• Login
  • Register
  • Search

Howdo Smartphones Leak Users’ Privacy?

Haonan Sun

Abstract


This paper examines the major causes of privacy leakage in Android smartphones and discusses potential countermeasures. The findings indicate that privacy breaches primarily occur through permission misuse by third-party applications, malicious links embedded in spam emails and SMS messages, and the inevitable exposure of personal information on social media platforms. Due to the openness and popularity of the Android system, it has become a primary target for attackers, with malicious applications exploiting excessive permissions or engaging in inter-app “collusion” to obtain sensitive data. Users’ weak awareness of privacy protection and the existence of the “privacy paradox” further increase potential risks. Proposed solutions include enhancing visualization of permission usage, employing algorithms to detect malicious applications, strengthening legal supervision, and improving users’ privacy awareness. Overall, smartphone privacy leakage remains a serious issue, and future research should further explore privacy risks in the iOS ecosystem.

Keywords


Privacy Leakage; Permission Authorization; Social Media; Privacy Protection

Full Text:

PDF

Included Database


References


[1] Popal, Nabila. “IDC - Smartphone Market Share - OS.” IDC: The Premier Global Market Intelligence Company, 28 Oct. 2021, www.idc.com/promo/smartphone-market-share.

[2] Elish, K. O., Yao, D., & Ryder, B. G. (2015). On the need of precise inter-app ICC classification for detecting android malware collusions. Paper presented at the Proceedings of IEEE Mobile Security Technologies (MoST), in Conjunction with the IEEE Symposium on Security and Privacy,

[3] Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B., Cox, L. P., . . . Sheth, A. N. (2014).Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2), 1-29.

[4] AG, G. DATA CyberDefense. “Guidebook.” Www.gdatasoftware.com, 11 Feb. 2022, www.gdatasoftware.com/securitylabs/statistics. Accessed 11 Apr. 2022.

[5] Di, M., Nazir, S., & Deng, F. (2021). Influencing user’s behavior concerning android privacy policy: An overview. Mobile Information Systems, 2021, 1-19. doi:10.1155/2021/3452700

[6] Alzaidi, A., Alshehri, S., & Buhari, S. M. (2019). DroidRista: A highly precise static data flow analysis framework for android applications. International Journal of Information Security, 19(5), 523-536. doi:10.1007/s10207-019-00471-w

[7] Cha, Y., & Pak, W. (2018). Protecting contacts against privacy leaks in smartphones. PloS One; PLoS One, 13(7), e0191502. doi:10.1371/journal.pone.0191502

[8] Eze, C., Nurse, J. R. C., & Happa, J. (2016). Using visualizations to enhance users’ understanding of app activities on android devices. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications, 7(1), 39-57.

[9] Furini, M., Mirri, S., Montangero, M., & Prandi, C. (2020). Privacy perception when using smartphone applications.Mobile Networks and Applications, 25(3), 1055-1061. doi:10.1007/s11036-020-01529-z

[10] Bhandari, S., Jaballah, W. B., Jain, V., Laxmi, V., Zemmari, A., Gaur, M. S., Mosbah, M., & Conti, M. (2017). Android inter-app communication threats and detection techniques. Computers & Security, 70, 392-421. doi:10.1016/j.cose.2017.07.002

[11] Yao, J., & Cao, X. (2017). The balancing mechanism of social networking overuse and rational usage. Computers in Human Behavior, 75, 415-422. doi:https://doi.org/10.1016/j.chb.2017.04.055

[12] Nosko, A., Wood, E., & Molema, S. (2010). All about me: Disclosure in online social networking profiles: The case of FACEBOOK. Computers in Human Behavior, 26(3), 406-418. doi:https://doi.org/10.1016/j.chb.2009.11.012

[13] Bal, G., Rannenberg, K., & Hong, J. I. (2015a). Styx: Privacy risk communication for the Android smartphone platform based on apps’ data-access behavior patterns. Computers & Security, 53, 187–202. https://doi.org/10.1016/j.cose.2015.04.004

[14] Gao, W., Liu, Z., Guo, Q., & Li, X. (2018). The dark side of ubiquitous connectivity in smartphone-based SNS: An integrated model from information perspective. Computers in Human Behavior, 84, 185-193. doi:10.1016/j.chb.2018.02.023




DOI: http://dx.doi.org/10.18686/ahe.v9i6.14319

Refbacks