Abstract
Android applications (called apps) are an integral part of our digital lives, with an ever-growing user base generating massive amounts of data every day. Despite privacy measures in place, such as the Android permission model, there persists a significant privacy concern due to factors like centralized data storage and lack of transparency. This paper presents a novel approach to enhance privacy preservation in Android platforms, focusing specifically on managing ’dangerous’ permissions related to sensitive health data. We propose a hybrid architecture that combines traditional data processing for regular data with a blockchain-based system for handling sensitive data, thus offering enhanced security, transparency, and user control. Our detailed evaluation using Ethereum Virtual Machine (EVM) compatible platforms (i.e., BNB, Fantom, Celo, and Matic) shows the feasibility and effectiveness of our approach, with the Fantom platform proving the most suitable due to its low transaction cost and optimal gas limit. We acknowledge that the successful implementation of our proposed solution relies on stakeholder acceptance. Therefore, we outline strategies for convincing both service providers and Android OS producers to consider this transformative approach. This paper offers a pioneering view into using blockchain technology to address the persistent privacy concerns in the Android app ecosystem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
- 15.
Our implementation models were released on 11/24/2022, 8:44:53 AM UTC.
- 16.
- 17.
- 18.
- 19.
- 20.
The proof-of-concept of our proposed model is available in https://github.com/SonHaXuan/medical-record-Blockchain-NFT.
References
Al-Natour, S., et al.: An empirical investigation of the antecedents and consequences of privacy uncertainty in the context of mobile apps. Inf. Syst. Res. 31(4), 1037–1063 (2020)
Alazab, M., et al.: Intelligent mobile malware detection using permission requests and API calls. Futur. Gener. Comput. Syst. 107, 509–521 (2020)
Balasubramanium, S., et al.: A survey on data privacy and preservation using blockchain in healthcare organization. In: International Conference on Advance Computing and Innovative Technologies in Engineering, pp. 956–962. IEEE (2021)
Bandara, E., et al.: A blockchain and self-sovereign identity empowered digital identity platform. In: 2021 International Conference on Computer Communications and Networks (ICCCN), pp. 1–7. IEEE (2021)
Chen, S., et al.: AUSERA: automated security vulnerability detection for android apps. In: 37th IEEE/ACM International Conference on Automated Software Engineering, pp. 1–5 (2022)
Chen, Z., et al.: A blockchain-based preserving and sharing system for medical data privacy. Futur. Gener. Comput. Syst. 124, 338–350 (2021)
Enck, W., et al.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Trans. Comput. Syst. (TOCS) 32(2), 1–29 (2014)
Fan, M., et al.: An empirical evaluation of GDPR compliance violations in android mHealth apps. In: 2020 IEEE 31st international symposium on software reliability engineering (ISSRE), pp. 253–264. IEEE (2020)
Hankerson, D., et al.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2006)
Haupert, V., Maier, D., Schneider, N., Kirsch, J., Müller, T.: Honey, i shrunk your app security: the state of android app hardening. In: Giuffrida, C., Bardin, S., Blanc, G. (eds.) DIMVA 2018. LNCS, vol. 10885, pp. 69–91. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93411-2_4
Le, N.T.T., et al.: Assuring non-fraudulent transactions in cash on delivery by introducing double smart contracts. Int. J. Adv. Comput. Sci. Appl. 10(5), 677–684 (2019)
Mia, M.R., et al.: A comparative study on HIPAA technical safeguards assessment of android mHealth applications. Smart Health 26, 100349 (2022)
Sengupta, A., et al.: User control of personal mhealth data using a mobile blockchain app: design science perspective. JMIR mHealth uHealth 10(1), e32104 (2022)
Son, H.X., Carminati, B., Ferrari, E.: A risk assessment mechanism for android apps. In: 2021 IEEE International Conference on Smart Internet of Things (SmartIoT), pp. 237–244. IEEE (2021)
Son, H.X., Carminati, B., Ferrari, E.: PriApp-install: learning user privacy preferences on mobile apps’ installation. In: Su, C., Gritzalis, D., Piuri, V. (eds.) ISPEC 2022. LNCS, vol. 13620, pp. 306–323. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-21280-2_17
Son, H.X., Carminati, B., Ferrari, E.: A risk estimation mechanism for android apps based on hybrid analysis. Data Sci. Eng. 7(3), 242–252 (2022)
Son, H.X., et al.: In2P-med: toward the individual privacy preferences identity in the medical web apps. In: Garrigós, I., Murillo Rodríguez, J.M., Wimmer, M. (eds.) ICWE 2023. LNCS, vol. 13893, pp. 126–140. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-34444-2_10
Talha, K.A., et al.: APK auditor: permission-based android malware detection system. Digit. Investig. 13, 1–14 (2015)
Xiao, J., et al.: An android application risk evaluation framework based on minimum permission set identification. J. Syst. Softw. 163, 110533 (2020)
Zhang, H., et al.: Protecting data in android external data storage. In: 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 924–925. IEEE (2019)
Zheng, Z., et al.: Blockchain challenges and opportunities: a survey. Int. J. Web Grid Serv. 14(4), 352–375 (2018)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Khiem, H.G. et al. (2023). Applying Blockchain Technology for Privacy Preservation in Android Platforms. In: Zhang, Y., Zhang, LJ. (eds) Web Services – ICWS 2023. ICWS 2023. Lecture Notes in Computer Science, vol 14209. Springer, Cham. https://doi.org/10.1007/978-3-031-44836-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-44836-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-44835-5
Online ISBN: 978-3-031-44836-2
eBook Packages: Computer ScienceComputer Science (R0)