to all security
and surveillance requirements. It is also difficult to manage the administration of all mobile devices
of an organism [5].This is the reason why a particular category of tools was born, namely: Mobile
Device Management (MDM) [7], Mobile Application Management (MAM)[8], Enterprise Mobility
Management (EMM), Mobile Content Management (MCM) and Unified Endpoint Management
(UEM), Identity and Access Management (IAM)[5][6]. But the implementation of these solutions
can generate certain problems to which the company must be very attentive.


RIF’20: The 9th Seminary of Computer Science Research at Feminine, March 7th, 2020, Constantine 2-Abdelhamid Mehri University,
Algeria
EMAIL: radhia.khellaf@univ-constantine2.dz (R. Khellaf); souheila.boudouda@univ-constantine2.dz (S.Boudouda); salima.hacini@univ-
constantine2.dz(S.Hacini)

             ©️ 2022 Copyright for this paper by its authors.
             Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
             CEUR Workshop Proceedings (CEUR-WS.org)
   In this paper, we have proposed a securing approach which can strengthen the MAM applications.
The goal is to enable the company to take advantage of the business benefits of the mobile revolution,
while protecting it, as well as its employees and customers, from potential risks. The main idea is to
introduce a control mechanism at the MAM application level which makes a reaction requesting the
intervention of administrators in the enterprise. It also applies a strategy for controlling access to
resources and system services separately.
  The remaining of this paper is organized as follows. Section 2 reviews the current state of the
mobile enterprise and describes the risks associated with the most popular mobile device platforms
and technologies. Then, it outlines the ways in which many of these risks can be mitigated. Section 3
and 4 specifies the main management tools used by mobile enterprise. Section 5 describes the
proposed security mechanism which strengthens the security aspect of the applications. Section 6
includes a discussion of the direction of research taken by this work. Finally, some conclusions and
research lines are presented.

2. Risks in mobile enterprise
   A mobile enterprise is a company whose employees are nomads and who work on a collaborative
information system. This system allows employees in real time to consult, verify, or record
information in the database of the mobile enterprise (mobile ecosystem). [9](See Figure 1).
      The emergence of the concept of mobile enterprise has been generated by a number of needs such
as:
●     Employees not required to be present in the same workplace
●     Real-time access to up-to-date information (availability)
●     Simple use
●     Rapid deployment of information.
   The mobile enterprise essentially consists of four parts [10]:
1. End user
2. Mobile device (hardware, operating system and applications)
3. Company (servers, applications and services, and data sources);
4. Network path (connects the mobile device to the enterprise via, for example, local WiFi or cellular
communications, network operators, Internet, routers, etc.).




Figure 1: Architecture of a mobile ecosystem
   To achieve sufficient security for the entire mobile enterprise, it is necessary to secure these four
parts. Each part suffers from a specific set of vulnerabilities and therefore requires a security solution
that meets its particular needs.
   Mobility certainly has a positive influence on the turnover (gain and reduction of costs) of a
company. However, it also brings a lot of disadvantages, particularly if it is not enough taken care of.
Threats to the mobile ecosystem can indeed increase and affect the security of users and organizations.
Table 1 presents the risks and vulnerabilities that accompany the use of mobiles devices [2] [11][12].

Table 1: Risks and vulnerabilities related to mobiles enterprises
Device and material     • Unauthorized access;
                        • Lack of security configuration;
                        • Obsolete legacy devices;
                        • The loss or theft of personal media containing personal data. According to
                        Winn Schwartau, 25% of mobile owners lose their Smartphone at least once.
                        This implies that professional data may be lost and / or be accessible by
                        anyone who has this device;
                        • Risks of intrusion into the enterprise system (Virus, malware, spy, etc.).
Networks and            • Data leaks in the cloud;
communications          • Misconfigured SSL / TSL;
                        • Vulnerable services on an unsecured network;
                        • Lack of encryption of transferred data.
Application             • Bad authorization and authentication;
                        • Attacks on mobile / PC and insecure applications;
                        • Lack of security configuration;
                        • Unsecured password recovery;
                        • No application or password lock;
                        • Collecting unnecessary personal data and sharing on the network.



3. Managing an Enterprise Mobile Environment
Several solutions have been created to protect a mobile enterprise against these threats, including
mobile application management (MAM), mobile device management (MDM), enterprise mobility
management (EMM), mobile content management (MCM), Unified Endpoint Management (UEM),
and Mobile Identity Management IAM.
As an architect, you are responsible for determining which approach is best for the environment you
manage. Which approach (MDM, MAM, EMM, UEM, IAM, or MCM) is right for your environment?
Let's go through each one [17] [5] [18]:
3.1.    Mobile Device Management (MDM)
Monitors, manages, and secures mobile devices that are deployed across different cellular carriers. The
process installs an application on the device to give access to and control of the device.
3.2.    Mobile Application Management (MAM)
Provides control at the application level that would enable administrators to manage and secure app
data [19]. MAM provides administrations capabilities to enterprise system administrators to remotely
manage mobile applications on mobile devices in BYOD scenario. The administration abilities include
control the provisioning, updating and removal of mobile applications via an enterprise app store,
monitor application performance and usage, and remotely wipe data from managed applications.
3.3.    Enterprise Mobility Management (EMM)
EMM is a global approach for devices and platforms that centralize the management, configuration,
and security of all mobile devices managed by an enterprise.
EMM goes beyond traditional device management to include the management and configuration of
enterprise applications and content. Thus, a complete EMM strategy also aims to help employees be
more productive by providing them with the tools they need to do their work on mobile.
EMM Combines MDM and MAM. This leads to increased complexity and costs
3.4.    Unified Endpoint Management (UEM)
UEM provides enterprise management of endpoints, including mobile devices, printers, laptops,
and desktops, IoT devices from a single management platform.
The disadvantage of this approach is that it is expensive with intense management.
3.5.    Mobile Content Management (MCM)
(Sometimes called MIM for Mobile Information Management) supports and controls access to content
from mobile devices. It uses either a secure container or content push (In both cases, device and app
are secondary.); to ensure that only approved apps can access and share company data.
3.6.    Identity and Access Management (IAM)
Which is the set of processes implemented by a company for managing the access authorization of its
users (employees, partners or customers) to its information system or its applications. Thus, identity
and access management is concerned with, for example, controlling how users acquire an identity,
how to protect that identity, and the technologies that enable that protection.
4. Main management tools used by mobile enterprise
    As mentioned above, a lot of mobile ecosystem management solutions for the mobile enterprise
were introduced (MDM, MAM, EMM, MCM, UEM and IAM). The implementation of these solutions
can produce certain problems to which the company must be very vigilant. In this section, we analyze
in particular the two most used mobile ecosystem management tools (MDM and MAM).
4.1.    Mobile Devices Management
   The MDM is an application that manages the deployment, securing, monitoring, integration and
administration of personal or professional mobile devices, such as smart phones or tablets that have
access to critical data [10] [13]. MDM software provides asset inventory, live email, application and
WiFi configuration, remote troubleshooting solutions, and remote lock and wipes features to secure
devices and enterprise data. Thus, MDM can be considered as the foundation of a complete Enterprise
Mobility Management (EMM) solution.
   Its objective is to harmonize and secure the company's fleet by ensuring that all employees have
up-to-date programs and that their devices are properly secured. The program also facilitates the
spread of security patches or new software for all employees (Figure 2).
Figure 2 : Mobile Device Management software (MDM)

   The MDM manages various sizes and types of fleets ranging from ten identical terminals, to
thousands of terminals all different and using different operating systems.
   The main security features of the MDM application are [14]:
• Deleting remote content;
• Remote blocking of the terminal;
• Limitation of roaming to restrict usage by geographic area;
• Limitation of physical capacities such as the USB port, card reader (micro) SD or other, etc;
• Deployment of configurations, certificates, security rules, etc;
• Encryption;
• Strong authentication including strong passwords, PIN code, biometrics, etc;
• Configuration of a firewall, proxy, VPN, etc;
• Anti-virus.
4.2.    Mobile Application Management
   The MAMtechnologies apply management and policy controls to individual applications rather
than the entire device. MAM allows IT administrators to install, update, delete, audit and monitor
enterprise applications on mobile devices [15][5].
MAM solutions generally offer a custom application store that allows to control and deliver internally
developed and third-party applications (Figure 3).




Figure 3: Conceptual architecture of MAM
   MAM represents all the software and services responsible for supplying and controlling access to
mobile applications. These applications are used in professional environments on smartphones and
tablets provided by the enterprise.
The main security functionalities of the MAM application are [6]:
● Distribution of applications (Enterprise App Store);
● Update applications;
● Monitoring application performance;
● User Authentication;
● Logging of incidents;
● User and group access control;
● Application version management;
● Management of the configuration of the applications;
● Push services (sends information to the user through a mobile application);
● Usage analysis;
● Event Management;
● Wrapping apps;
    With MAM, employees can gather their personal and professional information in a smartphone
capable of retaining independent operational identities. The idea is that users can install Facebook and
other apps of personal interest in the personal partition, but that work-related apps and data are stored
in the working partition.
   Ina security model centered on the MAM application, an application establishes its own
autonomous encrypted communication channel at the application level or in the closed environment
where the application exists, without depending on the operating system or the device. This provides a
tampon between personal space and corporate space. The separation of enterprise applications from
personal space fulfills several key functions [16]:
• It preserves the user experience without modifying the device or controlling personal applications;
• It provides the necessary level of access control for enterprise applications with the ability to exceed
current standards;
• It reduces the company's risk posture by eliminating the use of endpoints for data entry on the
approved network.

4.3.    Main differences between MDM and MAM
    Each mentioned security method has its strengths and limitations in terms of protecting internal
data reachable from mobile devices (Table2). A robust security analysis should include a security
strategy, which should significantly reduce the security risks associated with BYOD. Table 2 presents
the main differences between the two most used mobile ecosystem management tools: MDM and
MAM.
The next section presents the proposed control mechanism. It strengthens the security of MAM and
ensures a perpetual update in order to counter any new attack in a short time. In addition, it relies on
detections from other applications which themselves benefit from continuous updates.
5. Proposed control mechanism
    In this article, we propose to introduce a control mechanism at the MAM application level which
autonomously applies a strategy for controlling access to resources and system services and generates
a reaction requesting the intervention of administrators in the enterprise.
   The basic idea of this approach is to provide MAM with the control faculty that will allow it to
make decisions as to whether or not to authorize an application that requests access to a system
service. This control is based on MAM's ability to intercept interactions between applications and a
few system processes to retrieve detailed information on applications requests necessary for fine-
grained access control
Table2: Main differences between MDM and MAM
Mobile Device Management (MDM)                     Mobile Application Management (MAM)
• Management, security and control of        • Management and security only of applications
the mobile device (MDM touches               specially designed by the enterprise (MAM targets
terminals).                                  applications).
• Remote deletion of all content from the    • Deletion only of professional data.
device in the event of theft or loss.
Focuses on security:                         Focuses on making available:
• The application of defined password          • Creation of a catalog of safe and approved
policies;                                      applications to download to give users the
• Encryption of data on the device;            opportunity to do more effective work on their
• Control of data sharing options at the       devices;
device level, for example, wifi, camera,     • Management of multi-user profiles for the same
Bluetooth and 3G;                            application;
• Blocking, remote erasure, location of      • Change the configuration of the application without
the device, ...;                             the need to update the version.
• Control of mobile devices such as
printers and scanners.
• Managing and securing applications;
• Prevention of data loss;
• Distribution of application based on the configuration;
• Management of a whitelist and a blacklist of the device, the user and the applications;
• Inventory management of applications and peripherals.



5.1.    General architecture of the proposed control mechanism
    The role of the proposed security mechanism is to quickly detect an attack to counter it as quickly
as possible, to be able to react in real time to an intrusion attempt and to improve the security of the
MAM by local processing (at the mobile level) alerts. The help of the company security administrator
will only be required in the event of ambiguity (the control mechanism could not confirm or deny the
attack).
   We assume the existence, at the mobile device level, of other intrusion detection tools such as
HIDS (Host Based Intrusion Detection System). The security information collected by these different
tools will be used by the proposed security mechanism to improve detection.
   The proposed mechanism uses three components present on the mobile (Figure 4):
• A collector component;
• An analyzer component;
• An executor component.
Figure 4: General architecture of the proposed control mechanism

5.1.1. Collector component
   The collector component intercepts alerts from other existing control applications at the mobile
level, such as the intrusion detection system, as well as suspicious activities detected by the MAM
application itself and transfers them to the analyzer component (Figure 5).




Figure 5: Internal architecture of the collector component

5.1.2. Analyzer component
   The analyzer component analyzes the various alerts received from the collector component (each
analyzer component has a blacklist (constantly updated by the mobile company).
  If the component confirms the presence of an attack, it sends a notification to the executing
component which will take the appropriate measures.
   If the analyzer component suspects an attack, it requests the executing component to send a
warning alert to ask the intervention of the security administration of the mobile enterprise in order to
analyze this alert in turn (Figure 6). If the attack is confirmed, the operation to update the black lists
present on the mobiles is launched.
Figure 6: Internal architecture of the analyzer component

5.1.3. Component executor
   The role of the component executor is to execute the tasks according to the notification of the
analyzer component. These tasks may include restoring corrupted files, prohibiting network
connection, etc. (Figure 7).




Figure 7: Internal architecture of the executor component

5.2.    Blacklist:
    When a new vulnerability is discovered, the security controls of the mobile enterprise determine
which assets are vulnerable. Additionally, each component has local responsibilities to protect the
mobile device from malware attacks, and then communicate the details of the attack to the mobile
company's security department to build an up-to-date Black List Enterprise (BLE) and then
distribute it to corporate resources to protect all other devices. In this way, the network defenses are
constantly refined to protect each user and the entire computer system (Figure 8).




Figure 8: Creation, update and distribution of the enterprise blacklist
5.3.    Functional diagram of the main security activities
   Here we describe the main activities of our approach illustrated by a sequence diagram(Figure9)
where the operations are:
Read_packets(): read packets;
Verify (BLE): check if the attack exists in the BLE;
Trait_alert(): process the alert based on the notification from the analyzer component;
Update_ BLE ( ): update the Blacklist enterprise.

And the events are:
Alert: send alert detected;
Request_ analysis: ask the analyzer component to analyze detected alerts;
Send_alert: send message about the detected attack;
Request_Update_BLE: ask the analyzer component to update the enterprise blacklist.




Figure 9: Sequence diagram


6. Discussion
    The mobile enterprise presents many IT security challenges as the threat environment is constantly
changing. Even if we keep the current threats and vulnerabilities, we must remain aware of emerging
technologies and potential vulnerabilities that result. Business IT staff will need to pay attention to the
threatening surface of mobile platforms and help users understand how to defend their devices. It's
about thinking in specific terms: who needs access to the enterprise's applications and services and
how to integrate it into the activation of single sign-on? Which users in which roles should be allowed
to use mobile devices to access the network and which applications should be allowed to access? What
should and shouldn't these users be allowed to do? What types of devices and operating system
versions should be allowed? How will managers measure the activities of mobile businesses to
measure their success? Does a security policy have to duplicate the location and the type of device of
the user? To get a head start on the mobile enterprise, those responsible for intelligent enterprise
management, IT and security will need to answer all these questions.
   Unfortunately, existing security controls suffer from certain limitations and do not meet the
requirements of mobile companies. But after studying the two most used applications "MDM and
MAM", we noticed that the only weak point of MAM compared to MDM concerns only the security
aspect, which leads us to believe that it would be wise to provide MAM with specific security features
adapted to a given company and to each of the users of its information system.
   Therefore, we have proposed the MAM+ approach which is a mobile-level component that
seamlessly enriches and strengthens any MAM application with new analytics and security capabilities
which are not present in the original applications source code. The proposed approach permits to
ensure that we will always stay abreast of all the threats that are happening and this is done using BLE
database that it is always updated. It allows the company to take advantage of the benefits of the
mobile revolution, while protecting all users from possible risks.
   Our proposed approach offers several advantages:
• It significantly simplifies the task of controlling access to corporate data at the mobile level;
• It reduces network traffic (the majority of checks are at the local level);
• It improves the detection rate;
• It makes it possible to benefit from the advantages of existing applications while avoiding its
disadvantages.
7. Conclusion
    Mobile enterprises need a tailor-made strategy to guarantee security, but unfortunately the current
range of security tools is not designed to meet the security requirements of mobile enterprises. The
dilemma of the mobile enterprise mobility strategy described above is serious. However, these new
technologies and new security concerns create an opportunity for future research in several areas. How
aware are mobile businesses of the new threats? What are the costs and implications for companies of
investing in new technological security solutions, such as MDM or MAM? What other security
solutions could be more effective at lower cost? What IT capabilities should mobile enterprise acquire
to stay in the mobility sector?

   In this article, we have proposed a control mechanism which strengthens the security aspect of the
MAM application. The objective of this solution is to apply a dynamic control capable of quickly
detecting and countering the various threats which are constantly increasing (responding in real time to
an intrusion attempt).It decreases the network traffic and progresses the detection rate.

    Our work opens the way to several research perspectives because we envisage improving our
approach by integrating other measures for detection of a wider range of attacks with an improvement
in development costs, speed and performance.

8. References
[1]D.Bailey, The difficulty of securing your mobile workforce, Computer Fraud & Security journal,
Volume 14, Num 9, September 2014, pp. 19-20. doi: 10.1016/S1361-3723(14)70532-9

[2] L. Feng, Mobile Security and Privacy. In: Xuemin (Sherman) Shen, XiaodongLin, KuanZhang;
Encyclopedia of Wireless Networks. Springer, Cham. (2020 Edition), August 2020.
doi: 10.1007/978-3-319-78262-1_292

[3] K. Miller, J. Voas, and G. Hurlburt, BYOD: Security and Privacy Considerations, IT Professional,
Volume 14, Num. 5, 2012, pp. 53–55.
[4] Y. Wang; J. Wei; K. Vangury, Bring your own device security issues and challenges, IEEE 11th
Consumer Communications and Networking Conference (CCNC), 2014, pp. 80-85, doi:
10.1109/CCNC.2014.6866552.

[5] D. Jyoti, J. A. Hutcherson, Salesforce Architect’s Handbook, chapter8 , January 20, 2021, pp. 257-
292. doi: 10.1007/978-1-4842-6631-1_8

[6] D. Carroll, M. Rose, V.Sritapan, CIO Council and Department of Homeland Security Mobile
Security Reference Architecture v1.0, May 23, 2013.

[7] K. Glowinski, C. Gossmann,D. Strümpf, Analysis of a cloud-based mobile device management
solution on android phones: technological and organizational aspects. SN Applied Sciences 2 num 42.
(Springer Nature journal Switzerland AG), 2020.
doi: 10.1007/s42452-019-1819-z

[8] M. Pistoia, O. Tripp, Integrating Security, Analytics and Application Management into the Mobile
Development Lifecycle, Proceedings of the 2nd International Workshop on Mobile Development
Lifecycle, October 2014, Pages 17–18doi: 10.1145/2688412.2688419

[9] O.Mungkasa,B.JarakJauh..Remote Working (Telecommuting): Concept, Application and
Learning),    Bappenas   Working   Papers, volume 3   Num.1,March    2020     pp.1-32.
doi:10.47266/bwp.v3i1.52
[10] K.Nesma, Secure Mobile Application Management Framework, Master thesis, The University of
Regina (Canada), April 2018.
[11] C. Montealegre , Rubia Njuguna, Muhammad Imran Malik, Peter Hannay, Ian Noel McAteer ;
Security vulnerabilities in android applications; In proceedings of the 16th Australian Information
Security Management Conference; 2018, pp. 14-28. Doi: 10.25958/5c5274d466691
[12] A. Harris, M. and P. Patten, K., Mobile device security considerations for small- and medium-
sized enterprise business mobility, Information Management & Computer Security, Volume 22 Num.
1, 2014, pp. 97-114. doi: 10.1108/IMCS-03-2013-0019
[13] D. Hayes, F. Cappa, N. A.LeKhac.An effective approach to mobile device management: Security
and privacy issues associated with mobile applications. International Journal of Digital Business
Volume 1, Num1, September 30, 2020. doi:10.1016/ 2666-9544

[14] N. Devillard. MOBILE security and MDM, MISC: Multisystem & Internet, Security, Cookbook,
Num 66, March 2013.

[15] M. Eslahi, V. M. Naseri, H. Hashim, N. Tahir, E. H. M. Saad “BYOD: Current state and security
challenges” In Computer Applications and Industrial Electronics (ISCAIE), IEEE Symposium, IEEE,
April 2014, pp. 189-192.

[16] A.Brunnert, S.Eicker, P. M. Schuler, MANAGING SECURE SYSTEM ARCHITECTURES
FOR MOBILE ENTERPRISE APPLICATIONS, IADIS International Conference Applied
Computing, September 2011, pp.131-138.

[17] M. Yamin, Basel Katt, Mobile Device Management (MDM) Technologies, Issues and
Challenges, ICCSP '19: Proceedings of the 3rd International Conference on Cryptography, Security
and Privacy, January 2019, pp 143–147. doi:10.1145/10.1145/3309074.3309103
[18] M. Migliardi, A. Merlo and Sh. Al-Haj Baddar, Adaptive Mobile Computing, book
 Chapter 10 - Exploring Mobile Data Security with Energy Awareness, 2017, pp. 203-215
doi: 10.1016/B978-0-12-804603-6.00010-3
[19] R. Koneru, P. Dasari, P. Deshpande, and al., Mobile application management systems and
methods thereof. US Patent 9,405,723, August, 2016.