Open Access Open Access  Restricted Access Subscription Access

Security Comparison of Android and IOS and Implementationof User Approved Security (UAS) for Android


Affiliations
1 National Institute of Electronics and Information Technology (NIELIT), SIDCO Electronics Complex, Old Airport Road, Rangreth, Srinagar - 191132, Jammu and Kashmir, India
2 Department of Computer Science, University of Kashmir, Hazratbal, Srinagar - 190006, Jammu and Kashmir, India
 

Background/Objectives: The widely spread Smartphone operating systems i.e. iOS and Android are loaded with the inherent security measures to protect their millions of users worldwide. Android, being familiar and popular in open supply mobile package i.e. open source platform has some security limitations or vulnerabilities which are also present in iOS that is owned by Apple and is a proprietary platform with some open supply parts. Methods/Statistical Analysis: We compare the basic protection options of Android and iOS, with the objective to combine the user approved security (UAS) model in Android so that we are able to grant permissions to access various resources on a Smartphone at the time of execution. Findings: In this paper we propose the implementation of a reverse engineering method that restricts Access of the resources and provides a requirement based procedure to access resources. Applications/Improvements: By incorporating the user approved security, the repackaged app would be more secure and will be capable of running on all the devices.

Keywords

Android, App, iOS, Mobile Package, Open-Supply, Repackaged App, Reverse-Engineering
User

Abstract Views: 211

PDF Views: 0




  • Security Comparison of Android and IOS and Implementationof User Approved Security (UAS) for Android

Abstract Views: 211  |  PDF Views: 0

Authors

Dar Muneer Ahmad
National Institute of Electronics and Information Technology (NIELIT), SIDCO Electronics Complex, Old Airport Road, Rangreth, Srinagar - 191132, Jammu and Kashmir, India
Parvez Javed
Department of Computer Science, University of Kashmir, Hazratbal, Srinagar - 190006, Jammu and Kashmir, India

Abstract


Background/Objectives: The widely spread Smartphone operating systems i.e. iOS and Android are loaded with the inherent security measures to protect their millions of users worldwide. Android, being familiar and popular in open supply mobile package i.e. open source platform has some security limitations or vulnerabilities which are also present in iOS that is owned by Apple and is a proprietary platform with some open supply parts. Methods/Statistical Analysis: We compare the basic protection options of Android and iOS, with the objective to combine the user approved security (UAS) model in Android so that we are able to grant permissions to access various resources on a Smartphone at the time of execution. Findings: In this paper we propose the implementation of a reverse engineering method that restricts Access of the resources and provides a requirement based procedure to access resources. Applications/Improvements: By incorporating the user approved security, the repackaged app would be more secure and will be capable of running on all the devices.

Keywords


Android, App, iOS, Mobile Package, Open-Supply, Repackaged App, Reverse-Engineering



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i14%2F132358