Smartphone: Security and Privacy Protection

  • Xiu-Ting Li
  • Shuo Ren
  • Wei Cheng
  • Lai-Sheng Xiang
  • Xi-Yu Liu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8351)


Current smartphone operating systems are capable of running applications written by third party developers. And this capability has raised concerns about the threat that smartphones pose to the public privacy and security. Recently, it is widespread for the malwares to collect sensitive information owned by third-party applications as well as to escalate its privilege to the system level. Hence the smartphone OS has been developed with a greater emphasis on security and privacy protection. In this paper, under the condition that the rapid development usage of Android platform, we purpose to introduce the permission mechanism, which requires developers to declare what sensitive resources their applications would use, has users agree with this request when they install the application and constrains the application to the requested resources during runtime. In the end we give some tips for users to protect sensitive information and user privacy.


smartphone security privacy protection android 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Cooper, D.: Canalys: More smartphones than PCs shipped in 2011 (2012),
  2. 2.
    Lin, J.: Expects smartphone sales will reach twice as PC sales (2012),
  3. 3.
    Third annual Mobile threats report. Juniper networks Mobile threat Center (2013) Google Scholar
  4. 4.
    Schönberger, V.M., Cukier, K.: Big Data: A Revolution That Will Transform How We Live Work and Think. John Murray Publishers Ltd (2013)Google Scholar
  5. 5.
    Constine, J.: Mary Meeker Gives Mid-Year Internet Trends Report: Android Adoption Ramping Up 6X Faster Than iPhone (2012),
  6. 6.
    Over 1 billion android-based smart phones to ship in 2017. Canalys (June 4, 2013)Google Scholar
  7. 7.
    Sun, Y.: Gartner: 2013 years Personal computers tablet phone sales will reach 2.4 billion overall (2013),
  8. 8.
  9. 9.
  10. 10.
    Elgin, B.: Google Buys Android for Its Mobile Arsenal. Bloomberg Businessweek. Bloomberg. Archived from the original on February 24, 2011 (retrieved February 20, 2012)Google Scholar
  11. 11.
    Industry Leaders Announce Open Platform for Mobile Devices (Press release). Open Handset Alliance (November 5, 2007),
  12. 12.
    Park, Y., Lee, C., Kim, J., Cho, S.-J., Choi, J.: An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks. Journal of Internet Services and Information Security (JISIS) 2(3/4), 29–42Google Scholar
  13. 13.
    Felt, A.-P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android Permissions: User Attention, Comprehension, and Behavior. In: 2012 Symposium on Usable Privacy and Security (SOUPS), Washington, DC, USA, July 11-13 (2012)Google Scholar
  14. 14.
    Kuzuno, H., Tonami, S.: Signature Generation for Sensitive Information Leakage in Android Applications. arXiv:1305.4045v1 [cs.CR] (May 17, 2013)Google Scholar
  15. 15.
    Zhou, Y., Jiang, X.: Dissecting android malware: Characterization and evolution. In: Proc. of the 33rd IEEE Symposium on the Security and Privacy (SP 2012), San Francisco, California, USA, pp. 95–109. IEEE (May 2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Xiu-Ting Li
    • 1
  • Shuo Ren
    • 1
  • Wei Cheng
    • 3
  • Lai-Sheng Xiang
    • 2
  • Xi-Yu Liu
    • 2
  1. 1.College of Management Science and EngineeringShandong Normal UniversityJinan, ShandongChina
  2. 2.College of Management Science and EngineeringShandong Normal UniversityJinanChina
  3. 3.Shandong Shanda Oumasoft Company LimitedJianChina

Personalised recommendations