PhD TIM- Search And Review Literature Related To Mobile Computing

PhD TIM- Search And Review Literature Related To Mobile Computing

PhD TIM- Search And Review Literature Related To Mobile Computing

See Attached PDF

As with most areas of computing, security in mobile computing is a paramount concern. This includes securing the user’s information on the mobile device, encrypting the information during the transmission of the data to the server, and securely storing this information on the backend server. Security vulnerabilities in mobile computing may not only affect a user’s perception of an app, but may also leave an organization open to legal and ethical dilemmas.

One manner in which mobile apps provide security and privacy to a user is through their use of permissions. On both Android and iOS devices, permissions protect an app from accessing sensitive information or functionality—such as reading SMS messages, accessing a user’s contacts, or placing phone calls. App permissions have received a significant level of research in recent years from a variety of perspectives, including user comprehension of permissions and using permissions to properly protect against malicious software.

An older, but still very popular, work available in the NCU ACM Library is titled “Android Permissions Demystified.” Please read this work, included in this week’s Books and Resources, to understand some of the primary challenges related to mobile permissions and security. Your task for this week is to use the NCU Library and find a recent (published within the past two years) work that discusses any area of mobile permissions, including user perception/compression, malware protection, updated permission models, or best practices. In your analysis of this work, you should include the following:

  • What is the significance of the problem this work is attempting to address?
  • What is the process this work uses to address the issue?
  • What are some improvements/future work you would propose?
  • What are some challenges to making these improvements?
  • What are some related works to this topic, and how do they differ from the analyzed work?

Length: 5-7 pages not including title page and references

Your assignment should demonstrate thoughtful consideration of the ideas and concepts presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards

2011Androidpermissionsdemystified

 

 

Solution Preview

Notably, Android devices provide third-party applications with extensive API (Application Programming Interface) which includes access to mobile settings, hardware, and user data. The purpose of the permission if to protect the privacy and security of the Android user. As such, android applications should request permission to access sensitive user information (such as the messages and contact information) and certain system features (such as the internet and the camera) (Felt et al. 2011). Depending on the system, the permission granted to the third party applications might be automatically synced with the device or prompt the user to approve the permission (Felt et al. 2011). The article provides an overview of how access to private user data is protected, the relevant parts of the API controlled with the install-time application system, how the android permissions work, and how the permissions are presented to the user (Felt et al. 2011).

(1,513 words)

Open chat
Hello
Contact us here via WhatsApp