Survey on Enhancing Security using Android Permission Model

2015 
More and more people rely on smart phones to manage their personal data. Smartphone's are today the repositories of our secrets (photos, email), of our money (online e-commerce) and of our identities (social networks accounts). Therefore mobile applications have the responsibility of handling such sensitive and personal information in a proper, secure way. For the protection of user data from third party applications, it is common for smartphone's Operating Systems to use permission model control the Permissions granted to third party applications. The user receives a dialog with the list of permissions requested by the application before installation. Once the application is installed, the user gives chance to third Party application developer to attack. Nowadays attackers are developing such a malicious application. Devices to various attacks. To protect against such attacks, different solutions are being given. We studied and detection of attacks focused on behavior-based approach. It is difficult for general users to permissions which are potentially harmful and those which are not. We are proposing a scheme to the user, so that he/she can give access to the requested permissions, or can deny and finish the installation.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []