To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports
Sangita Mahajan1 , Suvarna Sangle2 , Gayatri Khairnar3
Section:Research Paper, Product Type: Journal Paper
Volume-3 ,
Issue-9 , Page no. 185-188, Sep-2015
Online published on Oct 01, 2015
Copyright © Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar, “To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.185-188, 2015.
MLA Citation
MLA Style Citation: Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar "To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports." International Journal of Computer Sciences and Engineering 3.9 (2015): 185-188.
APA Citation
APA Style Citation: Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar, (2015). To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports. International Journal of Computer Sciences and Engineering, 3(9), 185-188.
BibTex Citation
BibTex Style Citation:
@article{Mahajan_2015,
author = {Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar},
title = {To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {185-188},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=665},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=665
TI - To develop an application in android for smart phones tasks processing to the cloud to detect malware in application and generate reports
T2 - International Journal of Computer Sciences and Engineering
AU - Sangita Mahajan, Suvarna Sangle , Gayatri Khairnar
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 185-188
IS - 9
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2371 | 2262 downloads | 2430 downloads |




Abstract
Most of us use android phones these days and also uses the multiple applications and facilities frequently. Play store provides great number of application but unfortunately few of those applications are fraud. Such applications dose damage to phone and also possibly data thefts. Hence such applications must be marked, so that they will be recognizable for play store users. So we are proposing a web application which will process the information, comments and the reviews of the application on cloud server. As we are handling the big data here so the process is done on cloud server and malware is detected. So it will be easier to decide which application is fraud or not. Multiple applications can be processed at a time with the web application.
Key-Words / Index Term
Android, Permissions, Security, Instrumentation, Privacy, Risk assessment
References
[1] W. Enck, M. Ongtang, and P. McDaniel, “On lightweight mobile phone application certification,” in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 235–245.
[2] B. P. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, and I. Molloy, “Android permissions: A perspective combining risks and benefits,” in Proc. 17th ACM Symp. Access Control Models Technol., 2012, pp. 13–22.
[3] H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita- Rotaru, and I. Molloy, “Using probabilistic generative models for ranking risks of Android apps,” in Proc. ACM Conf. Comput. Commun. Security, 2012, pp. 241–252.
[4] Ali K, Lhot_ak O. Application-only call graph construction. In:Proceedings of the 26th European onference onObject-Oriented Programming. Springer-Verlag; 2012.p. 688e712. “A tool for reverse engineering android apk files.”
[5] A.-D. Schmidt, R. Bye, H.-G. Schmidt, J. Clausen, O. Kiraz, K. A. Yuksel, S. A. Camtepe, and S. Albayrak, “Static analysis of executables for collaborative malware detection on Android,” in Proc. IEEE Int. Conf. Commun., 2009, pp. 1–5.
[6] I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, “Crowdroid: Behavior-based malware detection system for Android,” in Proc. 1st ACM Workshop Security Privacy Smartphones Mobile Devices, 2011, pp. 15–26.