Skip to main content

Determining Trustworthiness and Quality of Mobile Applications

  • Conference paper
Mobile Wireless Middleware, Operating Systems, and Applications (MOBILWARE 2012)

Abstract

The growth of “smart” mobile devices, such as smartphones and tablets, has been exponential over the past few years. Such growth was mainly attributed to the development of mobile applications. To date, mobile applications have been increasingly used to improve our productivity and also to provide the entertainment contents. However, with a huge number of mobile applications that appear in the application stores; in particular those that provide similar functionalities, users are often confused with the selection of trustworthy and high quality mobile applications. At the current state, there is a limited research embarked to provide solutions for measuring the trustworthiness of mobile applications prior to download. Thus, the aims of this paper are to review the current research in this area and to discuss several issues in measuring the trustworthiness of mobile applications. In addition, this paper also proposes MobilTrust, a similarity trust measurement method to solve the identified issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. International Telecommunication Union (ITU), ITU estimates two billion people online by end 2010, Access to mobile networks available to over 90% of world population 143 countries offer 3G services, Press Release Report (2010), viewed at http://www.itu.int/net/pressoffice/press_releases/2010/39.aspx

  2. PRB, 2010 World Popilation Data Sheet (2010), http://www.prb.org/publications/datasheets/2010/2010wpds.aspx

  3. IDC Research, Worldwide Smartphone 2012-2016 Forecast and Analysis, Research report (2012), http://marketresearch.com .

  4. Apple, Apple Application Store (2012), http://itunes.apple.com/us/genre/ios/id36?mt=8

  5. Google Play, Android Google Play (2012), https://play.google.com/store?hl=en

  6. BusinessInsider, Number of Apps Available at Smartphones’ Apps Stores (2011), viewed at http://articles.businessinsider.com/2011-03-09/tech/30011803_1_app-store-google-s-android-market-twitter

  7. Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications [IEEE Communications Surveys and Tutorials, Fourth Quarter] (2000), http://www.comsoc.org/pubs/surveys/

  8. Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provisioning. Decision Support System 43, 618–644 (2007)

    Article  Google Scholar 

  9. Osborne, C.: IOS Apps: Massive invasion of user privacy, ZDNet news (2012), http://www.zdnet.com/blog/igeneration/ios-apps-massive-invasion-of-user-privacy/15138

  10. Lowenshon, J.: Congress probing iOS developers on user privacy, address books, CNet news (2012), http://news.cnet.com/8301-27076_3-57402957-248/congress-probing-ios-developers-on-user-privacy-address-books/

  11. Enck, W., Gilbert, P., Chun, B.-G.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones (2010)

    Google Scholar 

  12. Smith, E.: iPhone applications & privacy issues: An analysis of application transmission of iPhone unique device identifiers (UDIDs), http://www.kompatscher.biz/phocadownload/iPhone-Applications-Privacy-Issues.pdf

  13. Ferro, G.: BYOD Policies vs. the Realities of Corporate IT, NetworkComputing.com, http://www.networkcomputing.com/wireless/240000916

  14. CoreGrid, D.IA.03 Survey Material on Trust and Security, European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies, Technical Paper (2004)

    Google Scholar 

  15. Rasmusson, L., Janssen, S.: Simulated Social Control for Secure Internet Commerce. In: Proceedings of the 1996 New Security Paradigms Workshop, Lake Arrowhead, CA, USA (1996)

    Google Scholar 

  16. University of Pennsylvania, TM/RM Simulator (March 2012), http://rtg.cis.upenn.edu/qtm/p2psim.php3

  17. Benats, G., Bandara, A., Yu, Y., Colin, J., Nuseibeh, B.: PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. Presented at 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy (2011)

    Google Scholar 

  18. Dellarocas, C.: Immunizing Online Reputation Reporting Systems against Unfair Ratings and Discriminatory Behavior. In: The Proceedings of Second ACM Conf. Electronic Commerce (2000)

    Google Scholar 

  19. Cydia Market, http://cydia.saurik.com/

  20. Kerschbaum, F., Haller, J., Karabulut, Y., Robinson, P.: PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 193–205. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  21. Ion, M., Danzi, A., Koshutanski, H., Telesca, L.: A Peer-to-Peer Multidimensional Trust Model for Digital Ecosystems. Presented at the Second IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2008), Phitsanulok, Thailand (2008)

    Google Scholar 

  22. Schmidt, S., Steele, R., Dillon, T.: DEco Arch: Trust and Reputation Aware Service Brokering Architecture in Digital Ecosystems. Presented at the Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST), Cairns, Australia (2007)

    Google Scholar 

  23. Singh, A., Liu, L.: TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. Presented at the Third International Conference on Peer-to-Peer Computing, Sweden (2003)

    Google Scholar 

  24. Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16, 843–857 (2004)

    Article  Google Scholar 

  25. Damiani, E., Vimercati, S.: Managing and Sharing Servents’ Reputations in P2P Systems. IEEE Transactions on Knowledge and Data Engineering 15, 840–854 (2003)

    Article  Google Scholar 

  26. Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. Presented at the 12th ACM International Conference on World Wide Web, USA (2003)

    Google Scholar 

  27. Jøsang, A., Hayward, R., Pope, S.: Trust Network Analysis with Subjective Logic. In: Proceedings of the 29th Australasian Computer Science Conference (2006)

    Google Scholar 

  28. Sabater, J., Sierra, C.: REGRET: A reputation model for gregarious societies. In: Proceedings of the Fifth International Conference on Autonomous Agents, Montreal, Canada (2001)

    Google Scholar 

  29. Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Travos: Trust and reputation in the context of inaccurate information sources. Journal of Autonomous Agents and Multi-Agent Systems 12 (2006)

    Google Scholar 

  30. Josang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Electronic Commerce Conference (2002)

    Google Scholar 

  31. Entrust: The concept of trust in network security, Version 1.2 [White Paper] (2000, April 2011), http://www.entrust.com/resources/pdf/trust.pdf

  32. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems (2005) (to appear)

    Google Scholar 

  33. Apple, What’s an Apple ID?, https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa/

  34. Google, Google Accounts, http://www.google.com/intl/en/landing/accounts/index.html#utm_campaign=en&utm_medium=et&utm_source=gaia

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Pranata, I., Athauda, R., Skinner, G. (2013). Determining Trustworthiness and Quality of Mobile Applications. In: Borcea, C., Bellavista, P., Giannelli, C., Magedanz, T., Schreiner, F. (eds) Mobile Wireless Middleware, Operating Systems, and Applications. MOBILWARE 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 65. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36660-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36660-4_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36659-8

  • Online ISBN: 978-3-642-36660-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics