Analysis of Android app Permissions for User’s Privacy Preservation
Keywords:
Android, Classification, Dangerous, Permission, Harmful Apps, Normal PermissionAbstract
The total number of consumers that are using smartphones has increased in the past year and continue to grow. Mobile users are concerned about their sensitive data, but often do not understand the security risks involved while performing financial transactions through a mobile application. This research work mainly focused on application permissions and whether they are categorized as dangerous or normal as per the Android developer guidelines. These two types of permissions help to compute the possible danger of each mobile application. Results showed that risky permissions apps are harmful for user’s data preservation and classification of normal and dangerous apps clearly. Our work proposes a system which would help the users in analyzing and removing harmful apps and thereby protecting their security and privacy. This is achieved by analyzing the various permissions used by an application that it has requested during installation. The overall process of analyzing apps is done using weka data mining tool and classification techniques. The major objective of the proposed system is to detect and remove the potentially risky apps that are present in the user’s Android device.
References
Veelasha Moonsamy, Jia Rong, Shaowu Liu, “Mining permission patterns for contrasting clean and malicious android applications”, www.elsevier.com/locate/fgcs,2014.
Brett Ferris, Jay Stahle, and Ibrahim Baggili, “Quantifying the Danger of Mobile Banking Applications on the Android Platform”, 9th ANNUAL SYMPOSIUM ON INFORMATION ASSURANCE (ASIA’14), JUNE 3-4, 2014.
Dimitris Geneiatakis ,Igor Nai Fovino , Ioannis Kounelis,Paquale Stirparo , “A Permission verification approach for android mobile applications”, www.sciencedirect.com,2015.
Christoph Stach and Bernhard Mitschang ,”Design and Implementation of the Privacy Management Platform” 2014 IEEE 15th International Conference on Mobile Data Management
Mohd Fauzi bin Othman,Thomas Moh Shan Yau,”Comparison of Different Classification Techniques Using WEKA for Breast Cancer”.Control and Instrumentation Department, Faculty of Electrical Engineering, Universiti Teknologi Malaysia, Skudai, Malaysia.
Felt, A. P., Greenwood, K., & Wagner, D. (2011, June). “The effectiveness of application permissions”. In Proceedings of the 2nd USENIX conference on Web application development (pp. 7-7).
Supriya S. Shinde, Prof. Rahul Patil,” Improving spam mail filtering using classification algorithms with discretization Filter” International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS), September-November, 2014, pp. 82-87.
Ryan Farmer:” A Brief Guide to Android Security”(2012)
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
