Abstract
Smartphones have gotten to be a major portion of a human’s life. These days’ versatile applications are playing a major part in numerous zones such as keeping money, social organizing, money-related apps, amusement, and so on. For each desktop or Web application, a substitute portable app is accessible. With fair single press number of versatile apps are accessible from Google’s play advertise. With this tremendous number of applications, security is a critical issue. This investigative article talks about the security of the applications and the malevolent apps that will influence or spill delicate information such as Worldwide Portable gear Character Number (IMEI) of gadget, credit or charge card data, area data, and so on. As the Android showcase is developing, security hazard has expanded, and, in this way, a center ought to be given to security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
L. Ma, L. Gu, J. Wang, Research and development of mobile application for android platform. Int. J. Mltmda Ubiquitous Eng. 9(4), 187–198 (2014)
A. Barbosa, J. Goncalves, A.N. Ribeiro, A. Costa, Integration of SIP protocol in android media framework, EUROCON, pp. 1–4 (2011)
S. Jin, H. Li, Y. Liu, Research on media player based on Android, FSKD, pp. 2326–2329 (2012)
S. Holla, M.M. Katti, Android based mobile application development and its security. Int. J. Comput. Trends Technol. 3(3), 486–490 (2012)
O. Bach, Mobile malware threats in 2015: Fraudsters are still two steps ahead, July 13, 2015
Korea Internet & Security Agency, Mobile public service security vulnerability check guide, Ministry of Public Administration and Security (2016)
Transcript of analysis and research of system security based on android analysis and research of system security based on android by Raghunath
M. Willocx, J. Vossaert, V. Naessens, A quantitative assessment of performance in mobile app development tools, in: 2015 IEEE international conference on mobile services, pp. 454–461 (IEEE, 2015, June)
R. Surendra, B.S. Reddy, P. Chawla, K. Soni, Cyber security in digital sector, in 2021 International conference on artificial intelligence and smart systems (ICAIS), pp. 703–710 (IEEE, 2021, March)
H. Bing, Analysis and research of system security based on android, in 2012 Fifth international conference on intelligent computation technology and automation, pp. 581–584 (IEEE, 2012, January)
S. Chatterjee, K. Paul, R. Roy, A. Nath, A comprehensive study on security issues in android mobile phone—scope and challenges. Int. J. Innov. Res. Adv. Eng. 3(3), 62–72 (2016)
H.W. Kim, A study on the mobile application security threats and vulnerability analysis cases. Int. J. Internet Broadcast. Commun. 12(4), 180–187 (2020)
M. Linares-Vásquez, C. Bernal-Cárdenas, K. Moran, D. Poshyvanyk, How do developers test android applications? in 2017 IEEE international conference on software maintenance and evolution (ICSME), pp. 613–622 (IEEE, 2017, September)
M. Mutreja, K. Khandelwal, H. Dham, P. Chawla, Perception of IOT: application and challenges, in 2021 6th international conference on communication and electronics systems (ICCES), pp. 597–603 (IEEE, 2021, July)
K. Soni, S. Kumar, Security issues in cloud computing
K. Jha, S. Anumotu, K. Soni, Security issues and architecture of IOT, in 2021 International conference on artificial intelligence and smart systems (ICAIS), pp. 1381–1385 (IEEE, 2021, March)
S. Mehta, A. Sharma, P. Chawla, K. Soni, The urgency of cyber security in secure networks, in 2021 5th International conference on intelligent computing and control systems (ICICCS), pp. 315–322 (IEEE, 2021, May)
S.S. Tyagi, Enhancing security of cloud data through encryption with AES and Fernet algorithm through convolutional-neural-networks (CNN). Int. J. Comput. Netw. Appl. 8(4), 288–299 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Dham, H., Dubey, T., Khandelwal, K., Soni, K., Chawla, P. (2023). Development of Android Applications and Its Security. In: Dutta, P., Bhattacharya, A., Dutta, S., Lai, WC. (eds) Emerging Technologies in Data Mining and Information Security. Advances in Intelligent Systems and Computing, vol 1348. Springer, Singapore. https://doi.org/10.1007/978-981-19-4676-9_52
Download citation
DOI: https://doi.org/10.1007/978-981-19-4676-9_52
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-4675-2
Online ISBN: 978-981-19-4676-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)