International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 117 | Views: 308

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.4 / 10


     

Efficient Integrity Protection for Android Smartphone

Pranjali N. Watkar, S. P. Karmore


Abstract: In worldwide, the number of Android users increasing day by day as it is efficient and easy for usage. Android is a mobile operating system which is based on Linux kernel having a user interface based on direct manipulation. The problem is that so many viruses and malwares are detected on Android device during handling of device through Bluetooth and Multimedia message service. Another major issue is there are lack of procedures and requirements for identifying subjects as trusted. The main focus of the study is the prevention of application, whether the application contains malwares or not. User needs to take the permissions before using the applications because applications might contains malwares which are responsible for the damage of application and device integrity. In this paper, we proposed the Efficient Integrity Protection model for Android devices which checks the integrity of the device with the other Android device through the WAMP server which helps to remove the damaged application. All Android devices are protected with the OAuth protocol which provides authorization and protects the device from unauthorized access. We studied different integrity protection models for the smart phones which were implemented first on FreeBSD platform and Linux platform.


Keywords: Android Smartphone, Mobile security, Integrity Protection, NFC, WAMP server, OAuth protocol


Edition: Volume 4 Issue 4, April 2015


Pages: 3331 - 3336



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Pranjali N. Watkar, S. P. Karmore, "Efficient Integrity Protection for Android Smartphone", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 3331-3336, URL: https://www.ijsr.net/getabstract.php?paperid=SUB153921, DOI: https://www.doi.org/10.21275/SUB153921



Downloads: 656 | Views: 2003

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 719

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 700

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 698

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 688

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top