Skip to main content

A New Secure Android Model Based on Privilege

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing (UCAWSN 2016, CUTE 2016, CSA 2016)

Abstract

Android is the most popular smartphone operating system in the world. There are many people who focus on Android security and dedicated to improve android security. There are many android vulnerabilities exposed online and attackers can use these vulnerabilities to steal our private and sensitive information and attack our device. In the paper, we propose a novel secure android model based on privilege. We create three kinds of users and grant different users different permissions. Thus, users can have more freedom and control over their android device in the model we proposed. In our secure model, users can upgrade their android operating system in time, which may enhance the security of their smartphones and protect users’ sensitive information better.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Google. Google android security 2015 report. http://static.googleusercontent.com/media/source.android.com/en//security/reports/GoogleAndroid. Security 2015 Report Final.pdf

  2. Statista. Android os market share of smartphone sales to end users from 2009 to 2015. http://www.statista.com/statistics/216420/

  3. Han, K.S., Lee, Y., Jiang, B., Im, E.G.: Android permission system violation: case study and renement. Int. J. E-Entrepreneurship Innov. (IJEEI) 4(1), 16 (2013)

    Article  Google Scholar 

  4. The Latest on Stagefright: CVE-2015-1538 Exploit is Now Available for Testing Purposes. https://blog.zimperium.com/the-latest-on-stagefright-cve-2015-1538-exploit-is-now-available-for-testing-purposes/

  5. Merlo, A., Costa, G., Verderame, L., et al.: Android vs. SEAndroid: an empirical assessment. Pervasive Mob. Comput. 30, 113–131 (2016)

    Article  Google Scholar 

  6. Smalley, S.: The Case for SE Android. National Security Agency (2011)

    Google Scholar 

  7. Zhang, H., She, D., Qian, Z.: Android root and its providers: a double-edged sword. In: ACM Sigsac Conference on Computer and Communications Security, pp. 1093–1104. ACM (2015)

    Google Scholar 

  8. University of Chinese Academy of Sciences National Computer Network Emergency Response Technical Team Coordination Center of China State Key Laboratory of Integrated Services Networks Xidian University Beijing Electronic Science and Technology Institute. Survey of Android Vulnerability Detection. J. Comput. Res. Dev. (2015)

    Google Scholar 

  9. Nauman, M., Khan, S., Zhang, X.: Apex: extending android permission model and enforcement with user-defined runtime constraints. In: ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 2010

    Google Scholar 

  10. Yang, C., et al.: Utilization pattern based android root vulnerability analysis. Comput. Sci. 41, 343–346 (2014)

    Google Scholar 

  11. Xiang, W.H., Yu-Jun, L.I., Hou, M.S.: Research on privacy protection based on SEAndroid. Comput. Sci. 42, 329–332 (2015)

    Google Scholar 

  12. Zhou, Y., Jiang, X.: Dissecting Android malware: characterization and evolution. In: IEEE Symposium on Security & Privacy. IEEE (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tao Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Zhang, T., Wang, Z. (2017). A New Secure Android Model Based on Privilege. In: Park, J., Pan, Y., Yi, G., Loia, V. (eds) Advances in Computer Science and Ubiquitous Computing. UCAWSN CUTE CSA 2016 2016 2016. Lecture Notes in Electrical Engineering, vol 421. Springer, Singapore. https://doi.org/10.1007/978-981-10-3023-9_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3023-9_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3022-2

  • Online ISBN: 978-981-10-3023-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics