Open Access   Article Go Back

Android-based IoT Platform Environment and Permission Management

Menakarani R1 , Udayarani V2

Section:Review Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 319-322, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.319322

Online published on May 15, 2019

Copyright © Menakarani R, Udayarani V . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Menakarani R, Udayarani V, “Android-based IoT Platform Environment and Permission Management,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.319-322, 2019.

MLA Style Citation: Menakarani R, Udayarani V "Android-based IoT Platform Environment and Permission Management." International Journal of Computer Sciences and Engineering 07.14 (2019): 319-322.

APA Style Citation: Menakarani R, Udayarani V, (2019). Android-based IoT Platform Environment and Permission Management. International Journal of Computer Sciences and Engineering, 07(14), 319-322.

BibTex Style Citation:
@article{R_2019,
author = {Menakarani R, Udayarani V},
title = {Android-based IoT Platform Environment and Permission Management},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {319-322},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1145},
doi = {https://doi.org/10.26438/ijcse/v7i14.319322}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.319322}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1145
TI - Android-based IoT Platform Environment and Permission Management
T2 - International Journal of Computer Sciences and Engineering
AU - Menakarani R, Udayarani V
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 319-322
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

The Android-supported IoT(Internet of Things) stage simply same the recent Android application provides an condition that makes it easy to use Google`s uses framework administrations includes advancement method and APIs used through which it controls and support the different sensors of a IoT gadgets. Applications used on the Android-supported IoT are frequently User Interface are available free and are used without knowing the client`s agree to enlisted authorizations. It is difficult to find the solution on the misuse of consents just as to check them whether they are registered while upgrading any applications. In this paper breaks down the renditions of previously and after an application the update application running on the Android Application on different stage and the collected consent records. It intends to find the similar authorizations when the update, and erased and recently included authorizations after the any update were distinguished, and accordingly permission and security issues that can require from the authorizations and management that not required for IoT devices to find out the specific capacities

Key-Words / Index Term

Android permissions,Management on premission, Android IoT platform, Android update, Android security

References

[1] Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, and Rosli Salleh, Lorenzo Cavallaro, “The Evolution of Android Malware and Android Analysis Techniques”, Journal of ACM Computing Surveys. 02. 2017.
[2] Yonghong Wu, Jianchao Luo and Lei Luo, “Porting mobile web application engine to the Android platform”, IEEE International Conference Computer and Information Technology, 07. 2010.
[3] Sung Wook Moon, Young Jin Kim, Ho Jun Myeong, Chang Soo Kim, Nam Ju Cha, and Dong Hwan Kim, “Implementation of Smartphone Environment Remote Control and Monitoring System for Android Operating System-based Robot Platform”, International Conference on Ubiquitous Robots and Ambient Intelligence, 11. 2016.
[4] Xuetao Wei, Lorenzo Gomez, Lulian Neamtiu, Michalis Faloutsos, “Permission Evolution in the Android Ecosystem”, Proceedings of the 28th Annual Computer Security Applications Conference 2012, ACSAC ’12, pp. 31-40, 07. 2012.
[5] Xiang Li, Jianyi Liu, Yanyu Huo, Ru Zhang, Yuangang Yao, “An Android malware detection method based on androidmanifest file”, Cloud Computing and Intelligence Systems (CCIS), 08. 2016
[6] Jignesh Joshi, Chandresh Parekh, “Android Smartphone Vulnerabilites : A Survey”, Advances in Computing, Communication, & Automation (ICACCA) (Spring), 09. 2016.
[7] Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, Phillipa Gill and David Lie, “Short Paper: A Look at SmartPhone Permission Models”, In Proceedings of the 1st ACM Workshop on Security and Privacy in SmartPhones and Mobile Devices, SPSM ’11, pp. 63-68, 10. 2011.
[8] Mengyu Qiao, Andrew H. Sung and Qingzhong Liu, “Merging Permission and API Features for Android Malware Detection”, IIAI International Congress on Advanced Applied Informatics, 07. 2016.
[9] Bhaskar Sarma, Ninghui Li, Chris Gates, Rahul Potharaju, Cristina Nita-Rotaru, “Android Permissions: A Perspective Combining Risks and Benefits”, Proceedings of the 17th ACM symposium on Access Control Models and Technologies, SACMAT ’12, pp. 13-22. 06. 2012.
[10]Panagiotis Andriotis, Martina Angela Sasse, Gianluca Stringhini, “Permissions Snapshots: Assessing Users’ Adaptation to the Android Runtime Permission Model”.