{"title":"移动android设备的数据安全评估","authors":"I. Khokhlov, L. Reznik","doi":"10.23919/FRUCT.2017.8071306","DOIUrl":null,"url":null,"abstract":"Vast spreading of Android-based devices with embedded diverse sensors make them popular platforms for data collection in various research domains. However, Android OS complexity and vulnerabilities may facilitate sensor data manipulation and falsification that will have a high impact on data security and quality. This paper presents a data security and quality evaluation method based on a possibility assessment of malicious actions that exploit certain Android OS features and vulnerabilities as well as applications installed. It describes the Android OS architecture features related to security and major security mechanisms. The paper shows metrics chosen for data security evaluation and the developed method of their integration that computes Overall Security Evaluation Score representing sensor originated data trustworthiness level. The examples of Overall Security Evaluation Score calculation are presented and analyzed.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Data security evaluation for mobile android devices\",\"authors\":\"I. Khokhlov, L. Reznik\",\"doi\":\"10.23919/FRUCT.2017.8071306\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Vast spreading of Android-based devices with embedded diverse sensors make them popular platforms for data collection in various research domains. However, Android OS complexity and vulnerabilities may facilitate sensor data manipulation and falsification that will have a high impact on data security and quality. This paper presents a data security and quality evaluation method based on a possibility assessment of malicious actions that exploit certain Android OS features and vulnerabilities as well as applications installed. It describes the Android OS architecture features related to security and major security mechanisms. The paper shows metrics chosen for data security evaluation and the developed method of their integration that computes Overall Security Evaluation Score representing sensor originated data trustworthiness level. The examples of Overall Security Evaluation Score calculation are presented and analyzed.\",\"PeriodicalId\":114353,\"journal\":{\"name\":\"2017 20th Conference of Open Innovations Association (FRUCT)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 20th Conference of Open Innovations Association (FRUCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/FRUCT.2017.8071306\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 20th Conference of Open Innovations Association (FRUCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/FRUCT.2017.8071306","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Data security evaluation for mobile android devices
Vast spreading of Android-based devices with embedded diverse sensors make them popular platforms for data collection in various research domains. However, Android OS complexity and vulnerabilities may facilitate sensor data manipulation and falsification that will have a high impact on data security and quality. This paper presents a data security and quality evaluation method based on a possibility assessment of malicious actions that exploit certain Android OS features and vulnerabilities as well as applications installed. It describes the Android OS architecture features related to security and major security mechanisms. The paper shows metrics chosen for data security evaluation and the developed method of their integration that computes Overall Security Evaluation Score representing sensor originated data trustworthiness level. The examples of Overall Security Evaluation Score calculation are presented and analyzed.