Survey on Privacy Permission Management Approaches for Android OS Applications
نویسندگان
چکیده
Smart phones have been becoming popular and mobile users are increasingly relying on them to store and handle personal information. The intake of smart phone devices for email writing, online bank transactions growing with growth of the smartphone market and accessing other forms of sensitive content has lead to the emergence of a new and ever changing threat. However, recent studies also reveal the disturbing fact that users personal information is put at risk by smart phone applications. Existing mobile privacy approaches are having limitations in their performance in handling these privacy-violating smart phone applications. Android OS(Operating System) supports the third party software development mostly. However, many of these applications accesses private or sensitive data totally negligent which immediately leads to serious privacy concerns. To reduce this problem, the current Android permission rules are much too coarse and incomprehensible from the average users perspective. Mobile users does not understands the meaning of the permissions, so he or she must either accept all of them or waive the application. Privacy Permission Management for Android OS has becomes very important security issue as, the user has only two options when they install new applications – accept the permissions and allow the install, or reject all the terms and exit without installation. So here is the need to design system in the manner which provides security to user's personal information leak and misuse of it should be prevented. This paper
منابع مشابه
A Grey List-Based Privacy Protection for Android
The openness of Android OS and the easy development of applications have attracted a large number of enthusiasts to join in. Due to the deficiencies of permission mechanism of Android OS, an Android privacy protection system called Protectedroid is presented in this paper which is a model based on grey list and enables the design of security strategies more easily. Protectedroid adds an enforci...
متن کاملA new approach for managing Android permissions: learning users' preferences
Today, permissions management solutions on mobile devices employ Identity Based Access Control (IBAC) models. If this approach was suitable when people had only a few games (like Snake or Tetris) installed on their mobile phones, the current situation is different. A survey from Google in 2013 showed that, on average, french users have installed 32 applications on their Android smartphones. As ...
متن کاملPScout : Analyzing the Android Permission Specification by Kathy Wain Yee Au
PScout: Analyzing the Android Permission Specification Kathy Wain Yee Au Master of Applied Science Graduate Department of Electrical and Computer Engineering University of Toronto 2012 Modern smartphone operating systems (OSs) have been developed with a greater emphasis on security and protecting privacy. One of the security mechanisms these systems use is permission system. We perform an analy...
متن کاملMalicious Behavior Monitoring for Android Applications
Android, as a modern popular open source mobile platform, makes its security issues more prominent, especially in user privacy leakage. In this paper, we proposed a twostep model which combines static and dynamic analysis approaches. During the static analysis, permission combination matrix is used to determine whether an application has potential risks. For those suspicious applications, based...
متن کاملTwo-factor Protection Scheme in Securing the Source Code of Android Applications
While Android has become most popular OS in mobile phone market, more and more Android app developers are suffering from intellectual property infringement because it’s easy to extract the assets stored in the Android apps and to decompile Android apps to Java source code. This issue also poses threats to users’ privacy. In this article we reviewed the existing protection approaches for the pro...
متن کامل