ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.9, No. 3)

Publication Date:

Authors : ; ;

Page : 58-63

Keywords : Malicious App; Android Security; Hacking;

Source : Downloadexternal Find it from : Google Scholarexternal


Android has been a major target of malicious applications. How to detect and keep the malicious app out of the app markets is an ongoing challenge. One of the central design points of Android security mechanism is permission control that restricts the access of apps to core facilities of devices. However, it imparts a significant responsibility to the app developers with regard to accurately specifying the requested permissions and to the users with regard to fully understanding the risk of granting certain combinations of permissions. Android permissions requested by an app depict the app's behavioral patterns. In the projected system, providing password for individual files into that folder and making access control to move, copy or delete those files and folders. If a user who knows the password can able to access, move, copy or delete that file. And also, providing extra facilities as if an unauthorized user trying to access our file and he attempting to give wrong as times means there is an alert message will send to the respective user of that file.

Last modified: 2020-03-12 02:08:05