Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Meta-App A Pull-Based Approach

IJCA Proceedings on National Conference on Advancements in Computer & Information Technology
© 2016 by IJCA Journal
NCACIT 2016 - Number 7
Year of Publication: 2016
Tushar Badgu
Omkar Patil
Abhidnya Patil
Snehal Rasakar

Tushar Badgu, Omkar Patil, Abhidnya Patil and Snehal Rasakar. Article: Meta-App A Pull-Based Approach. IJCA Proceedings on National Conference on Advancements in Computer & Information Technology NCACIT 2016(7):1-5, May 2016. Full text available. BibTeX

	author = {Tushar Badgu and Omkar Patil and Abhidnya Patil and Snehal Rasakar},
	title = {Article: Meta-App A Pull-Based Approach},
	journal = {IJCA Proceedings on National Conference on Advancements in Computer & Information Technology},
	year = {2016},
	volume = {NCACIT 2016},
	number = {7},
	pages = {1-5},
	month = {May},
	note = {Full text available}


Now-a-days Smartphone has become common and are used by millions of people. As these Smartphone provide a facility of custom built apps, many of the businesses are moving towards building apps. A lot of time and capital is being invested in developing these kinds of apps. However in order to reach out customers these apps are being built hap hazardously. Poorly written apps pose the risk of exposing user data and breaching privacy. Development and maintenance of these apps is also required. Furthermore some apps are being built only because everyone is moving app-only. All this has made it difficult for a Smartphone user to keep track of different apps on his devices. This paper aims at creating a Meta-App which would act as supplant to all the redundant applications and will be based on intent publishing. A solution to provide fine control to the user over his data that is shared with the service providers and implement a Pull-based Approach.


  • Taenam Cho, Seung-Hyun Seo, Vulnerabilities of Android Data Sharing and Malicious Application to Leaking Private Information, 2013.
  • Nai-Wei Lo, Kuo-Hui Yeh, Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid, 2014.
  • Hongliang Liang, Dongyang Wu, Jiuyun Xu, Hengtai Ma, Suvery on Privacy Protection of Android Devices, 2015.
  • Kuo-Hui Yeh ,Nai-Wei Lo, Chuan-Yen Fan An Analysis Framework for Information Loss and Privacy Leakage on Android Applications,2014
  • Muneer Ahmad Dar, Javed Parvez, Enhancing Security of Android & IOS by Implementing Need-Based Security (NBS), 2014.
  • ZheMin Yang, Min Yang, LeakMiner: Detect information leakage on Android with static taint analysis, 2012.
  • Zang J, Dummit K, Graves J, Lisker P, Sweeney L. Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps. Technology Science. 2015103001. October 30, 2015. http://techscience. org/a/2015103001
  • Thejovardhana S. Kote and S. R. Jeyashankher, A large scale publish subscribe platform for information delivery to mobile phones, 2006.
  • Keke Chen, Ya Zhang, Zhaohui Zheng, Adapting Ranking functions to User Preference, 2008.
  • Xumin Liu, Arpeet Kale, Javed Wasani, Extracting, Ranking, and Evaluating Quality features of web services through User Review Sentiment Analysis, 2015.