Open Access Open Access  Restricted Access Subscription Access

Android Application Permissions and Privacy Issues


Affiliations
1 Content Writer, Kerala, India
2 Lecturer (Computer Science),Department of Commerce, Bishop Kurialacherry College for Women, Amalagiri, Kottayam - 686 561, Kerala, India

   Subscribe/Renew Journal


The use of smartphones increased worldwide during the past decade. The usage share of mobile Operating Systems shows the popularity and acceptability of mobile Operating Systems along with its application programs. Android remains the most widely used mobile operating system in the world. Here in this paper we discuss about the workflow of Android applications along with the application permissions and privacy issues related to it.

Keywords

Security, App Permission Security, Data Breaches, Data Security, User Privacy

Manuscript Received : December 12, 2022 ; Revised : December 23, 2022 ; Accepted : January 5, 2023. Date of Publication : February 5, 2023.

User
Subscription Login to verify subscription
Notifications
Font Size

  • “Mobile Operating System market share worldwide - April 2021.” gs.statcounter.com. https://gs.statcounter.com/os-market-share/mobile/worldwide
  • J. Philip and M. Raju, “Analyzing the growing needs of users to employ hardware and software restrictions in smartphones for increased privacy and data security,” Indian J. Comput. Sci., vol. 6, no. 5, pp. 17–27, 2021, doi: 10.17010/ijcs/2021/v6/i5/166514.
  • J. Philip and M. Raju, "Security impact of trusted execution environment in rich execution environment based systems," Indian J. Comput. Sci., vol. 5, no. 4–5, pp. 26–37, 2020. doi: 10.17010/ijcs/2020/v5/i4-5/154785.
  • J. Philip and M. Raju “A formal overview of application sandbox in Android and iOS with the need to secure sandbox against increasing number of malware attacks,” Indian J. Comput. Sci., vol. 4, no. 3, pp. 32–40, 2019. doi: 10.17010/ijcs/2019/v4/i3/146164.
  • J. Philip and M. Raju, “An overview about the security architecture of the mobile operating system iOS,” Indian J. Comput. Sci., vol. 4, no. 1, pp. 13–18, 2019. doi: 10.17010/ijcs/2019/v4/i1/142412.
  • “Permissions on Android.” Developer.android.com. https://developer.android.com/guide/topics/permissions/overview
  • A. P. Felt, E. Ha, S. Egelman, A. Haney, E Chin, and D. Wagner. “Android permissions: User attention, comprehension, and behavior,” in Proc. 8th Symp. Usable Privacy Secur. ACM., 2012. [Online]. Available: https://cups.cs.cmu.edu/soups/2012/proceedings/a3_Felt.pdf
  • S. Garfinkel and H. R. Lipford. “Usable security: History, themes, and challenges,” in Synthesis Lectures on Inform. Secur., Privacy, Trust, 2014. doi: 10.1007/978-3-031-02343-9.
  • J. Lin, B. Liu, N. Sadeh, and J. I Hong, “Modeling users’ mobile app privacy preferences: Restoring usability in a sea of permission settings,” in Proc. 10th Symp. Usable Privacy Secur., 2014, pp. 199–212.
  • P. Wijesekera, A. Baokar, A. Hosseini, S. Egelman, D. Wagner, and K. Beznosov, “Android permissions remystified: A field study on contextual integrity,” in 24th USENIX Secur. Symp., 2015, pp. 499–514. [Online]. Available: https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-wijesekera.pdf
  • “Edward Snowden: Leaks that exposed US spy programme.”BBC.com. https://www.bbc.com/news/world-us-canada-23123964
  • A. Alshehri, A. Hewins, M. McCulley, H. Alshahrani,. H. Fu.,and Y. Zhu., “Risks behind device information permissions in Android OS,” Commun. Netw., vol. 9, no. 4, pp. 219–234, 2017. doi: 10.4236/cn.2017.94016.
  • S. Achleitner and C. Xu, “Android apps leaking sensitive data found on Google Play with 6 million U.S. downloads.”Unit42. https://unit42.paloaltonetworks.com/android-apps-data-leakage/
  • Federal Communications Commission, “Wireless connections and bluetooth security tips.” FCC.Gov. https://www.fcc.gov/consumers/guides/how-protect-yourself-online
  • R. Sobers, “89 must-know data breach statistics for 2022.” Varonis.com. https://www.varonis.com/blog/data-breach-statistics/
  • L. Constantin, “One in three organizations suffered data breaches due to mobile devices.” CSOOnline.com. https://www.csoonline.com/article/3353560/one-in-three-organizations-suffered-data-breaches-due-to-mobile-devices.html
  • “Smartphones face high hacking risk in 2020: Report.” TheHindu.com. https://www.thehindu.com/sci-tech/technology/gadgets/smartphones-face-high-hacking-risk-in-2020-report/article30450912.ece
  • “Remote working linked to data breach in 66% Indian firms: Survey.” Ciso.economictimes.indiatimes.com. https://ciso.economictimes.indiatimes.com/news/remote-working-linked-to-data-breach-in-66-indian-firms-survey/77653551
  • “Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach.” TheGuardian.com. https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election

Abstract Views: 139

PDF Views: 0




  • Android Application Permissions and Privacy Issues

Abstract Views: 139  |  PDF Views: 0

Authors

Jithu Philip
Content Writer, Kerala, India
Merin Raju
Lecturer (Computer Science),Department of Commerce, Bishop Kurialacherry College for Women, Amalagiri, Kottayam - 686 561, Kerala, India

Abstract


The use of smartphones increased worldwide during the past decade. The usage share of mobile Operating Systems shows the popularity and acceptability of mobile Operating Systems along with its application programs. Android remains the most widely used mobile operating system in the world. Here in this paper we discuss about the workflow of Android applications along with the application permissions and privacy issues related to it.

Keywords


Security, App Permission Security, Data Breaches, Data Security, User Privacy

Manuscript Received : December 12, 2022 ; Revised : December 23, 2022 ; Accepted : January 5, 2023. Date of Publication : February 5, 2023.


References





DOI: https://doi.org/10.17010/ijcs%2F2023%2Fv8%2Fi1%2F172681