CenterYou: Android privacy made easier the Cloud Way
- 2 September 2022
- journal article
- Published by Peertechz Publications Private Limited in Trends in Computer Science and Information Technology
- Vol. 7 (3), 057-073
- https://doi.org/10.17352/tcsit.000052
Abstract
The Smartphone industry has expanded significantly over the last few years. According to the available data, each year, a marked increase in the number of devices in use is observed. Most consumers opt for Smartphones due to the extensive number of software applications that can be downloaded on their devices, thus increasing their functionality. However, this growing trend of application installation brings an issue of user protection, as most applications seek permissions to access data on a user’s device. The risks this poses to sensitive data are real to both corporate and individual users. While Android has grown in popularity, this trend has not been followed by the efforts to increase the security of its users. This is a well-known set of problems, and prior solutions have approached it from the ground up; that is, they have focused on implementing reasonable security policies within Android’s open-source kernel. While these solutions have achieved the goals of improving Android with such security policies, they are severely hampered by the way in which they have been implemented them. In this work, a framework referred to as CenterYou is proposed to overcome these issues. It applies pseudo data technique and cloud-based decision-making system to scan and protect Smartphone devices from unnecessarily requested permissions by installed applications and identifies potential privacy leakages. The current paper demonstrated all aspects of the CenterYou application technical design. The work presented here provides a significant contribution to the field, as the technique based on pseudo data is used in the actual permissions administration of Android applications. Moreover, this system is user and cloud-driven, rather than being governed by over-privileged applications.Keywords
This publication has 23 references indexed in Scilit:
- Reviews on Cybercrime Affecting Portable DevicesProcedia Technology, 2013
- Cyber-threat evolution: the past yearComputer Fraud & Security, 2012
- Privilege Escalation Attacks on AndroidLecture Notes in Computer Science, 2011
- Taming Information-Stealing Smartphone Applications (on Android)Lecture Notes in Computer Science, 2011
- A Design Science Research Methodology for Information Systems ResearchJournal of Management Information Systems, 2007
- User-Level Device Drivers: Achieved PerformanceJournal of Computer Science and Technology, 2005
- Challenges, Methodologies, and Issues in the Usability Testing of Mobile ApplicationsInternational Journal of Human–Computer Interaction, 2005
- Analysis of end user security behaviorsComputers & Security, 2005
- Using GPS to learn significant locations and predict movement across multiple usersPersonal and Ubiquitous Computing, 2003
- The Right to PrivacyHarvard Law Review, 1890