Abstract
People believe that any sufficiently advanced technology is indistinguishable from magic. The ability to analyze and act on data is increasingly gaining importance in this ever-expanding world. Data forms an integral part of the identity of an individual or an organization. However, as data is getting digitized and more information is being shared online via various social media platforms and apps that are specifically designed to cater to the needs of users, data privacy is becoming a matter of extreme concern. Protecting data is of paramount importance because data in the hands of nefarious individuals or organizations can pose a massive threat to both the digital and real worlds alike. Data protection is not just about protecting one’s personal data, it also includes the protection of fundamental rights and freedom of the people associated with it. Every organization is in charge of personal data associated with either the organization itself or to the clients they serve. Protecting the identity of their customers is a very huge task in itself. Illegal extraction of private and personal data by malpractices is taking place every other second and as digitally-enhanced citizens, recognizing the deliberate attempts at data phishing should be our key concern. Personal data can be used to influence and control our decisions and somewhat mould our behaviour and hence, we, as an individual, have a lot at stake when it comes to protecting confidential information. In this paper, we will discuss the various data security issues in Android devices, until the launch of Android Nougat 7.0, and how data extraction without prior information is a threat to the security, integrity, and confidentiality of the users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: a comprehensive security assessment. IEEE Secur. Priv. 2, 35–44 (2010)
Gibler, C., et al.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: International Conference on Trust and Trustworthy Computing. Springer, Heidelberg (2012)
Vidas, T., Zhang, C., Christin, N.: Toward a general collection methodology for Android devices. Digit. Invest. 8, S14–S24 (2011)
Davies, H.: Ted Cruz campaign using firm that harvested data on millions of unwitting Facebook users. The Guardian, 11 December 2015. Archived from the original on 16 February 2016
http://www.techgide.com/truecaller-works-truecaller-app-works-truecaller-get-data/
https://www.ethow.com/2015/10/how-Truecaller-works-is-what-you-might-not-like.html
Funding
The study was funded by Kalinga Institute of Industrial Technology, Bhubaneswar, Odisha.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Ethics declarations
The authors declare that they have no conflict of interest.
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Dutta, D., Agarwal, S., Dash, R., Sahoo, B. (2020). A Detailed Analysis of Data Security Issues in Android Devices. In: Hemanth, D., Shakya, S., Baig, Z. (eds) Intelligent Data Communication Technologies and Internet of Things. ICICI 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 38. Springer, Cham. https://doi.org/10.1007/978-3-030-34080-3_46
Download citation
DOI: https://doi.org/10.1007/978-3-030-34080-3_46
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-34079-7
Online ISBN: 978-3-030-34080-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)