Abstract

The growth of “smart” mobile devices, such as smartphones and tablets, has been exponential over the past few years. Such growth was mainly attributed to the development of mobile applications. To date, mobile applications have been increasingly used to improve our productivity and also to provide the entertainment contents. However, with a huge number of mobile applications that appear in the application stores; in particular those that provide similar functionalities, users are often confused with the selection of trustworthy and high quality mobile applications. At the current state, there is a limited research embarked to provide solutions for measuring the trustworthiness of mobile applications prior to download. Thus, the aims of this paper are to review the current research in this area and to discuss several issues in measuring the trustworthiness of mobile applications. In addition, this paper also proposes MobilTrust, a similarity trust measurement method to solve the identified issues.

Keywords

trust reputation mobile application 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    International Telecommunication Union (ITU), ITU estimates two billion people online by end 2010, Access to mobile networks available to over 90% of world population 143 countries offer 3G services, Press Release Report (2010), viewed at http://www.itu.int/net/pressoffice/press_releases/2010/39.aspx
  2. 2.
    PRB, 2010 World Popilation Data Sheet (2010), http://www.prb.org/publications/datasheets/2010/2010wpds.aspx
  3. 3.
    IDC Research, Worldwide Smartphone 2012-2016 Forecast and Analysis, Research report (2012), http://marketresearch.com.
  4. 4.
    Apple, Apple Application Store (2012), http://itunes.apple.com/us/genre/ios/id36?mt=8
  5. 5.
    Google Play, Android Google Play (2012), https://play.google.com/store?hl=en
  6. 6.
    BusinessInsider, Number of Apps Available at Smartphones’ Apps Stores (2011), viewed at http://articles.businessinsider.com/2011-03-09/tech/30011803_1_app-store-google-s-android-market-twitter
  7. 7.
    Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications [IEEE Communications Surveys and Tutorials, Fourth Quarter] (2000), http://www.comsoc.org/pubs/surveys/
  8. 8.
    Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provisioning. Decision Support System 43, 618–644 (2007)CrossRefGoogle Scholar
  9. 9.
    Osborne, C.: IOS Apps: Massive invasion of user privacy, ZDNet news (2012), http://www.zdnet.com/blog/igeneration/ios-apps-massive-invasion-of-user-privacy/15138
  10. 10.
    Lowenshon, J.: Congress probing iOS developers on user privacy, address books, CNet news (2012), http://news.cnet.com/8301-27076_3-57402957-248/congress-probing-ios-developers-on-user-privacy-address-books/
  11. 11.
    Enck, W., Gilbert, P., Chun, B.-G.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones (2010)Google Scholar
  12. 12.
    Smith, E.: iPhone applications & privacy issues: An analysis of application transmission of iPhone unique device identifiers (UDIDs), http://www.kompatscher.biz/phocadownload/iPhone-Applications-Privacy-Issues.pdf
  13. 13.
    Ferro, G.: BYOD Policies vs. the Realities of Corporate IT, NetworkComputing.com, http://www.networkcomputing.com/wireless/240000916
  14. 14.
    CoreGrid, D.IA.03 Survey Material on Trust and Security, European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies, Technical Paper (2004)Google Scholar
  15. 15.
    Rasmusson, L., Janssen, S.: Simulated Social Control for Secure Internet Commerce. In: Proceedings of the 1996 New Security Paradigms Workshop, Lake Arrowhead, CA, USA (1996)Google Scholar
  16. 16.
    University of Pennsylvania, TM/RM Simulator (March 2012), http://rtg.cis.upenn.edu/qtm/p2psim.php3
  17. 17.
    Benats, G., Bandara, A., Yu, Y., Colin, J., Nuseibeh, B.: PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. Presented at 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy (2011)Google Scholar
  18. 18.
    Dellarocas, C.: Immunizing Online Reputation Reporting Systems against Unfair Ratings and Discriminatory Behavior. In: The Proceedings of Second ACM Conf. Electronic Commerce (2000)Google Scholar
  19. 19.
  20. 20.
    Kerschbaum, F., Haller, J., Karabulut, Y., Robinson, P.: PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 193–205. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  21. 21.
    Ion, M., Danzi, A., Koshutanski, H., Telesca, L.: A Peer-to-Peer Multidimensional Trust Model for Digital Ecosystems. Presented at the Second IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2008), Phitsanulok, Thailand (2008)Google Scholar
  22. 22.
    Schmidt, S., Steele, R., Dillon, T.: DEco Arch: Trust and Reputation Aware Service Brokering Architecture in Digital Ecosystems. Presented at the Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST), Cairns, Australia (2007)Google Scholar
  23. 23.
    Singh, A., Liu, L.: TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. Presented at the Third International Conference on Peer-to-Peer Computing, Sweden (2003)Google Scholar
  24. 24.
    Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16, 843–857 (2004)CrossRefGoogle Scholar
  25. 25.
    Damiani, E., Vimercati, S.: Managing and Sharing Servents’ Reputations in P2P Systems. IEEE Transactions on Knowledge and Data Engineering 15, 840–854 (2003)CrossRefGoogle Scholar
  26. 26.
    Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. Presented at the 12th ACM International Conference on World Wide Web, USA (2003)Google Scholar
  27. 27.
    Jøsang, A., Hayward, R., Pope, S.: Trust Network Analysis with Subjective Logic. In: Proceedings of the 29th Australasian Computer Science Conference (2006)Google Scholar
  28. 28.
    Sabater, J., Sierra, C.: REGRET: A reputation model for gregarious societies. In: Proceedings of the Fifth International Conference on Autonomous Agents, Montreal, Canada (2001)Google Scholar
  29. 29.
    Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Travos: Trust and reputation in the context of inaccurate information sources. Journal of Autonomous Agents and Multi-Agent Systems 12 (2006)Google Scholar
  30. 30.
    Josang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Electronic Commerce Conference (2002)Google Scholar
  31. 31.
    Entrust: The concept of trust in network security, Version 1.2 [White Paper] (2000, April 2011), http://www.entrust.com/resources/pdf/trust.pdf
  32. 32.
    Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems (2005) (to appear)Google Scholar
  33. 33.
  34. 34.

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2013

Authors and Affiliations

  • Ilung Pranata
    • 1
  • Rukshan Athauda
    • 1
  • Geoff Skinner
    • 1
  1. 1.School of Design, Communication and ITUniversity of NewcastleCallaghanAustralia

Personalised recommendations