CFP last date
22 April 2024
Reseach Article

Security Mechanisms for Android Devices to Protect Application Data and Provide Information about Intrusion Attempts in Real Time

by Rohit Joshi, Arjun Bhadra, Adwait Vyas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 16
Year of Publication: 2014
Authors: Rohit Joshi, Arjun Bhadra, Adwait Vyas
10.5120/18287-9419

Rohit Joshi, Arjun Bhadra, Adwait Vyas . Security Mechanisms for Android Devices to Protect Application Data and Provide Information about Intrusion Attempts in Real Time. International Journal of Computer Applications. 104, 16 ( October 2014), 21-23. DOI=10.5120/18287-9419

@article{ 10.5120/18287-9419,
author = { Rohit Joshi, Arjun Bhadra, Adwait Vyas },
title = { Security Mechanisms for Android Devices to Protect Application Data and Provide Information about Intrusion Attempts in Real Time },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 16 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 21-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number16/18287-9419/ },
doi = { 10.5120/18287-9419 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:20.761440+05:30
%A Rohit Joshi
%A Arjun Bhadra
%A Adwait Vyas
%T Security Mechanisms for Android Devices to Protect Application Data and Provide Information about Intrusion Attempts in Real Time
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 16
%P 21-23
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The amount of data being stored on Mobile Devices, particularly Android Devices, is increasing rapidly. Using passcodes to lock applications solves this problem to some extent but, this only protects the data and does not provide any information about the intruder's identity. This paper explores existing technologies that can be used to store the identity of the intruder and inform the users about intrusion in real time.

References
  1. Authorization, Access Control from Wikipedia, the free encyclopedia http://en. wikipedia. org/wiki/Authorization http://en. wikipedia. org/wiki/Access_control
  2. "Username and Password – A dying security model" by HID Global http://www. 2fa. com/downloads/collateral/hotd_username_password_wp_en. pdf
  3. "Password Security & Markov Models" by Markus Dürmuth, Horst Görtz Institute for IT-Security, Ruhr-University Bochum http://passwords12. at. ifi. uio. no/Markus_Due
  4. Java. util Package, Java. util. Random Class http://docs. oracle. com/javase/6/docs/api/java/util/Random. html http://docs. oracle. com/javase/7/docs/api/java/util/package-summary. html
  5. Android OS Location API, Android OS Camera API, Android Telephony API https://developer. android. com/google/play-services/location. html http://developer. android. com/reference/android/hardware/Camera. html http://developer. android. com/reference/android/telephony/package-summary. html
  6. JavaMail API http://www. oracle. com/technetwork/java/javamail/index. html
Index Terms

Computer Science
Information Sciences

Keywords

Android Application Intruder Identification Intrusion Notification