3How to Enhance Data Privacy on AndroidA Proposal
Bharavi Mishra, Aman Ahmad Ansari, and Poonam Gera
Contents
- 3.1Introduction
- 3.2Advances in Privacy Preservation and Security
- 3.2.1Data Encryption Method
- 3.2.2Security Models Used by Google
- 3.2.2.1Application Manifest
- 3.2.2.2Sandboxing
- 3.2.2.3Google Bouncer
- 3.2.2.4Malware Removal
- 3.2.3Third-Party Applications
- 3.2.3.1TaintDroid
- 3.2.3.2LP-Guardian
- 3.3Security in Android
- 3.3.1Android Architecture
- 3.3.2Application Security
- 3.4Protection Framework
- 3.4.1Functions of the Server
- 3.4.1.1Notification List
- 3.4.1.2Server App List
- 3.4.1.3App Analysis Environment
- 3.4.1.4Permission Scanner
- 3.4.1.5Permission Recommender
- 3.4.2Client Side
- 3.4.2.1Recommender App
- 3.4.2.2App List
- 3.4.2.3 ...
Get A Step Towards Society 5.0 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.