Downloads: 117 | Views: 308
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.4 / 10
Efficient Integrity Protection for Android Smartphone
Pranjali N. Watkar, S. P. Karmore
Abstract: In worldwide, the number of Android users increasing day by day as it is efficient and easy for usage. Android is a mobile operating system which is based on Linux kernel having a user interface based on direct manipulation. The problem is that so many viruses and malwares are detected on Android device during handling of device through Bluetooth and Multimedia message service. Another major issue is there are lack of procedures and requirements for identifying subjects as trusted. The main focus of the study is the prevention of application, whether the application contains malwares or not. User needs to take the permissions before using the applications because applications might contains malwares which are responsible for the damage of application and device integrity. In this paper, we proposed the Efficient Integrity Protection model for Android devices which checks the integrity of the device with the other Android device through the WAMP server which helps to remove the damaged application. All Android devices are protected with the OAuth protocol which provides authorization and protects the device from unauthorized access. We studied different integrity protection models for the smart phones which were implemented first on FreeBSD platform and Linux platform.
Keywords: Android Smartphone, Mobile security, Integrity Protection, NFC, WAMP server, OAuth protocol
Edition: Volume 4 Issue 4, April 2015
Pages: 3331 - 3336
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2003
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 700
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera