UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 10 Issue 5
May-2023
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2305B80


Registration ID:
517624

Page Number

l582-l585

Share This Article


Jetir RMS

Title

A Review on Database Security Techniques used in Android Operating System

Abstract

With increased growth in mobile technology the use of mobile devices has increased eventually. As a result, mobile devices have become portable storage that stores the user information including personal as well as business related. The huge amount of data generated and stored by mobile devices is due to large usage of mobile devices in day-to-day life. Currently, the Android operating system is one of the major operating systems in the mobile phone market, which stores user data on local storage inside the database. When an android device is unlocked the data in the device is easily accessible to anyone because android stores data in the form of plaintext. This paper focuses on the detailed review of the different android techniques of database security, an overview of different security attacks on android devices. Also, explains the different techniques for similarity comparison of applications.

Key Words

Android Database Security, Attacks, Application Similarity Comparison, Encryption, Decryption

Cite This Article

"A Review on Database Security Techniques used in Android Operating System", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.10, Issue 5, page no.l582-l585, May-2023, Available :http://www.jetir.org/papers/JETIR2305B80.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"A Review on Database Security Techniques used in Android Operating System", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.10, Issue 5, page no. ppl582-l585, May-2023, Available at : http://www.jetir.org/papers/JETIR2305B80.pdf

Publication Details

Published Paper ID: JETIR2305B80
Registration ID: 517624
Published In: Volume 10 | Issue 5 | Year May-2023
DOI (Digital Object Identifier):
Page No: l582-l585
Country: Kolhapur, Maharashtra, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00050

Print This Page

Current Call For Paper

Jetir RMS