User Feedback and Service Security in Android Application Platform

Authors

  • Dr. Avinash S. Kapse  Ph.D.(CSE),M.E.(CSE),B.E.(CSE), Diploma (CT) , Associate Professor & Head of Department, Information Technology, Anuradha Engineering College, Chikhli, India
  • Pravinkumar M. Ghaywat   Student, Department of Computer Science & Engineering, Anuradha Engineering College, Chikhli, India

Keywords:

Android OS, Smartphone’s, Malwares, Cloud Services, Applications Security.

Abstract

Moreover some technology are benefits to the society whereas some are very hard to accept the drastic change. The best example in all this facts are Android devise which definitely helps to generate various features in coming technological word and helps to fulfil the demand of the clock. But as far as demand is concerned the security features are also became the major part for considering the fact and its mechanism off course became the major part of concerned .This paper will determine how we can make it is feasible to make control the security feature of the any Android devices by making a mechanism by which we can improve its performance and reduce the security related issue.

References

  1. Byung-Gon Chun and Petros Maniatis., Augmented smartphone applications through clone cloud execution. In Proceedings of the 12th conference on Hot topics in operating systems, 2009.
  2. Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, and Herbert Bos. Paranoid android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, 2010.
  3. Asaf Shabtai and Yuval Elovici. Applying behavioral detection on android-based devices. In MOBILWARE, pages 235–249, 2010.
  4. A D Schmidt. Detection of Smartphone Malware. PhD thesis, Technischen Universit¨at Berlin, 2011.
  5. Amir Houmansadr, Saman A. Zonouz, and Robin Berthier. A cloud-based intrusion detection and response system for mobile phones. In Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and NetworksWorkshops, DSNW ’11, pages 31–32,Washington, DC, USA, 2011. IEEE Computer Society.
  6. Iker Burguera, Urko Zurutuza, and Simin N. Tehrani. Crowdroid: behavior-based malware detection system for Android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM ’11, pages 15–26, New York, NY, USA, October 2011. ACM.
  7. Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, and Herbert Bos. Paranoid android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, 2010.
  8. Aubrey-Derrick Schmidt, Frank Peters, Florian Lamour, and Sahin Albayrak. Monitoring smartphones for anomaly detection. In Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, MOBILWARE ’08, pages 40:1–40:6, ICST, Brussels, Belgium, Belgium, 2007. ICST
  9. Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, and Farnam Jahanian. Virtualized In-Cloud Security Services for Mobile Devices. In Workshop on Virtualization in Mobile Computing (MobiVirt ’08), Breckenridge, Colorado, June 2008.
  10. Philipp Stephanow Lakshmi Subramanian, Gerald Q. Maguire Jr. An architecture to provide cloud based security services for smartphones, 2011.
  11. Sven Bugiel, Lucas Davi, Alexandra Dmitrienko, Thomas Fischer, and Ahmad-Reza Sadeghi. Xmandroid: A new android evolution to mitigate privilege escalation attacks. Technical report, Technische Universit¨at Darmstadt, 2011.

Downloads

Published

2020-09-30

Issue

Section

Research Articles

How to Cite

[1]
Dr. Avinash S. Kapse, Pravinkumar M. Ghaywat , " User Feedback and Service Security in Android Application Platform " International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 11, pp.07-10, September-2020.