Abstract
Android is offering millions of apps on Google Play-store by the application publishers. However, those publishers do have a parent organization and share information with them. Through the ‘Android permission system’, a user permits an app to access sensitive personal data. Large-scale personal data integration can reveal user identity, enabling new insights and earn revenue for the organizations. Similarly, aggregation of Android app permissions by the app owning parent organizations can also cause privacy leakage by revealing the user profile. This work classifies risky personal data by proposing a threat model on the large-scale app permission aggregation by the app publishers and associated owners. A Google-play application programming interface (API) assisted web app is developed that visualizes all the permissions an app owner can collectively gather through multiple apps released via several publishers. The work empirically validates the performance of the risk model with two case studies. The top two Korean app owners, seven publishers, 108 apps and 720 sets of permissions are studied. With reasonable accuracy, the study finds the contact number, biometric ID, address, social graph, human behavior, email, location and unique ID as frequently exposed data. Finally, the work concludes that the real-time tracking of aggregated permissions can limit the odds of user profiling.
Funder
Institute for Information and Communications Technology Promotion
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference97 articles.
1. Influence of privacy priming and security framing on mobile app selection
2. Blockchain in the Era of Industry 4.0;Onik,2018
3. Recent Advances and Challenges in Mobile Big Data
4. Revealed: 50 Million Facebook Profiles Harvested for Cambridge Analytica in Major Data Breach
https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election
5. Marriott Breach
https://www.forbes.com/sites/davidvolodzko/2018/12/04/marriott-breach-exposes-far-more-than-just-data/#19e9b70f6297
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Risky model of mobile application presentation;Journal of Computer Virology and Hacking Techniques;2023-01-14
2. Method for determining the connectivity of mobile application developers;III INTERNATIONAL SCIENTIFIC FORUM ON COMPUTER AND ENERGY SCIENCES (WFCES 2022);2023
3. Model for detecting anomalous behavior of mobile apps;III INTERNATIONAL SCIENTIFIC FORUM ON COMPUTER AND ENERGY SCIENCES (WFCES 2022);2023
4. Towards Privacy for Android Mobile Applications;2022 International Conference on Futuristic Technologies (INCOFT);2022-11-25
5. Predicting age and gender from network telemetry: Implications for privacy and impact on policy;PLOS ONE;2022-07-21