Open Access
Subscription Access
Android Application Permissions and Privacy Issues
Subscribe/Renew Journal
The use of smartphones increased worldwide during the past decade. The usage share of mobile Operating Systems shows the popularity and acceptability of mobile Operating Systems along with its application programs. Android remains the most widely used mobile operating system in the world. Here in this paper we discuss about the workflow of Android applications along with the application permissions and privacy issues related to it.
Keywords
Security, App Permission Security, Data Breaches, Data Security, User Privacy
Manuscript Received : December 12, 2022 ; Revised : December 23, 2022 ; Accepted : January 5, 2023. Date of Publication : February 5, 2023.
User
Subscription
Login to verify subscription
Font Size
Information
- “Mobile Operating System market share worldwide - April 2021.” gs.statcounter.com. https://gs.statcounter.com/os-market-share/mobile/worldwide
- J. Philip and M. Raju, “Analyzing the growing needs of users to employ hardware and software restrictions in smartphones for increased privacy and data security,” Indian J. Comput. Sci., vol. 6, no. 5, pp. 17–27, 2021, doi: 10.17010/ijcs/2021/v6/i5/166514.
- J. Philip and M. Raju, "Security impact of trusted execution environment in rich execution environment based systems," Indian J. Comput. Sci., vol. 5, no. 4–5, pp. 26–37, 2020. doi: 10.17010/ijcs/2020/v5/i4-5/154785.
- J. Philip and M. Raju “A formal overview of application sandbox in Android and iOS with the need to secure sandbox against increasing number of malware attacks,” Indian J. Comput. Sci., vol. 4, no. 3, pp. 32–40, 2019. doi: 10.17010/ijcs/2019/v4/i3/146164.
- J. Philip and M. Raju, “An overview about the security architecture of the mobile operating system iOS,” Indian J. Comput. Sci., vol. 4, no. 1, pp. 13–18, 2019. doi: 10.17010/ijcs/2019/v4/i1/142412.
- “Permissions on Android.” Developer.android.com. https://developer.android.com/guide/topics/permissions/overview
- A. P. Felt, E. Ha, S. Egelman, A. Haney, E Chin, and D. Wagner. “Android permissions: User attention, comprehension, and behavior,” in Proc. 8th Symp. Usable Privacy Secur. ACM., 2012. [Online]. Available: https://cups.cs.cmu.edu/soups/2012/proceedings/a3_Felt.pdf
- S. Garfinkel and H. R. Lipford. “Usable security: History, themes, and challenges,” in Synthesis Lectures on Inform. Secur., Privacy, Trust, 2014. doi: 10.1007/978-3-031-02343-9.
- J. Lin, B. Liu, N. Sadeh, and J. I Hong, “Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings,” in Proc. 10th Symp. Usable Privacy Secur., 2014, pp. 199–212.
- P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner, and K. Beznosov, “Android permissions remystified: A field study on contextual integrity,” in 24th USENIX Secur. Symp., 2015, pp. 499–514. [Online]. Available: https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-wijesekera.pdf
- “Edward Snowden: Leaks that exposed US spy programme.”BBC.com. https://www.bbc.com/news/world-us-canada-23123964
- A. Alshehri, A. Hewins, M. McCulley, H. Alshahrani,. H. Fu.,and Y. Zhu., “Risks behind device information permissions in Android OS,” Commun. Netw., vol. 9, no. 4, pp. 219–234, 2017. doi: 10.4236/cn.2017.94016.
- S. Achleitner and C. Xu, “Android apps leaking sensitive data found on Google Play with 6 million U.S. downloads.”Unit42. https://unit42.paloaltonetworks.com/android-apps-data-leakage/
- Federal Communications Commission, “Wireless connections and bluetooth security tips.” FCC.Gov. https://www.fcc.gov/consumers/guides/how-protect-yourself-online
- R. Sobers, “89 must-know data breach statistics for 2022.” Varonis.com. https://www.varonis.com/blog/data-breach-statistics/
- L. Constantin, “One in three organizations suffered data breaches due to mobile devices.” CSOOnline.com. https://www.csoonline.com/article/3353560/one-in-three-organizations-suffered-data-breaches-due-to-mobile-devices.html
- “Smartphones face high hacking risk in 2020: Report.” TheHindu.com. https://www.thehindu.com/sci-tech/technology/gadgets/smartphones-face-high-hacking-risk-in-2020-report/article30450912.ece
- “Remote working linked to data breach in 66% Indian firms: Survey.” Ciso.economictimes.indiatimes.com. https://ciso.economictimes.indiatimes.com/news/remote-working-linked-to-data-breach-in-66-indian-firms-survey/77653551
- “Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach.” TheGuardian.com. https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
Abstract Views: 139
PDF Views: 0