Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments

Version 1 : Received: 9 July 2024 / Approved: 9 July 2024 / Online: 10 July 2024 (09:49:59 CEST)

How to cite: Ogwara, N. O.; Petrova, K.; Yang, M. L. (.; MacDonell, S. G. A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments. Preprints 2024, 2024070772. https://doi.org/10.20944/preprints202407.0772.v1 Ogwara, N. O.; Petrova, K.; Yang, M. L. (.; MacDonell, S. G. A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments. Preprints 2024, 2024070772. https://doi.org/10.20944/preprints202407.0772.v1

Abstract

Mobile devices (MD) are used by mobile cloud computing (MCC) customers users because of their 11 portability and robust connectivity and the ability to house and operate third-party applications 12 (apps). However, the apps installed on a MD may pose data security risks to the MD owner and to 13 other MCC users, especially when the requested permissions include access to sensitive data (e.g., 14 user’s location and contacts). Calculating the risk score of an app or quantifying its potential 15 harmfulness based on user input or on data gathered while the app is actually running may not 16 provide reliable and sufficiently accurate results to avoid harmful consequences. This study 17 develops and evaluates a risk assessment framework for Android-based MDs that does not depend 18 on user input or on actual app behaviour. Rather, an app risk evaluator assigns a risk category to 19 reach resident app based on the app’s classification (benign or malicious) and the app’s risk score. 20 The app classifier (a trained machine learning model) considers the permissions and the intents 21 requested by the app. The apps risk score is calculated by a probabilistic function based on the 22 app’s use of a set of selected dangerous permissions. The results from the testing of an instance of 23 the framework on a MD with real-life resident apps indicated that the proposed security solution 24 was effective and feasible.

Keywords

mobile cloud computing; security threats; risk assessment; mobile device; mobile 26 application; application security; data protection; machine learning; ensemble model

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.