Open Access   Article Go Back

To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports

Sangita Mahajan1 , Suvarna Sangle2 , Gayatri Khairnar3

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 185-188, Sep-2015

Online published on Oct 01, 2015

Copyright © Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar, “To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.185-188, 2015.

MLA Style Citation: Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar "To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports." International Journal of Computer Sciences and Engineering 3.9 (2015): 185-188.

APA Style Citation: Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar, (2015). To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports. International Journal of Computer Sciences and Engineering, 3(9), 185-188.

BibTex Style Citation:
@article{Mahajan_2015,
author = {Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar},
title = {To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {185-188},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=665},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=665
TI - To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports
T2 - International Journal of Computer Sciences and Engineering
AU - Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 185-188
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2321 2208 downloads 2346 downloads
  
  
           

Abstract

Most of us use android phones these days and also uses the multiple applications and facilities frequently. Play store provides great number of application but unfortunately few of those applications are fraud. Such applications dose damage to phone and also possibly data thefts. Hence such applications must be marked, so that they will be recognizable for play store users. So we are proposing a web application which will process the information, comments and the reviews of the application on cloud server. As we are handling the big data here so the process is done on cloud server and malware is detected. So it will be easier to decide which application is fraud or not. Multiple applications can be processed at a time with the web application.

Key-Words / Index Term

Android, Permissions, Security, Instrumentation, Privacy, Risk assessment

References

[1] W. Enck, M. Ongtang, and P. McDaniel, “On lightweight mobile phone application certification,” in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 235–245.
[2] B. P. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, and I. Molloy, “Android permissions: A perspective combining risks and benefits,” in Proc. 17th ACM Symp. Access Control Models Technol., 2012, pp. 13–22.
[3] H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita- Rotaru, and I. Molloy, “Using probabilistic generative models for ranking risks of Android apps,” in Proc. ACM Conf. Comput. Commun. Security, 2012, pp. 241–252.
[4] Ali K, Lhot_ak O. Application-only call graph construction. In:Proceedings of the 26th European onference onObject-Oriented Programming. Springer-Verlag; 2012.p. 688e712. “A tool for reverse engineering android apk files.”
[5] A.-D. Schmidt, R. Bye, H.-G. Schmidt, J. Clausen, O. Kiraz, K. A. Yuksel, S. A. Camtepe, and S. Albayrak, “Static analysis of executables for collaborative malware detection on Android,” in Proc. IEEE Int. Conf. Commun., 2009, pp. 1–5.
[6] I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, “Crowdroid: Behavior-based malware detection system for Android,” in Proc. 1st ACM Workshop Security Privacy Smartphones Mobile Devices, 2011, pp. 15–26.