On privacy risks of Android phones

Smartphone is no longer used for communication but also entertainment, personal or work purposes. In 2013, Android has been top in the market. Android is an open source development that provide free license for development to create and upload application in Google’s Android Market App Store. By pro...

Full description

Saved in:
Bibliographic Details
Main Author: Ng, Xin Yi
Other Authors: Yong Chuen-Tze, Mark
Format: Final Year Project
Language:English
Published: 2014
Subjects:
Online Access:http://hdl.handle.net/10356/58927
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
Description
Summary:Smartphone is no longer used for communication but also entertainment, personal or work purposes. In 2013, Android has been top in the market. Android is an open source development that provide free license for development to create and upload application in Google’s Android Market App Store. By providing a platform for developers to freely develop applications at no cost, it has brought to an attention where security has become a concern in Android. Malware and Phishing are common security threats in computers. Consumers accessing malicious link or application from third-party through smartphone may also face the risk of security threats. However, applications from Google’s Android Market App Store may not be free from security threats too. A set of permissions are required to be accepted before an application can proceed to be installed into the device. Information or data resides in the device can be accessed by permitted applications. Users may face privacy risk by having information not solely for application purpose but to other parties or so. In this project, an implementation is developed to demonstrate the privacy risk that may be faced by users. The implementation is designed to execute information retrieval from background processing and without user’s consent. Mobile data is enabled to access network to store information retrieved into cloud. Meanwhile, GPS is also enabled to capture the current location. Picture taken and video recording are used in this implementation too. Through tests and experiments on various individuals, it is known that the individuals are oblivious to which of their information was transmitted. The information collected can be used to track on individuals. Due to the current nature of Android coding, implementing a counter measure may be difficult to detect the developer’s intention of permission use. In fact, prevention methods are recommended to be taken instead to decrease the probability of facing the privacy risk.