Skip to main content
Top

2018 | OriginalPaper | Chapter

Private Data Protection of Android Application

Authors : Jinseong Kim, Im Y. Jung

Published in: Advances in Computer Science and Ubiquitous Computing

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Many Android applications store sensitive information such as account information, debit/credit card details. The exposed information can be accessed by attackers. They can pretend to be the data owners in cyber space with a duplicate of the information. In this study, we propose a new framework to protect Android applications against the data duplication attack. The proposed framework is practical because it can be applied to all of Android applications and has an inconsiderable overhead contributing to security of Android.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Joshi, J., Parekh, C.: Android smartphone vulnerabilities: a survey. In: International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring), pp. 1–5. IEEE (2016) Joshi, J., Parekh, C.: Android smartphone vulnerabilities: a survey. In: International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring), pp. 1–5. IEEE (2016)
3.
go back to reference Jung, J.H., et al.: Repackaging attack on android banking applications and its countermeasures. Wirel. Pers. Commun. 73(4), 1421–1437 (2013)CrossRef Jung, J.H., et al.: Repackaging attack on android banking applications and its countermeasures. Wirel. Pers. Commun. 73(4), 1421–1437 (2013)CrossRef
4.
go back to reference Ardiansa, R.: Developing secure android application with encrypted database file using sqlcipher. PhD Thesis. UTeM (2014) Ardiansa, R.: Developing secure android application with encrypted database file using sqlcipher. PhD Thesis. UTeM (2014)
5.
go back to reference Kantar Worldpanel ComTech: THE TIME OF DOUBLEDIGIT GROWTH IS OVER. DEAL WITH IT, p. 4 (2016) Kantar Worldpanel ComTech: THE TIME OF DOUBLEDIGIT GROWTH IS OVER. DEAL WITH IT, p. 4 (2016)
6.
go back to reference Chen, K., Liu, P., Zhang, Y.: Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In: Proceedings of the 36th International Conference on Software Engineering, pp. 175–186. ACM (2014) Chen, K., Liu, P., Zhang, Y.: Achieving accuracy and scalability simultaneously in detecting application clones on android markets. In: Proceedings of the 36th International Conference on Software Engineering, pp. 175–186. ACM (2014)
7.
go back to reference Kim, J.; Jung, I.Y.: Android app protection using same identifier attack defensor. In: IEEE International Conference on Intelligence and Security Informatics (ISI) 2017, p. 201. IEEE (2017) Kim, J.; Jung, I.Y.: Android app protection using same identifier attack defensor. In: IEEE International Conference on Intelligence and Security Informatics (ISI) 2017, p. 201. IEEE (2017)
Metadata
Title
Private Data Protection of Android Application
Authors
Jinseong Kim
Im Y. Jung
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-7605-3_234