Confidentiality and Privacy Information Security Risk Assessment for Android-Based Mobile Devices

被引:0
|
作者
Irwan [1 ]
Asnar, Yudistira [1 ]
Hendradjaya, Bayu [1 ]
机构
[1] Inst Teknol Bandung, Sch Elect Engn & Informat, Bandung, Indonesia
关键词
Risk Assessment; Smartphones; Android; Sensitive Data; Security;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Increasing use of smartphones for work and private purposes have mingled both the valuable personal data to work data unintentionally. Android permission-based security model are used to restrict the ability of applications to access device resources, but it failed to provide an adequate control for users and a visibility of how third party applications using personal data of users. The permission warnings when installing applications do not help most users in taking right security decisions. This research aims at developing a risk assessment method to determine security posture, at Android smartphone The method can help users to increase the security level of a device, especially against sensitive data leakage. The design of risk assessment uses two approaches, security configuration level assessment and sensitive data risk assessment. Security configuration level assessment is based on built-in Android smartphone configurations, while sensitive data risk assessment is based on combination of permissions from all applications installed on the device. Design of risk assessment implemented on Android smartphone called Smartphone Risk Assessment (SRA). The evaluation has been done by a usability testing using the System Usability Scale (SUS) questionnaire. The result shows that the SRA is rated as "Good" by respondents based on SUS score. The SRA is considered to be helpful by users to determine potential threats of their smartphones and any applications that has potential to leak sensitive data.
引用
收藏
页码:60 / +
页数:6
相关论文
共 50 条
  • [1] Security Assessment of Android-Based Mobile Terminals
    Hu, Zhiyuan
    Shi, Linghang
    Chen, Huijun
    Li, Chao
    Lu, Jinghui
    [J]. 2022 25TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS (WPMC), 2022,
  • [2] PhoneProtector: Protecting User Privacy on the Android-Based Mobile Platform
    Zhang, Weizhe
    He, Hui
    Zhang, Qizhen
    Kim, Tai-hoon
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
  • [3] AndroBench: Benchmarking the Storage Performance of Android-Based Mobile Devices
    Kim, Je-Min
    Kim, Jin-Soo
    [J]. FRONTIERS IN COMPUTER EDUCATION, 2012, 133 : 667 - 674
  • [4] Obstacle detection using stereovision for Android-based mobile devices
    Petrovai, Andra
    Costea, Arthur
    Oniga, Florin
    Nedevschi, Sergiu
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2014, : 141 - 147
  • [5] Remote Video Verification and Video Surveillance on Android-Based Mobile Devices
    Buk, Bartlomiej
    Mrozek, Dariusz
    Malysiak-Mrozek, Bozena
    [J]. MAN-MACHINE INTERACTIONS 3, 2014, 242 : 547 - 557
  • [6] Emotion Recognition in Intelligent Tutoring Systems for Android-Based Mobile Devices
    Zatarain Cabada, Ramon
    Lucia Barron-Estrada, Maria
    Alor-Hernandez, Giner
    Alberto Reyes-Garcia, Carlos
    [J]. HUMAN-INSPIRED COMPUTING AND ITS APPLICATIONS, PT I, 2014, 8856 : 494 - 504
  • [7] Privacy, confidentiality, and security of healthcare information
    Dickerson, Jonathan E.
    [J]. ANAESTHESIA AND INTENSIVE CARE MEDICINE, 2022, 23 (11): : 740 - 743
  • [8] Design and Implementation of Privacy Impact Assessment for Android Mobile Devices
    CHEN Kuan-Lin
    YANG Chung-Huang
    [J]. ZTE Communications, 2016, 14 (S1) : 37 - 43
  • [9] Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov
    Zhang, Tao
    Zhao, Kun
    Yang, Ming
    Gao, Tilei
    Xie, Wanyu
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
  • [10] Android-Based Mobile Game Development
    Jiang, Wenrong
    Chen, Jian
    [J]. INFORMATION AND BUSINESS INTELLIGENCE, PT I, 2012, 267 : 66 - 70