We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Meta-App A Pull-Based Approach

Published on May 2016 by Tushar Badgu, Omkar Patil, Abhidnya Patil, Snehal Rasakar
National Conference on Advancements in Computer & Information Technology
Foundation of Computer Science USA
NCACIT2016 - Number 7
May 2016
Authors: Tushar Badgu, Omkar Patil, Abhidnya Patil, Snehal Rasakar
288e14e5-e80a-42cc-9ab2-cd8eac1c21f4

Tushar Badgu, Omkar Patil, Abhidnya Patil, Snehal Rasakar . Meta-App A Pull-Based Approach. National Conference on Advancements in Computer & Information Technology. NCACIT2016, 7 (May 2016), 1-5.

@article{
author = { Tushar Badgu, Omkar Patil, Abhidnya Patil, Snehal Rasakar },
title = { Meta-App A Pull-Based Approach },
journal = { National Conference on Advancements in Computer & Information Technology },
issue_date = { May 2016 },
volume = { NCACIT2016 },
number = { 7 },
month = { May },
year = { 2016 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/ncacit2016/number7/24737-3092/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advancements in Computer & Information Technology
%A Tushar Badgu
%A Omkar Patil
%A Abhidnya Patil
%A Snehal Rasakar
%T Meta-App A Pull-Based Approach
%J National Conference on Advancements in Computer & Information Technology
%@ 0975-8887
%V NCACIT2016
%N 7
%P 1-5
%D 2016
%I International Journal of Computer Applications
Abstract

Now-a-days Smartphone has become common and are used by millions of people. As these Smartphone provide a facility of custom built apps, many of the businesses are moving towards building apps. A lot of time and capital is being invested in developing these kinds of apps. However in order to reach out customers these apps are being built hap hazardously. Poorly written apps pose the risk of exposing user data and breaching privacy. Development and maintenance of these apps is also required. Furthermore some apps are being built only because everyone is moving app-only. All this has made it difficult for a Smartphone user to keep track of different apps on his devices. This paper aims at creating a Meta-App which would act as supplant to all the redundant applications and will be based on intent publishing. A solution to provide fine control to the user over his data that is shared with the service providers and implement a Pull-based Approach.

References
  1. Taenam Cho, Seung-Hyun Seo, Vulnerabilities of Android Data Sharing and Malicious Application to Leaking Private Information, 2013.
  2. Nai-Wei Lo, Kuo-Hui Yeh, Leakage Detection and Risk Assessment on Privacy for Android Applications: LRPdroid, 2014.
  3. Hongliang Liang, Dongyang Wu, Jiuyun Xu, Hengtai Ma, Suvery on Privacy Protection of Android Devices, 2015.
  4. Kuo-Hui Yeh ,Nai-Wei Lo, Chuan-Yen Fan An Analysis Framework for Information Loss and Privacy Leakage on Android Applications,2014
  5. Muneer Ahmad Dar, Javed Parvez, Enhancing Security of Android & IOS by Implementing Need-Based Security (NBS), 2014.
  6. ZheMin Yang, Min Yang, LeakMiner: Detect information leakage on Android with static taint analysis, 2012.
  7. Zang J, Dummit K, Graves J, Lisker P, Sweeney L. Who Knows What About Me? A Survey of Behind the Scenes Personal Data Sharing to Third Parties by Mobile Apps. Technology Science. 2015103001. October 30, 2015. http://techscience. org/a/2015103001
  8. Thejovardhana S. Kote and S. R. Jeyashankher, A large scale publish subscribe platform for information delivery to mobile phones, 2006.
  9. Keke Chen, Ya Zhang, Zhaohui Zheng, Adapting Ranking functions to User Preference, 2008.
  10. Xumin Liu, Arpeet Kale, Javed Wasani, Extracting, Ranking, and Evaluating Quality features of web services through User Review Sentiment Analysis, 2015.
Index Terms

Computer Science
Information Sciences

Keywords

Public Key Cryptosystems Standards Query Processing Content Analysis And Indexing Commercial Services Data Sharing Natural Language Interfaces Language Parsing And Understanding Text Analysis Data Sharing Natural Language Interfaces Language Parsing And Understanding Text Analysis Content Analysis And Indexing Commercial Services Data Sharing Natural Language Interfaces Language Parsing And Understanding Text Analysis