South African Android Applications, Their Security Permissions and Compliance With the Protection of Personal Information Act

被引:0
|
作者
White, Quintin [1 ]
van Staden, Wynand [2 ]
机构
[1] Univ South Africa, Florida, South Africa
[2] Univ South Africa, Sch Comp, Florida, South Africa
关键词
android; security permissions; least privilege; protection of personal information act;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
South Africa's promulgated privacy law the Protection of Personal Information Act No. 4 of 2013 (POPIA) - demands careful consideration from every entity that processes personal identifiable information (PII). Though the law is not yet in effect, compliance is a big concern, and there is a much uncertainty surrounding the effort that will be required to be compliant. The security principle of least privilege plays a significant role in privacy and privacy protection, and consequently features in much privacy legislation. A particular area of concern is the Android software market in which application developers are (for the most part) unregulated. The uncertainties around compliance, and the ease of entry to the Android software market exposes the unwary application developer to the (eventual, but unavoidable) force of POPIA. Moreover, the access control model in Android allows applications access to personal information stored on user devices (once they are installed with consent). This paper reports on an investigation into Android security permissions and the alignment of these permissions with POPIA. Twenty-one Android applications - designed and released for the South African market were reviewed, and for each, the requested access were examined, and how this compares to the required permissions according to the application's end -user agreement. Compliance of the applications was assessed in accordance with chapter three of POPIA (which defines eight conditions for the lawful processing of personal information); however, the investigation was limited to what was observable without needing access to intellectual property. Findings indicate that, for the application versions investigated many are not fully compliant with POPIA, and that the granularity of permissions in Android may cause significant problems for South African applications. This also indicates that free-lance developers may incur significant risk in developing and releasing software if care isn't taken with the permission model. Moreover, it indicates that training and awareness of POPIA especially for software developers should receive more attention.
引用
收藏
页码:492 / 501
页数:10
相关论文
共 50 条
  • [1] Quantitative Security Risk Assessment of Android Permissions and Applications
    Wang, Yang
    Zheng, Jun
    Sun, Chen
    Mukkamala, Srinivas
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 226 - 241
  • [2] Personal Information Classification on Aggregated Android Application's Permissions
    Onik, Md Mehedi Hassan
    Kim, Chul-Soo
    Lee, Nam-Yong
    Yang, Jinhong
    [J]. APPLIED SCIENCES-BASEL, 2019, 9 (19):
  • [3] A High-Level Comparison Between the South African Protection of Personal Information Act and International Data Protection Laws
    Botha, Johnny
    Grobler, M. M.
    Hahn, Jade
    Eloff, Mariki
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 57 - 66
  • [4] Assisting Developers in Preventing Permissions Related Security Issues in Android Applications
    Tebib, Mohammed El Amin
    Andre, Pascal
    Aktouf, Oum-El-Kheir
    Graa, Mariem
    [J]. DEPENDABLE COMPUTING, EDCC 2021 WORKSHOPS, 2021, 1462 : 132 - 143
  • [5] Protection of Personal Information Act 2013 and data protection for health research in South Africa
    Staunton, Ciara
    Adams, Rachel
    Anderson, Dominique
    Croxton, Talishiea
    Kamuya, Dorcas
    Munene, Marianne
    Swanepoel, Carmen
    [J]. INTERNATIONAL DATA PRIVACY LAW, 2020, 10 (02) : 160 - 179
  • [6] Security Evaluation System for Android Applications Using User's Reviews and Permissions
    Okazaki, Naonobu
    Kita, Yoshihiro
    Aburada, Kentaro
    Park, Mirang
    [J]. JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE, 2015, 2 (03): : 190 - 193
  • [7] Regulatory Framework for Information Security in Taiwan's New Personal Information Protection Act of 2012
    Liao, Wei-min
    [J]. INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 858 - 865
  • [8] Evaluation of Online Resources on the Implementation of the Protection of Personal Information Act in South Africa
    Botha, Johnny
    Eloff, M. M.
    Swart, Ignus
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 39 - 48
  • [9] The protection of personal data and the security of information
    Ribagorda Garnacho, Arturo
    [J]. REVISTA JURIDICA DE CASTILLA Y LEON, 2008, (16): : 373 - 399
  • [10] Information security and protection of personal data
    Siskin, Dilan Serife
    [J]. TURKISH LIBRARIANSHIP, 2018, 32 (04) : 342 - 345