A Proactive Approach toward Privacy Risk Assessment for Android Apps Permissions

被引:0
|
作者
Hamed, Asma [1 ,2 ]
Kaffel-Ben Ayed, Hella [1 ,3 ]
Machfar, Dorra [3 ]
机构
[1] Univ Manouba, Natl Sch Comp Sci, CRISTAL Lab, Manouba, Tunisia
[2] Esprit Sch Engn, Tunis, Tunisia
[3] Univ Tunis El Manar, Fac Sci Tunis, Tunis, Tunisia
关键词
risk assessment; Android applications; Android permissions; privacy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices store users' personal data. When mobile applications have access to this data they may leak it to third parties without users' consent. Google's Android platforms include a permission model that restricts applications' access to users' personal data. However, users are not aware of how their personal data would be used once applications are installed and permissions granted. This raises a potential privacy concern. In this paper we propose a proactive approach towards users' awareness of the privacy risk involved with granting permissions to Android applications. We present a dynamic privacy risk assessment model that assesses the risk to users' privacy associated to an application which requires a set of permissions. The parameters of this model are the severity and the relative importance of permissions and their interactions. Severity is evaluated according to a standard severity assessment method. The relative importance is estimated according to an analytic method. An experimental study to validate our proactive approach has been conducted. The originality of this works lies in that the privacy risk for a given device owned by an individual varies dynamically based on its different uses applications and related permissions.
引用
收藏
页码:1465 / 1470
页数:6
相关论文
共 50 条
  • [1] Privacy Risk Assessment and Users' Awareness for Mobile Apps Permissions
    Hamed, Asma
    Ben Ayed, Hella Kaffel
    2016 IEEE/ACS 13TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2016,
  • [2] How Dangerous Permissions are Described in Android Apps' Privacy Policies?
    Baalous, Rawan
    Poet, Ronald
    11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018), 2018,
  • [3] An Entropy-based Method for Social Apps Privacy Assessment Using the Android Permissions Architecture
    Sandor, Andrei
    Simion, Eduard
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2022, 22 (03) : 79 - 86
  • [4] Unmasking Privacy Leakage through Android Apps Obscured with Hidden Permissions
    Kotak, Pranav
    Bhandari, Shweta
    Zemmari, Akka
    Joshi, Jaykrishna
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,
  • [5] Utilizing Sentence Embedding for Dangerous Permissions Detection in Android Apps' Privacy Policies
    Baalous, Rawan
    Poet, Ronald
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (01) : 173 - 189
  • [6] Mining Android Apps to Recommend Permissions
    Karim, Md Yasser
    Kagdi, Huzefa
    Di Penta, Massimiliano
    2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1, 2016, : 427 - 437
  • [7] Empirical Analysis of Android Apps Permissions
    Abu Bakar, Normi Sham Awang
    Mahmud, Iqram
    2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 406 - 411
  • [8] Automatically Granted Permissions in Android apps An Empirical Study on their Prevalence and on the Potential Threats for Privacy
    Calciati, Paolo
    Kuznetsov, Konstantin
    Gorla, Alessandra
    Zeller, Andreas
    2020 IEEE/ACM 17TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2020, : 114 - 124
  • [9] Toward Automatically Generating Privacy Policy for Android Apps
    Yu, Le
    Zhang, Tao
    Luo, Xiapu
    Xue, Lei
    Chang, Henry
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 865 - 880
  • [10] Asking for (and about) Permissions Used by Android Apps
    Stevens, Ryan
    Ganz, Jonathan
    Filkov, Vladimir
    Devanbu, Premkumar
    Chen, Hao
    2013 10TH IEEE WORKING CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR), 2013, : 31 - 40