Open Access Open Access  Restricted Access Subscription Access

Granular Per(M)issions: Questions Unanswered


Affiliations
1 Department of Computer Science, Himachal Pradesh University, Himachal Pradesh, India
 

Objectives: In android users do not understand the permissions structure and how apps utilize these permissions. Methods/Statistical Analysis: Study of App Ops system in android and finding out ways to check what permission android apps are using and also to check and derive various algorithms to see what levels of access can be granted to permissions. Also to see if an application can be developed so that the user could know what permissions app is using and whether they are required or not? Findings: After proposing four algorithms and trying to classify the level of protection access to permissions we have found that this classification yields desired results. The client can know what permissions are being requested by which apps and can therefore be enlightened to its hazards and security risks. Also although this approach is similar to what Google has done with the Marshmallow version howsoever it suffers from shortcomings and is not yet, a complete solution. Thus, our results will only substantiate and help in the creation of a more robust and secure android version. Whether this much power should be given to the naïve user, however is a question that needs some thought. Application/Improvements: Our algorithms can be applied to newer versions of android to make it more secure and ensure user privacy.

Keywords

Algorithms, Android, Granular, Permissions, Privacy, Security.
User

Abstract Views: 201

PDF Views: 0




  • Granular Per(M)issions: Questions Unanswered

Abstract Views: 201  |  PDF Views: 0

Authors

Akshay Bhardwaj
Department of Computer Science, Himachal Pradesh University, Himachal Pradesh, India
A. J. Singh
Department of Computer Science, Himachal Pradesh University, Himachal Pradesh, India

Abstract


Objectives: In android users do not understand the permissions structure and how apps utilize these permissions. Methods/Statistical Analysis: Study of App Ops system in android and finding out ways to check what permission android apps are using and also to check and derive various algorithms to see what levels of access can be granted to permissions. Also to see if an application can be developed so that the user could know what permissions app is using and whether they are required or not? Findings: After proposing four algorithms and trying to classify the level of protection access to permissions we have found that this classification yields desired results. The client can know what permissions are being requested by which apps and can therefore be enlightened to its hazards and security risks. Also although this approach is similar to what Google has done with the Marshmallow version howsoever it suffers from shortcomings and is not yet, a complete solution. Thus, our results will only substantiate and help in the creation of a more robust and secure android version. Whether this much power should be given to the naïve user, however is a question that needs some thought. Application/Improvements: Our algorithms can be applied to newer versions of android to make it more secure and ensure user privacy.

Keywords


Algorithms, Android, Granular, Permissions, Privacy, Security.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i32%2F128783