TY - JOUR AU - Rahul Koti, Mrs. D.A. Phalke(Guide), Sharan Shetty,Nitin Ranjan, Aditya Sharma Aman Prakash Singh, AU - (Co-Guide), Mr. Rahul Pawar PY - 2015/11/28 Y2 - 2024/03/29 TI - Surveying Smartphone Security for Linux Powered Devices JF - International Journal of Engineering and Computer Science JA - int. jour. eng. com. sci VL - 4 IS - 11 SE - Articles DO - UR - http://ijecs.in/index.php/ijecs/article/view/2888 SP - AB - <p>In this era of Globalization, &nbsp;the extensive use of SmartPhones in our&nbsp; day-to-day &nbsp;life has become a very important factor. &nbsp;According &nbsp;to surveys,&nbsp; nearly &nbsp;0.8 of the SmartPhone industry &nbsp;is dominated &nbsp;by Android. &nbsp;Therefore, the &nbsp;issue &nbsp;of &nbsp;Security &nbsp;and &nbsp;Privacy &nbsp;of &nbsp;the &nbsp;User &nbsp;becomes a &nbsp;crucial &nbsp;factor &nbsp;to &nbsp;be &nbsp;taken &nbsp;care &nbsp;of. &nbsp;Since, &nbsp;Android&nbsp; &nbsp;is an &nbsp;Open-Source&nbsp; &nbsp;Platform,&nbsp; &nbsp;the &nbsp;scope &nbsp;of&nbsp; resolving &nbsp;issues like this becomes easy and effective with the help of applications &nbsp;designed &nbsp;by programmers around the&nbsp; globe. Smartphones running&nbsp; on &nbsp;Android&nbsp; &nbsp;OS &nbsp;have &nbsp;an &nbsp;in-built password &nbsp;detection mechanism&nbsp; (character/pattern/gesture) which helps in differentiating between real user from unknown&nbsp; &nbsp;user. &nbsp;Also, &nbsp;the &nbsp;proposed&nbsp; &nbsp;system &nbsp;are &nbsp;designed to &nbsp;work &nbsp;with &nbsp;their&nbsp;&nbsp; own &nbsp;perspective&nbsp; &nbsp;to &nbsp;meet &nbsp;the &nbsp;users demands&nbsp; &nbsp;and&nbsp; &nbsp;this&nbsp; &nbsp;done&nbsp; &nbsp;with&nbsp;&nbsp; the&nbsp; &nbsp;help&nbsp; &nbsp;of &nbsp;pre-defined sensors &nbsp;which &nbsp;are &nbsp;thoroughly&nbsp; &nbsp;elaborated &nbsp;after&nbsp;&nbsp; a &nbsp;lot &nbsp;of search.&nbsp; &nbsp;In &nbsp;this &nbsp;paper,&nbsp; &nbsp;A &nbsp;survey&nbsp; &nbsp;of &nbsp;the &nbsp;research &nbsp;done by &nbsp;the &nbsp;predecessors &nbsp;on &nbsp;related subject &nbsp;to&nbsp; provide &nbsp;better security and to overcome this breach &nbsp;of privacy. Now while discussing the security&nbsp; measures, &nbsp;The system can possibly assume&nbsp; that &nbsp;under &nbsp;a certain &nbsp;type of scenario &nbsp;an intruder may try to access valuable information of the user without his knowledge &nbsp;and &nbsp;when &nbsp;faced &nbsp;with &nbsp;a password &nbsp;barrier, the &nbsp;intruder may &nbsp;try &nbsp;to &nbsp;bypass &nbsp;it &nbsp;by &nbsp;entering&nbsp;&nbsp; another password, &nbsp;and &nbsp;if the&nbsp; password &nbsp;is wrong &nbsp;it may &nbsp;result in multiple failed attempts. &nbsp;So there has to be certain &nbsp;solution to&nbsp; detect &nbsp;this &nbsp;breach &nbsp;and &nbsp;if possible &nbsp;overcome &nbsp;it.&nbsp; Along with this, the proposed &nbsp;system should&nbsp; make &nbsp;sure &nbsp;that &nbsp;the application consumes &nbsp;least &nbsp;amount&nbsp;&nbsp; of&nbsp; battery and &nbsp;uses minimum &nbsp;amount &nbsp;of system memory.</p> ER -