A Detailed Analysis of Data Security Issues in Android Devices

  • Ditipriya Dutta
  • Shubham Agarwal
  • Ria Dash
  • Bhaswati SahooEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 38)


People believe that any sufficiently advanced technology is indistinguishable from magic. The ability to analyze and act on data is increasingly gaining importance in this ever-expanding world. Data forms an integral part of the identity of an individual or an organization. However, as data is getting digitized and more information is being shared online via various social media platforms and apps that are specifically designed to cater to the needs of users, data privacy is becoming a matter of extreme concern. Protecting data is of paramount importance because data in the hands of nefarious individuals or organizations can pose a massive threat to both the digital and real worlds alike. Data protection is not just about protecting one’s personal data, it also includes the protection of fundamental rights and freedom of the people associated with it. Every organization is in charge of personal data associated with either the organization itself or to the clients they serve. Protecting the identity of their customers is a very huge task in itself. Illegal extraction of private and personal data by malpractices is taking place every other second and as digitally-enhanced citizens, recognizing the deliberate attempts at data phishing should be our key concern. Personal data can be used to influence and control our decisions and somewhat mould our behaviour and hence, we, as an individual, have a lot at stake when it comes to protecting confidential information. In this paper, we will discuss the various data security issues in Android devices, until the launch of Android Nougat 7.0, and how data extraction without prior information is a threat to the security, integrity, and confidentiality of the users.


Android APK decompiling Data breach GPS Media files Mobile devices Permissions Phishing Privacy Security 



The study was funded by Kalinga Institute of Industrial Technology, Bhubaneswar, Odisha.

Conflict of Interest

The authors declare that they have no conflict of interest.


  1. 1.
    Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google android: a comprehensive security assessment. IEEE Secur. Priv. 2, 35–44 (2010)CrossRefGoogle Scholar
  2. 2.
    Gibler, C., et al.: AndroidLeaks: automatically detecting potential privacy leaks in android applications on a large scale. In: International Conference on Trust and Trustworthy Computing. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  3. 3.
    Vidas, T., Zhang, C., Christin, N.: Toward a general collection methodology for Android devices. Digit. Invest. 8, S14–S24 (2011)CrossRefGoogle Scholar
  4. 4.
    Davies, H.: Ted Cruz campaign using firm that harvested data on millions of unwitting Facebook users. The Guardian, 11 December 2015. Archived from the original on 16 February 2016Google Scholar
  5. 5.
  6. 6.
  7. 7.
  8. 8.
  9. 9.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Ditipriya Dutta
    • 1
  • Shubham Agarwal
    • 1
  • Ria Dash
    • 1
  • Bhaswati Sahoo
    • 1
    Email author
  1. 1.School of Computer EngineeringKIIT - Deemed to be UniversityBhubaneswarIndia

Personalised recommendations