Mobile Applications: Analyzing Private Data Leakage Using Third Party Connections

被引:0
|
作者
Kumar, Pradeep [1 ]
Singh, Maninder [1 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
关键词
Digital privacy; smartphones; android; third party connections;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In previous few years, an incredible growth is witnessed in the popularity and pervasiveness of smart phones. It has also seen that new mobile applications are built day by day. These applications provide users functionality like social networking applications, games, and many more. Some of the mobile applications might be having a direct purchasing cost or be free but having an ad-support for revenue and in return these applications provide users' private data to ad provider with or without users' consent. Worryingly, some of ad libraries ask for permissions beyond the requirement and additional ones listed in their documentation. Some applications also track users by a network sniffer across ad providers and its applications. It is often ineffective at conveying meaningful, useful information on how a user's privacy might be impacted by using an application. Here in this paper, we have examined the effect on user privacy of some grossing Android applications that transmit private data of user without their permission. Using third party connections that an app makes, we defined the legitimacy of application. Also we observed some other parameter to check whether an app is stealing users' private information.
引用
收藏
页码:57 / 62
页数:6
相关论文
共 50 条
  • [1] Leakage of Sensitive Information to Third-Party Voice Applications
    Bispham, Mary
    Zard, Clara
    Sattar, Suliman
    Ferrer-Aran, Xavier
    Suarez-Tangil, Guillermo
    Such, Jose
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON CONVERSATIONAL USER INTERFACES, CUI 2022, 2022,
  • [2] AppMonitor: restricting information leakage to third-party applications
    Nemi Chandra Rathore
    Somanath Tripathy
    Social Network Analysis and Mining, 2020, 10
  • [3] AppMonitor: restricting information leakage to third-party applications
    Rathore, Nemi Chandra
    Tripathy, Somanath
    SOCIAL NETWORK ANALYSIS AND MINING, 2020, 10 (01)
  • [4] Big data quantum private comparison with the intelligent third party
    Xiaoqing Tan
    Xiaoqian Zhang
    Jin Li
    Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 797 - 806
  • [5] Big data quantum private comparison with the intelligent third party
    Tan, Xiaoqing
    Zhang, Xiaoqian
    Li, Jin
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2015, 6 (06) : 797 - 806
  • [6] Techniques to detect data leakage in mobile applications
    Rocha T.
    Souto E.
    El-Khatib K.
    International Journal of Security and Networks, 2019, 14 (03) : 146 - 157
  • [7] Measuring and Analyzing Third-Party Mobile Game App Stores in China
    Wang, Tingting
    Wu, Di
    Zhang, Jiaming
    Chen, Min
    Zhou, Yipeng
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2016, 13 (04): : 793 - 805
  • [8] Local Personal Data Processing with Third Party Code and Bounded Leakage
    Carpentier, Robin
    Popa, Iulian Sandu
    Anciaux, Nicolas
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, TECHNOLOGY AND APPLICATIONS (DATA), 2022, : 520 - 527
  • [9] Analyzing third-party data leaks on online pharmacy websites
    Sampsa Rauti
    Robin Carlsson
    Sini Mickelsson
    Tuomas Mäkilä
    Timi Heino
    Elina Pirjatanniemi
    Ville Leppänen
    Health and Technology, 2024, 14 : 375 - 392
  • [10] Analyzing third-party data leaks on online pharmacy websites
    Rauti, Sampsa
    Carlsson, Robin
    Mickelsson, Sini
    Makila, Tuomas
    Heino, Timi
    Pirjatanniemi, Elina
    Leppanen, Ville
    HEALTH AND TECHNOLOGY, 2024, 14 (02) : 375 - 392