Open Access   Article Go Back

Analysis of Android app Permissions for User’s Privacy Preservation

Supriya S. Shinde1 , Santosh S. Sambare2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 304-308, May-2015

Online published on May 30, 2015

Copyright © Supriya S. Shinde , Santosh S. Sambare . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Supriya S. Shinde , Santosh S. Sambare, “Analysis of Android app Permissions for User’s Privacy Preservation,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.304-308, 2015.

MLA Style Citation: Supriya S. Shinde , Santosh S. Sambare "Analysis of Android app Permissions for User’s Privacy Preservation." International Journal of Computer Sciences and Engineering 3.5 (2015): 304-308.

APA Style Citation: Supriya S. Shinde , Santosh S. Sambare, (2015). Analysis of Android app Permissions for User’s Privacy Preservation. International Journal of Computer Sciences and Engineering, 3(5), 304-308.

BibTex Style Citation:
@article{Shinde_2015,
author = {Supriya S. Shinde , Santosh S. Sambare},
title = {Analysis of Android app Permissions for User’s Privacy Preservation},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {304-308},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=523},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=523
TI - Analysis of Android app Permissions for User’s Privacy Preservation
T2 - International Journal of Computer Sciences and Engineering
AU - Supriya S. Shinde , Santosh S. Sambare
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 304-308
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2455 2354 downloads 2512 downloads
  
  
           

Abstract

The total number of consumers that are using smartphones has increased in the past year and continue to grow. Mobile users are concerned about their sensitive data, but often do not understand the security risks involved while performing financial transactions through a mobile application. This research work mainly focused on application permissions and whether they are categorized as dangerous or normal as per the Android developer guidelines. These two types of permissions help to compute the possible danger of each mobile application. Results showed that risky permissions apps are harmful for user’s data preservation and classification of normal and dangerous apps clearly. Our work proposes a system which would help the users in analyzing and removing harmful apps and thereby protecting their security and privacy. This is achieved by analyzing the various permissions used by an application that it has requested during installation. The overall process of analyzing apps is done using weka data mining tool and classification techniques. The major objective of the proposed system is to detect and remove the potentially risky apps that are present in the user’s Android device.

Key-Words / Index Term

Android;Classification; Dangerous Permission; Harmful Apps; Normal Permission.

References

[1] Veelasha Moonsamy, Jia Rong, Shaowu Liu, “Mining permission patterns for contrasting clean and malicious android applications”, www.elsevier.com/locate/fgcs,2014.
[2] Brett Ferris, Jay Stahle, and Ibrahim Baggili, “Quantifying the Danger of Mobile Banking Applications on the Android Platform”, 9th ANNUAL SYMPOSIUM ON INFORMATION ASSURANCE (ASIA’14), JUNE 3-4, 2014.
[3] Dimitris Geneiatakis ,Igor Nai Fovino , Ioannis Kounelis,Paquale Stirparo , “A Permission verification approach for android mobile applications”, www.sciencedirect.com,2015.
[4] Christoph Stach and Bernhard Mitschang ,”Design and Implementation of the Privacy Management Platform” 2014 IEEE 15th International Conference on Mobile Data Management
[5] Mohd Fauzi bin Othman,Thomas Moh Shan Yau,”Comparison of Different Classification Techniques Using WEKA for Breast Cancer”.Control and Instrumentation Department, Faculty of Electrical Engineering, Universiti Teknologi Malaysia, Skudai, Malaysia.
[6] Felt, A. P., Greenwood, K., & Wagner, D. (2011, June). “The effectiveness of application permissions”. In Proceedings of the 2nd USENIX conference on Web application development (pp. 7-7).
[7] Supriya S. Shinde, Prof. Rahul Patil,” Improving spam mail filtering using classification algorithms with discretization Filter” International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), September-November, 2014, pp. 82-87.
[8] http://www.makeuseof.com/tag/the-seven-deadly-android-permissions-how-to-avoid-the-sin-of-slothful-preparedness/
[9] http://developer.android.com
[10] Ryan Farmer:” A Brief Guide to Android Security”(2012)