Android and Smartphone Security Research Paper

Total Length: 2544 words ( 8 double-spaced pages)

Total Sources: 5

Page 1 of 8

Review on Android and Smartphone Security

Abstract

Currently, Android controls the largest market share among operating systems for smartphones. Smartphone users have woken up to the realization that security is an issue that must be kept in mind all the time. The enhancement of performance and increase in features also multiply in tandem with risk such as virus attacks. It is possible that Android could be the most secure operating system, compared to others, currently. There are limited restrictions for developers, however. Such a blank check allows for multiple security concerns for the end-user. This paper explores Android's security model; it is the level of application and the security concerns with the operating system for smartphones.

There is no doubt that Android has exhibited truly modern smartphone features and tweaks. It is a typical open-source program. Applications from Android can use a broad range of software programs, including server and local data, networks, and other applications (Mohini, et al., 2013). To successfully run an open-source platform such as Android, one needs a highly sophisticated and anticipative approach and infrastructure. Android Operating System works with multi-layers of security precautions. It is an ideal platform for an open-source channel. Android incorporates a stack of software, with an Operating System, core application, and middleware in complete form (Kaur & Kaur, 2013).

Millions of mobile gadgets in over 190 countries across the globe use the Android Operating System. Android has been designed with architectural acumen that gives room for continuous improvement from developers from elsewhere. Indeed, the security elements have been designed to remain accommodative to developers. The developers have the window to use the versatile security buffers. There is a lack of familiarity by developers about security that applies by default. The end user's interest drives the design of the Android Operating System and the device itself. It allows users to view how applications work and manage the same applications (Mohini, et al., 2013).

Figure 1 below compiles the security aspects of Android, including what is considered at various levels. Every element assumes that the one below it is appropriately secured. If an Android OS code running as root, with the exception, any process running over the Kernel for Linux is controlled by the Application Sandbox (Mohini, et al., 2013)

Figure 1: Architecture of Android (Mohini, et al., 2013)

Android Security

i. Android is open source, thus, allows developers to enhance it (AOSP, 2013)

ii. The software for Android is for multitasking. Consequently, no software can gain serious access to OS components (AOSP, 2013)

iii. So far, UNIX is the most secure Operating System, and it is what Android uses (AOSP, 2013)

iv. If a developer wishes to publish their application on the open market, they require a unique signature to do so (AOSP, 2013).

v. iv. The developers need a unique signature to publish their application on the market (AOSP, 2013).

vi. Users have an avenue to report suspected security flaws through their Google accounts

vii. For application installation, all must seek clearance from the end-user

Security Concerns that Android Has Faced

Well, Android is not as secure as it appears, the layers of security measures notwithstanding. Some security concerns are apparent:

i. There is no security scan for Android for applications being uploaded on its customer stalls

ii. Some apps have been noted to carry the capacity to exploit the services of other apps installed on the Android system with no prior permission granted

iii. Android's permission security model offers the user the power to decide whether an app is trustworthy or not. The latter model opens many worms because there will be lapses with lay security checks by end-users.

Stuck Writing Your "Android and Smartphone Security" Research Paper?



iv. While the open-source is available for trustworthy developers, hackers can access it just as well and easily. Consequently, Android renders itself illegitimate when one wishes to install critical systems.

v. Lastly, the Android system developers give a disclaimer that they cannot be held responsible for security lapses emanating from external storage. In other words, any app on the device can access the data on other apps and the device data in a similar fashion as GSM and IDs for SIM marketers with no permission from the end-user (Mohini, et al., 2013)

Applications function as processes for Linux using their IDs. Therefore they are separated. This means that the vulnerability of one App should not necessarily affect another. Because Android offers IPC mechanisms, which must be secured, there is a second line of enforcement that materializes. Android uses a monitor for reference used to mediate access to the components of applications anchored on user permissions. If an app attempts to access a different component, it must be cleared by…

[…… parts of this paper are missing, click here to view the entire document ]

…cellular phones. It comes with a limited cellular Smartphone overhead. Although users can be served well with targeted virus alert service, their privacy is protected too. The SmartSiren effectiveness and feasibility have been confirmed by real implementation and simulations that are driven (Mohini, et al., 2013).

MADAM framework

This framework facilitates the detection of intrusion early. It tracks the malicious activity of malware on the Android platform. The MADAM framework strategy exploits a multilevel methodology, i.e., combining the features at kernel-level and the level at which it is applied. Machine learning techniques drive it. Thus, the initial prototype for Android Smartphone has detected all the 10 real malware that was monitored. It has an effect on the experience of the user owing to the few false generated every day. To our knowledge, the results are a clear improvement to the solutions generated in the previous work; both for enhancing the rate of detection of real malware on android smartphones and also false-positive occurrences (Dini, Martinelli,Saracino&Sgandurra, 2012).

Conclusions

Billions of people are now using smartphones. This means that its usage is growing, and so it is not easy to validate if an application is legitimate or malicious. Therefore, the user must choose whether it is safe to use the application. Note that there are different types of PCs and mobile devices in the resource management mechanism, so not all solutions could be compatible with all the devices (Ahmed & Sallow, 2019). As a result, academic research and anti-malware organizations have many security methods that could help recognize and classify threats that may affect the Android operating system. Going by this proposal, methods differ and could be arranged into several classifications. This is why this paper has looked at many security methods and threats and possible solutions classification.

Note that more than a million Android devices are activated (Mohini, et al., 2013). This is because there are fewer restrictions for the developer, which increases the risk to end-users. This paper has therefore reviewed security issues in Android smartphone OS. Thus integrating technologies in the application certification process may need that you overcome technical and logical challenges. Android avails more security than any other platform could provide. Kirin is working hard to transform Android into an OS that is secure than other platforms for computing platforms for the next generation.

Other than expanding Android smartphones, the number of….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Android And Smartphone Security" (2020, November 21) Retrieved May 9, 2024, from
https://www.aceyourpaper.com/essays/android-smartphone-security-2175793

Latest MLA Format (8th edition)

Copy Reference
"Android And Smartphone Security" 21 November 2020. Web.9 May. 2024. <
https://www.aceyourpaper.com/essays/android-smartphone-security-2175793>

Latest Chicago Format (16th edition)

Copy Reference
"Android And Smartphone Security", 21 November 2020, Accessed.9 May. 2024,
https://www.aceyourpaper.com/essays/android-smartphone-security-2175793