Mobile Applications: Analyzing Private Data Leakage Using Third Party Connections

被引:0
|
作者
Kumar, Pradeep [1 ]
Singh, Maninder [1 ]
机构
[1] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
来源
2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2015年
关键词
Digital privacy; smartphones; android; third party connections;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In previous few years, an incredible growth is witnessed in the popularity and pervasiveness of smart phones. It has also seen that new mobile applications are built day by day. These applications provide users functionality like social networking applications, games, and many more. Some of the mobile applications might be having a direct purchasing cost or be free but having an ad-support for revenue and in return these applications provide users' private data to ad provider with or without users' consent. Worryingly, some of ad libraries ask for permissions beyond the requirement and additional ones listed in their documentation. Some applications also track users by a network sniffer across ad providers and its applications. It is often ineffective at conveying meaningful, useful information on how a user's privacy might be impacted by using an application. Here in this paper, we have examined the effect on user privacy of some grossing Android applications that transmit private data of user without their permission. Using third party connections that an app makes, we defined the legitimacy of application. Also we observed some other parameter to check whether an app is stealing users' private information.
引用
收藏
页码:57 / 62
页数:6
相关论文
共 50 条
  • [31] Third-Party Trackers in COVID-19 Mobile Applications Can Enable Privacy Leaks
    Serrano, Nicolas
    Betarte, Gustavo
    Campo, Juan Diego
    PROCEEDINGS OF12TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE AND SECURE COMPUTING, LADC 2023, 2023, : 80 - 89
  • [32] A Recommendation-based Matchmaking Scheme for Multiple Mobile Social Networks against Private Data Leakage
    Wang, Yong
    Hou, Jie
    Tan, Yuan-wei
    Nie, Xiao
    FIRST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, 2013, 17 : 781 - 788
  • [33] Risks Of Using Third-Party Data Sources For Health Economics Research
    Lin, John C.
    Greenberg, Paul B.
    HEALTH AFFAIRS, 2023, 42 (11) : 1621 - 1621
  • [34] Evolutionary approach to violating group anonymity using third-party data
    Tavrov, Dan
    Chertov, Oleg
    SPRINGERPLUS, 2016, 5 : 1 - 32
  • [35] Efficient data transmission using trusted third party in smart home environments
    Panda, Niharika
    Supriya, M.
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)
  • [36] USING THIRD PARTY DATA TO UPDATE A REFERENCE DATASET IN A QUALITY EVALUATION SERVICE
    Xavier, E. M. A.
    Ariza-Lopez, F. J.
    Urena-Camara, M. A.
    XXIII ISPRS Congress, Commission IV, 2016, 41 (B4): : 55 - 61
  • [37] Secure, Fair and Efficient Data Trading without Third Party Using Blockchain
    Guan, Zhangshuang
    Shao, Xiaobei
    Wan, Zhiguo
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1395 - 1401
  • [38] Efficient data transmission using trusted third party in smart home environments
    Niharika Panda
    M. Supriya
    EURASIP Journal on Wireless Communications and Networking, 2022
  • [39] Mobile Data Offloading through A Third-Party WiFi Access Point: An Operator's Perspective
    Kang, Xin
    Chia, Yeow-Khiang
    Sun, Sumei
    2013 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2013, : 696 - 701
  • [40] A data security and integrity framework using third-party cloud auditing
    Mishachandar B.
    Vairamuthu S.
    Pavithra M.
    International Journal of Information Technology, 2021, 13 (5) : 2081 - 2089