Android权限系统和用户隐私-概念和方法的回顾

A. Khatoon, P. Corcoran
{"title":"Android权限系统和用户隐私-概念和方法的回顾","authors":"A. Khatoon, P. Corcoran","doi":"10.1109/ICCE-Berlin.2017.8210616","DOIUrl":null,"url":null,"abstract":"Use of smartphones in our everyday life has become widely popular. A large proportion of smartphones use Android OS, which supports third party software development, so there is increasing number of developers developing applications for the android platform. But this means there are significant privacy risks associated with the use of android based smartphone applications. In this paper the process through which different apps gain access to sensitive device permissions when installed on an android devices is studied. More specifically we emphasize the difficulty for the user to understand how different device permissions can affect its privacy. The context and use-case for each permission affects its impact and when multiple permissions are granted determining the potential impact on the privacy of users becomes a much more complex problem. In this work we quantify the potential impact of the most important individual permissions and take some first steps towards an evaluation of privacy impact of multiple device permissions. It is also noted that many ‘free’ apps tend to request unnecessary or redundant permissions, often with the aim to gather valuable user data. This is discussed and some strategies to discourage such permission requesting are outlined. Some ideas for further development of this research are provided in the concluding discussion.","PeriodicalId":355536,"journal":{"name":"2017 IEEE 7th International Conference on Consumer Electronics - Berlin (ICCE-Berlin)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Android permission system and user privacy — A review of concept and approaches\",\"authors\":\"A. Khatoon, P. Corcoran\",\"doi\":\"10.1109/ICCE-Berlin.2017.8210616\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Use of smartphones in our everyday life has become widely popular. A large proportion of smartphones use Android OS, which supports third party software development, so there is increasing number of developers developing applications for the android platform. But this means there are significant privacy risks associated with the use of android based smartphone applications. In this paper the process through which different apps gain access to sensitive device permissions when installed on an android devices is studied. More specifically we emphasize the difficulty for the user to understand how different device permissions can affect its privacy. The context and use-case for each permission affects its impact and when multiple permissions are granted determining the potential impact on the privacy of users becomes a much more complex problem. In this work we quantify the potential impact of the most important individual permissions and take some first steps towards an evaluation of privacy impact of multiple device permissions. It is also noted that many ‘free’ apps tend to request unnecessary or redundant permissions, often with the aim to gather valuable user data. This is discussed and some strategies to discourage such permission requesting are outlined. Some ideas for further development of this research are provided in the concluding discussion.\",\"PeriodicalId\":355536,\"journal\":{\"name\":\"2017 IEEE 7th International Conference on Consumer Electronics - Berlin (ICCE-Berlin)\",\"volume\":\"153 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE 7th International Conference on Consumer Electronics - Berlin (ICCE-Berlin)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCE-Berlin.2017.8210616\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 7th International Conference on Consumer Electronics - Berlin (ICCE-Berlin)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCE-Berlin.2017.8210616","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

在我们的日常生活中使用智能手机已经变得广泛流行。很大一部分智能手机使用Android操作系统,该系统支持第三方软件开发,因此越来越多的开发者为Android平台开发应用程序。但这意味着使用基于android的智能手机应用程序存在重大的隐私风险。本文研究了安装在android设备上的不同应用获取敏感设备权限的过程。更具体地说,我们强调用户理解不同设备权限如何影响其隐私的难度。每个权限的上下文和用例会影响其影响,当授予多个权限时,确定对用户隐私的潜在影响就变成了一个复杂得多的问题。在这项工作中,我们量化了最重要的个人权限的潜在影响,并采取了一些初步步骤,以评估多个设备权限对隐私的影响。还有人指出,许多“免费”应用往往会请求不必要或冗余的权限,目的往往是收集有价值的用户数据。本文讨论了这一点,并概述了阻止此类许可请求的一些策略。最后,对本研究的进一步发展提出了一些设想。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Android permission system and user privacy — A review of concept and approaches
Use of smartphones in our everyday life has become widely popular. A large proportion of smartphones use Android OS, which supports third party software development, so there is increasing number of developers developing applications for the android platform. But this means there are significant privacy risks associated with the use of android based smartphone applications. In this paper the process through which different apps gain access to sensitive device permissions when installed on an android devices is studied. More specifically we emphasize the difficulty for the user to understand how different device permissions can affect its privacy. The context and use-case for each permission affects its impact and when multiple permissions are granted determining the potential impact on the privacy of users becomes a much more complex problem. In this work we quantify the potential impact of the most important individual permissions and take some first steps towards an evaluation of privacy impact of multiple device permissions. It is also noted that many ‘free’ apps tend to request unnecessary or redundant permissions, often with the aim to gather valuable user data. This is discussed and some strategies to discourage such permission requesting are outlined. Some ideas for further development of this research are provided in the concluding discussion.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信