Anti-theft Cloud Apps for Android Operating System

Cloud computing is one of the major technologies which has gained popularity in computer sciences and information technology domain. Cloud computing has changed the way of doing business by an enterprise in general and data management, retrieval & storage within a business enterprise in particular. Smartphone usage has grown rapidly in tandem with cloud computing by providing different services/applications using cloud computing. Most of the Smartphone do run on Android operating system. Android OS is the widely used Smartphone operating systems with huge user base. Everyday hundreds and thousands of application are added to the repository of Android by different vendors and are easily available for installation to android users. As most of the applications are developed by third party giving way to possible loopholes which result in different threats to security & privacy of data. These threats are critical when a user is suing cloud storage or services on Smartphone devices and if the device is stolen it may lead to access of information by an unauthorized user. This unauthorized access to information can be misused which creates distrust among the users of cloud computing on android devices. In this paper a methodology has been proposed to secure data and information from unauthorized access using android cloud application.

[1]  Sam Malek,et al.  A whitebox approach for automated security testing of Android applications on the cloud , 2012, 2012 7th International Workshop on Automation of Software Test (AST).

[2]  A. K. Dubey,et al.  Cloud-user security based on RSA and MD5 algorithm for resource attestation and sharing in java environment , 2012, 2012 CSI Sixth International Conference on Software Engineering (CONSEG).

[3]  Sahin Albayrak,et al.  An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[4]  Sajjad Haider,et al.  Security threats in cloud computing , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[5]  Emre Erturk A case study in open source software security and privacy: Android adware , 2012, World Congress on Internet Security (WorldCIS-2012).

[6]  吉田 則裕,et al.  Android Open Source Projectを対象としたパッチレビュー活動の調査 , 2012 .

[7]  Eleazar Aguirre Anaya,et al.  Security controls for Android , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).

[8]  Jiaming He,et al.  Extending Android Security Enforcement with a Security Distance Model , 2011, 2011 International Conference on Internet Technology and Applications.

[9]  Shufen Zhang,et al.  Cloud Computing Research and Development Trend , 2010, 2010 Second International Conference on Future Networks.

[10]  Chia-Wei Chang,et al.  Probability-Based Cloud Storage Providers Selection Algorithms with Maximum Availability , 2012, 2012 41st International Conference on Parallel Processing.

[11]  Christian Hanser,et al.  On cloud storage and the cloud of clouds approach , 2012, 2012 International Conference for Internet Technology and Secured Transactions.

[12]  Vijay K. Naik,et al.  A Framework for Controlling and Managing Hybrid Cloud Service Integration , 2013, 2013 IEEE International Conference on Cloud Engineering (IC2E).

[13]  Hal Abelson,et al.  Workshop — Google App Inventor for Android: Creating mobile applications as a first computing experience , 2010, 2010 IEEE Frontiers in Education Conference (FIE).