Abstract
The growth of “smart” mobile devices, such as smartphones and tablets, has been exponential over the past few years. Such growth was mainly attributed to the development of mobile applications. To date, mobile applications have been increasingly used to improve our productivity and also to provide the entertainment contents. However, with a huge number of mobile applications that appear in the application stores; in particular those that provide similar functionalities, users are often confused with the selection of trustworthy and high quality mobile applications. At the current state, there is a limited research embarked to provide solutions for measuring the trustworthiness of mobile applications prior to download. Thus, the aims of this paper are to review the current research in this area and to discuss several issues in measuring the trustworthiness of mobile applications. In addition, this paper also proposes MobilTrust, a similarity trust measurement method to solve the identified issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
International Telecommunication Union (ITU), ITU estimates two billion people online by end 2010, Access to mobile networks available to over 90% of world population 143 countries offer 3G services, Press Release Report (2010), viewed at http://www.itu.int/net/pressoffice/press_releases/2010/39.aspx
PRB, 2010 World Popilation Data Sheet (2010), http://www.prb.org/publications/datasheets/2010/2010wpds.aspx
IDC Research, Worldwide Smartphone 2012-2016 Forecast and Analysis, Research report (2012), http://marketresearch.com .
Apple, Apple Application Store (2012), http://itunes.apple.com/us/genre/ios/id36?mt=8
Google Play, Android Google Play (2012), https://play.google.com/store?hl=en
BusinessInsider, Number of Apps Available at Smartphones’ Apps Stores (2011), viewed at http://articles.businessinsider.com/2011-03-09/tech/30011803_1_app-store-google-s-android-market-twitter
Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications [IEEE Communications Surveys and Tutorials, Fourth Quarter] (2000), http://www.comsoc.org/pubs/surveys/
Josang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provisioning. Decision Support System 43, 618–644 (2007)
Osborne, C.: IOS Apps: Massive invasion of user privacy, ZDNet news (2012), http://www.zdnet.com/blog/igeneration/ios-apps-massive-invasion-of-user-privacy/15138
Lowenshon, J.: Congress probing iOS developers on user privacy, address books, CNet news (2012), http://news.cnet.com/8301-27076_3-57402957-248/congress-probing-ios-developers-on-user-privacy-address-books/
Enck, W., Gilbert, P., Chun, B.-G.: Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones (2010)
Smith, E.: iPhone applications & privacy issues: An analysis of application transmission of iPhone unique device identifiers (UDIDs), http://www.kompatscher.biz/phocadownload/iPhone-Applications-Privacy-Issues.pdf
Ferro, G.: BYOD Policies vs. the Realities of Corporate IT, NetworkComputing.com, http://www.networkcomputing.com/wireless/240000916
CoreGrid, D.IA.03 Survey Material on Trust and Security, European Research Network on Foundations, Software Infrastructures and Applications for large scale distributed, GRID and Peer-to-Peer Technologies, Technical Paper (2004)
Rasmusson, L., Janssen, S.: Simulated Social Control for Secure Internet Commerce. In: Proceedings of the 1996 New Security Paradigms Workshop, Lake Arrowhead, CA, USA (1996)
University of Pennsylvania, TM/RM Simulator (March 2012), http://rtg.cis.upenn.edu/qtm/p2psim.php3
Benats, G., Bandara, A., Yu, Y., Colin, J., Nuseibeh, B.: PrimAndroid: Privacy Policy Modelling and Analysis for Android Applications. Presented at 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy (2011)
Dellarocas, C.: Immunizing Online Reputation Reporting Systems against Unfair Ratings and Discriminatory Behavior. In: The Proceedings of Second ACM Conf. Electronic Commerce (2000)
Cydia Market, http://cydia.saurik.com/
Kerschbaum, F., Haller, J., Karabulut, Y., Robinson, P.: PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 193–205. Springer, Heidelberg (2006)
Ion, M., Danzi, A., Koshutanski, H., Telesca, L.: A Peer-to-Peer Multidimensional Trust Model for Digital Ecosystems. Presented at the Second IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2008), Phitsanulok, Thailand (2008)
Schmidt, S., Steele, R., Dillon, T.: DEco Arch: Trust and Reputation Aware Service Brokering Architecture in Digital Ecosystems. Presented at the Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST), Cairns, Australia (2007)
Singh, A., Liu, L.: TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems. Presented at the Third International Conference on Peer-to-Peer Computing, Sweden (2003)
Xiong, L., Liu, L.: Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16, 843–857 (2004)
Damiani, E., Vimercati, S.: Managing and Sharing Servents’ Reputations in P2P Systems. IEEE Transactions on Knowledge and Data Engineering 15, 840–854 (2003)
Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. Presented at the 12th ACM International Conference on World Wide Web, USA (2003)
Jøsang, A., Hayward, R., Pope, S.: Trust Network Analysis with Subjective Logic. In: Proceedings of the 29th Australasian Computer Science Conference (2006)
Sabater, J., Sierra, C.: REGRET: A reputation model for gregarious societies. In: Proceedings of the Fifth International Conference on Autonomous Agents, Montreal, Canada (2001)
Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Travos: Trust and reputation in the context of inaccurate information sources. Journal of Autonomous Agents and Multi-Agent Systems 12 (2006)
Josang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Electronic Commerce Conference (2002)
Entrust: The concept of trust in network security, Version 1.2 [White Paper] (2000, April 2011), http://www.entrust.com/resources/pdf/trust.pdf
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems (2005) (to appear)
Apple, What’s an Apple ID?, https://appleid.apple.com/cgi-bin/WebObjects/MyAppleId.woa/
Google, Google Accounts, http://www.google.com/intl/en/landing/accounts/index.html#utm_campaign=en&utm_medium=et&utm_source=gaia
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Pranata, I., Athauda, R., Skinner, G. (2013). Determining Trustworthiness and Quality of Mobile Applications. In: Borcea, C., Bellavista, P., Giannelli, C., Magedanz, T., Schreiner, F. (eds) Mobile Wireless Middleware, Operating Systems, and Applications. MOBILWARE 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 65. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36660-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-36660-4_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36659-8
Online ISBN: 978-3-642-36660-4
eBook Packages: Computer ScienceComputer Science (R0)