Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Survey on Privacy Permission Management Approaches for Android OS Applications

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 107 - Number 3
Year of Publication: 2014
Authors:
Supriya Shinde
S. S. Sambare
10.5120/18731-9967

Supriya Shinde and S S Sambare. Article: Survey on Privacy Permission Management Approaches for Android OS Applications. International Journal of Computer Applications 107(3):14-17, December 2014. Full text available. BibTeX

@article{key:article,
	author = {Supriya Shinde and S. S. Sambare},
	title = {Article: Survey on Privacy Permission Management Approaches for Android OS Applications},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {107},
	number = {3},
	pages = {14-17},
	month = {December},
	note = {Full text available}
}

Abstract

Smart phones have been becoming popular and mobile users are increasingly relying on them to store and handle personal information. The intake of smart phone devices for email writing, online bank transactions growing with growth of the smartphone market and accessing other forms of sensitive content has lead to the emergence of a new and ever changing threat. However, recent studies also reveal the disturbing fact that users personal information is put at risk by smart phone applications. Existing mobile privacy approaches are having limitations in their performance in handling these privacy-violating smart phone applications. Android OS(Operating System) supports the third party software development mostly. However, many of these applications accesses private or sensitive data totally negligent which immediately leads to serious privacy concerns. To reduce this problem, the current Android permission rules are much too coarse and incomprehensible from the average users perspective. Mobile users does not understands the meaning of the permissions, so he or she must either accept all of them or waive the application. Privacy Permission Management for Android OS has becomes very important security issue as, the user has only two options when they install new applications – accept the permissions and allow the install, or reject all the terms and exit without installation. So here is the need to design system in the manner which provides security to user's personal information leak and misuse of it should be prevented. This paper provides the study of different approaches of privacy permission management and the outline of all the studied papers.

References

  • Alastair Beresford, Andrew Rice, Nicholas Skehin and Ripduman Sohan. MockDroid: Trading privacy for application functionality on smartphones. Computer Laboratory, University of Cambridge, 2011, www. cl. cam. ac. uk/~acr31/pubs/beresford-mockdroid. pdf
  • Vincent Freeh, Xuxian Jiang, Xinwen Zhang and Yajin Zhou. Taming Information-Stealing Smartphone Applications (on Android). Department of Computer Science, NC State University, 2011, www. csc. ncsu. edu/faculty/jiang/pubs/ TRUST11. pdf
  • Michael Kern, Johannes Sametinger,Permission Tracking in Android. UBICOMM 2012 : The Sixth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • Zheran Fang ,Weili Han . Yingjiu Li, Permission based Android security: Issues and countermeasures, computers & security :2014
  • Mohammad Nauman and Sohail Khan. Design and Implementation of a Fine-grained Resource Usage Model for the Android Platform. Department of Computer Science, University of Peshawar, 2010
  • Christoph Stach and Bernhard Mitschang: Privacy Management for Mobile Platforms -A Review of Concepts and Approaches . In: 2013 IEEE 14th International Conference on Mobile Data Management(2013)
  • http://developer. android. com/guide/topics/manifest/permission element. html
  • Ryan Farmer:" A Brief Guide to Android Security"(2012)
  • Jialiu Lin:"Understanding And Capturing People's Mobile App Privacy"(October 28, 2013)Carnegie Mellon University.
  • Wei X, Gomez L, Neamtiu I, Faloutsos M. Permission evolution in the android ecosystem. In: Proc. of ACSAC. ACM; 2012
  • Google Play. LBE Privacy Guard. play. google. com/store/ apps/details?id=com. lbe. security. lite.