Skip to main content

A Detailed Analysis of Data Security Issues in Android Devices

  • Conference paper
  • First Online:
Intelligent Data Communication Technologies and Internet of Things (ICICI 2019)

Abstract

People believe that any sufficiently advanced technology is indistinguishable from magic. The ability to analyze and act on data is increasingly gaining importance in this ever-expanding world. Data forms an integral part of the identity of an individual or an organization. However, as data is getting digitized and more information is being shared online via various social media platforms and apps that are specifically designed to cater to the needs of users, data privacy is becoming a matter of extreme concern. Protecting data is of paramount importance because data in the hands of nefarious individuals or organizations can pose a massive threat to both the digital and real worlds alike. Data protection is not just about protecting one’s personal data, it also includes the protection of fundamental rights and freedom of the people associated with it. Every organization is in charge of personal data associated with either the organization itself or to the clients they serve. Protecting the identity of their customers is a very huge task in itself. Illegal extraction of private and personal data by malpractices is taking place every other second and as digitally-enhanced citizens, recognizing the deliberate attempts at data phishing should be our key concern. Personal data can be used to influence and control our decisions and somewhat mould our behaviour and hence, we, as an individual, have a lot at stake when it comes to protecting confidential information. In this paper, we will discuss the various data security issues in Android devices, until the launch of Android Nougat 7.0, and how data extraction without prior information is a threat to the security, integrity, and confidentiality of the users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: a comprehensive security assessment. IEEE Secur. Priv. 2, 35–44 (2010)

    Article  Google Scholar 

  2. Gibler, C., et al.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: International Conference on Trust and Trustworthy Computing. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  3. Vidas, T., Zhang, C., Christin, N.: Toward a general collection methodology for Android devices. Digit. Invest. 8, S14–S24 (2011)

    Article  Google Scholar 

  4. Davies, H.: Ted Cruz campaign using firm that harvested data on millions of unwitting Facebook users. The Guardian, 11 December 2015. Archived from the original on 16 February 2016

    Google Scholar 

  5. http://www.techgide.com/truecaller-works-truecaller-app-works-truecaller-get-data/

  6. https://www.ethow.com/2015/10/how-Truecaller-works-is-what-you-might-not-like.html

  7. https://www.webopedia.com/TERM/K/keylogger.html

  8. https://www.apkdecompilers.com/

  9. https://www.greenbot.com/article/2954979/google-apps/what-you-need-to-know-about-your-location-history-timeline.html

Download references

Funding

The study was funded by Kalinga Institute of Industrial Technology, Bhubaneswar, Odisha.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhaswati Sahoo .

Editor information

Editors and Affiliations

Ethics declarations

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dutta, D., Agarwal, S., Dash, R., Sahoo, B. (2020). A Detailed Analysis of Data Security Issues in Android Devices. In: Hemanth, D., Shakya, S., Baig, Z. (eds) Intelligent Data Communication Technologies and Internet of Things. ICICI 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 38. Springer, Cham. https://doi.org/10.1007/978-3-030-34080-3_46

Download citation

Publish with us

Policies and ethics