Android Apps Security Evaluation System in the Cloud
Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2016, Vol 2, Issue 6
Abstract
It is an uncertain problem that evaluating the security of Android Apps. We can’t be sure of the danger with sensitive permissions in an individual of Apps. Permissions are an important factor in security decisions of Apps. For the Apps security evaluation, the paper proceed from the Android permission mechanism, proposes a classified dynamic security evaluation method. Apps security evaluation system include the large-scale permissions capturing and classification risk evaluation algorithm. The system could find the minimum permissions which are the common features of Apps. The minimum permissions can be dynamically changed according to different classified Apps. We adopt Euclidean distance-based similarity calculation algorithm to evaluate risk. The difference value determines the APP’s malicious risk. Experiments prove that the system has reference value to the APP security assessment.
Authors and Affiliations
Hao Wang, Tao Li, Tong Zhang, Jie Wang
Android Apps Security Evaluation System in the Cloud
It is an uncertain problem that evaluating the security of Android Apps. We can’t be sure of the danger with sensitive permissions in an individual of Apps. Permissions are an important factor in security decisions of Ap...
Defining an Elasticity Metric for Cloud Computing Environments
Elasticity is a key property of cloud computing environments and one of the features which distinguishes this paradigm from other ones. An elasticity metric could be used to define and to monitor Service Level Agreements...
Flexible Building Blocks for Software Defined Network Function Virtualization
Current virtual networks offered by IaaS cloud providers are not under complete control of their tenants. The virtual network configuration is carried out by the service provider, and the functionality is limited by the...
Indoor Positioning using cellular network and relay node for wearables
One of the key requirements in public safety domain is to know the exact location of user or wearable device. There are a plethora of Internet of Things based wearable devices which are getting used for geo-fencing and f...
CloudTUI-FTS: a user-friendly and powerful tool to manage Cloud Computing Platforms
The NIST defines Cloud Computing as a model for en-abling ubiquitous network access to a shared pool of con-figurable computing resources. Thanks to the popularity of Cloud Computing and its various area of applicability...