A Comparative Study of User Data Security and Privacy in Native and Cross Platform Android Mobile Banking Applications

Author(s):  
Edward Danso Ansong ◽  
Thomas Quansah Synaepa-Addision
Author(s):  
Latifa Er-Rajy ◽  
M. Ahmed El Kiram

In the past, banking took place only inside bank rooms, which was a task for customers and bankers at the same time. But in our day, thanks to the high-speed development and growth of mobile technology, the mobile phone platform had the power to create great opportunities for customers of the physical bank due to its capabilities and coverage of the population; this can be proved by the number of mobile subscriptions that approximates the world population figures. In order to explore these opportunities, most banks have already launched their mobile apps or have redesigned the mobile version of their websites. Among the advantages of using mobile banking is that users have the ability to make banking transactions, online payments or transfers, anywhere and at any time. In this article, we investigated the danger of the permissions requested by mobile banking applications, their effects on sensitive user data and their relationship with the attack called “Man in the middle” and its different forms. We took Morocco as a case of study.


2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Dawei Jiang ◽  
Guoquan Shi

With the close integration of science and technology and health, the broad application prospects of healthy interconnection bring revolutionary changes to health services. Health and medical wearable devices can collect real-time data related to user health, such as user behavior, mood, and sleep, which have great commercial and social value. Healthcare wearable devices, as important network nodes for health interconnection, connect patients and hospitals with the Internet of Things and sensing technology to form a huge medical network. As wearable devices can also collect user data regardless of time and place, uploading data to the cloud can easily make the wearable device’s system vulnerable to attacks and data leakage. Defects in technology can sometimes cause problems such as lack of control over data flow links in wearable devices, and data and privacy leaks are more likely to occur. In this regard, how to ensure the data security and user privacy while using healthcare wearable devices to collect data is a problem worth studying. This article investigates data from healthcare wearable devices, from technical, management, and legal aspects, and studies data security and privacy protection issues for healthcare wearable devices to protect data security and user privacy and promote the sustainable development of the healthcare wearable device industry and the scientific use of data collection.


2020 ◽  
Vol 17 (5) ◽  
pp. 2243-2247
Author(s):  
A. Siva Kumar ◽  
S. Godfrey Winster

The Portent of data security in cloud setting is well studied. There are number of approaches has been discussed for the data security in multi cloud environments. The previous methods suffer to achieve higher performance in data security and privacy preservation. To improve the performance, an attribute level trusted access measure is presented. The method classifies the user data into several classes and for each class of attributes different access restriction has been enforced. The access between different cloud has been restricted based on the attribute level trusted access measure (ALTAM). The ALTAM measure for each request has been estimated based on the depth of privacy has been accessed by the request and the number of data values the user has access in the cloud and outside the cloud. Based on all these the method estimates the trust measure. According to the trust measure, the method restrict the access of data in multi cloud environments. The method produces efficient result in access restriction and privacy preservation.


Author(s):  
Latifa Er-Rajy ◽  
M. Ahmed El Kiram

In the past, banking took place only inside bank rooms, which was a task for customers and bankers at the same time. But in our day, thanks to the high-speed development and growth of mobile technology, the mobile phone platform had the power to create great opportunities for customers of the physical bank due to its capabilities and coverage of the population; this can be proved by the number of mobile subscriptions that approximates the world population figures. In order to explore these opportunities, most banks have already launched their mobile apps or have redesigned the mobile version of their websites. Among the advantages of using mobile banking is that users have the ability to make banking transactions, online payments or transfers, anywhere and at any time. In this article, we investigated the danger of the permissions requested by mobile banking applications, their effects on sensitive user data and their relationship with the attack called “Man in the middle” and its different forms. We took Morocco as a case of study.


Author(s):  
Sultan Y. As-Sultan ◽  
◽  
Ibrahim Ahmed Al-Baltah ◽  
Fua’ad Hassan Abdulrazzak ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document