Android Application Security Using User Feedback and Services

Authors

  • Dr. A. S. Kapse  HOD, Computer Science and Engineering Department, Sant Gadge Baba Amravati University, Chikhli Dist: Buldana, Maharashtra, India
  • Pravinkumar Ghayawat   Computer Science and Engineering Department, Sant Gadge Baba Amravati University, Chikhli Dist: Buldana, Maharashtra, India

Keywords:

Android OS, Smartphone's, Malwares, Cloud Services, Applications Security.

Abstract

Nowadays in recent aria of computers and internets, mobiles devices, Smartphone’s plays a vital role in human day to day life. Nowadays Smartphone’s, tablets are becoming very popular especially android OS based Smartphone’s are gaining much more popularity as compared to Apple’s Operating System. These Smartphone’s having various apps and features based on only internet but these new emerging features of these devices give opportunity to new malwares & threats. Android is comparatively new operating system hence its makes very hard to detect and prevent these viruses and malwares attacks by using some traditional mechanisms. So security of these Smartphone’s is now becoming very popular issue of researchers. The lack of standard security mechanism in Android applications is very advantages to hackers. So to overcome these various pitfalls we use cloud services as a security weapon for providing decent security system for Android applications.

References

  1. Byung-Gon Chun and Petros Maniatis. Augmented smartphone applications through clone cloud execution. In Proceedings of the 12th conference on Hot topics in operating systems, 2009.
  2. Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, and Herbert Bos. Paranoid android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, 2010.
  3. Asaf Shabtai and Yuval Elovici. Applying behavioral detection on android-based devices. In MOBILWARE, pages 235–249, 2010.
  4. A D Schmidt. Detection of Smartphone Malware. PhD thesis, Technischen Universit¨at Berlin, 2011.
  5. Amir Houmansadr, Saman A. Zonouz, and Robin Berthier. A cloud-based intrusion detection and response system for mobile phones. In Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and NetworksWorkshops, DSNW ’11, pages 31–32,Washington, DC, USA, 2011. IEEE Computer Society.
  6. Iker Burguera, Urko Zurutuza, and Simin N. Tehrani. Crowdroid: behavior-based malware detection system for Android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM ’11, pages 15–26, New York, NY, USA, October 2011. ACM.
  7. Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, and Herbert Bos. Paranoid android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, 2010.
  8. Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, and Sahin Albayrak. Monitoring smartphones for anomaly detection. In Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE ’08, pages 40:1–40:6, ICST, Brussels, Belgium, Belgium, 2007. ICST
  9. Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, and Farnam Jahanian. Virtualized In-Cloud Security Services for Mobile Devices. In Workshop on Virtualization in Mobile Computing (MobiVirt ’08), Breckenridge, Colorado, June 2008.
  10. Philipp Stephanow Lakshmi Subramanian, Gerald Q. Maguire Jr. An architecture to provide cloud based security services for smartphones, 2011.
  11. Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, and Ahmad-Reza Sadeghi. Xmandroid: A new android evolution to mitigate privilege escalation attacks. Technical report, Technische Universit¨at Darmstadt, 2011.

Downloads

Published

2020-02-17

Issue

Section

Research Articles

How to Cite

[1]
Dr. A. S. Kapse, Pravinkumar Ghayawat, " Android Application Security Using User Feedback and Services, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 5, Issue 6, pp.228-233, January-February-2020.