SECURITY MECHANISMS AND ANALYSIS FOR INSECURE DATA STORAGE AND UNINTENDED DATA LEAKAGE FOR MOBILE APPLICATIONS

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 8

Abstract

Using one mobile programming language like Objective-C, Swift or Java is challenging enough because of the many things that need to be considered from a security point of view, like the programming language secure guidelines and vulnerabilities. With the introduction of Swift in 2014 it’s now possible to build Swift/Objective-C mobile applications. Building a mobile application using two languages also adds a greater attack surface for hackers because of the need for developers to stay up to date on vulnerabilities on more than one language and operating system.To our best knowledge, since as of today, there is no academic-research based effort comparing Swift, Objective-C and Android from a programming language and platform security point of view. Our comparative analysis covers a subset of OWASP top ten mobile vulnerabilities and seeing how Swift, Objective-C and Android programming languages safeguard against these risks and how the built-in platform security mechanisms for Android and Apple for the chosen subset of OWASP vulnerabilities compare when placed side-by-side.

Authors and Affiliations

Vanessa M. Santana, Paolina Centonze

Keywords

Related Articles

Enhanced Cloud Computing Framework to Improve the Educational Process in Higher Education: A case study of Helwan University in Egypt

Cloud Computing (CC) becames the most promising technology to reach the advanced educational services, because it essentially provides a huge computing and storage capacities. Cloud computing provides reliable and tailor...

Evaluating the Effectiveness of Self and Peer Assessment using PBL on Student Performance and Preference: Malaysians Experience

This paper reports on the effectiveness of students performances between self and peer assessment based on students preferences. A total of 56 respondents from the second year of study at UTeM who enrolled for the Human...

Implementation and Evaluation of Rule Induction Algorithm with Association Rule Mining: A study in life insurance

Data Mining: extracting useful insights from large and detailed collections of data. With the increased possibilities in modern society for companies and institutions to gather data cheaply and efficiently, this subject...

MOBILE AGENT APPLICATION DEVELOPMENT IN A SIMPLE JAVA-BASED MOBILE AGENT SYSTEM (SIMMAS)

As network information resources grew in size, it was most efficient to process queries and updates at the site where the data was located. The processing accomplished by a traditional client-server network interface con...

TFCWS: Testing Framework for composite web services.

In every business domain Web Services are more popular solutions to implement the software. Composite web service can be created by combining basic web services. Many unreliable web services are deployed on the internet....

Download PDF file
  • EP ID EP650858
  • DOI 10.24297/ijct.v15i8.3754
  • Views 92
  • Downloads 0

How To Cite

Vanessa M. Santana, Paolina Centonze (2016). SECURITY MECHANISMS AND ANALYSIS FOR INSECURE DATA STORAGE AND UNINTENDED DATA LEAKAGE FOR MOBILE APPLICATIONS. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 15(8), 7008-7020. https://europub.co.uk./articles/-A-650858