Mobile Platform: Android Content Provider Application Report

Verified

Added on  2020/03/16

|4
|462
|313
Report
AI Summary
This report delves into the concept of Android Content Providers, which are essential for data sharing within mobile applications. The report highlights the significance of Content Providers in Android development, emphasizing their role in providing a consistent interface for accessing and managing data, similar to databases. It covers the use of Content Providers for core functions such as adding, deleting, querying, and editing data. The report discusses the resources used, including research papers on Android security, forensic analysis, and permission-based security models. The provided resources explore topics like application-layer privilege escalation attacks, passive content leaks, and the importance of data security in mobile applications. The report also includes references to several research papers and articles that delve into the specifics of Android application security, forensic analysis, and content provider implementations. Overall, the report offers insights into the functionality and security implications of Content Providers in the Android ecosystem.
Document Page
Running head: E-PORTFOLIO
Application Development for Mobile Platforms
Week 6: Content Providers
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Summary of the Lecture
The objectives of this lecture were to share the data in Android and utilize a content
provider. Content providers are the suggested approach of sharing data in the Android
application. Content providers provide a consistent interface and a logical programming interface
across all the Android applications. Content providers provide much the same services as
databases like add, delete, query, edit. The basic content providers are the Browser, Call Log,
Contacts, Media Store and Settings. The content provider can be utilized by following several
steps like ManagedQuery(), CursorLoader().
Links of the Resources
1. http://www.icri-sc.org/fileadmin/user_upload/Group_TRUST/PubsPDF/droidauditor_tr.pdf
2. https://www.internetsociety.org/sites/default/files/02_3_0.pdf
3. https://www.theseus.fi/bitstream/handle/10024/112009/Vepsalainen%20Aleksi.pdf?
sequence=1
4. http://scholarworks.rit.edu/cgi/viewcontent.cgi?article=5389&context=theses
5. http://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=3531&context=sis_research
Explanation of Resources
1. This resource describes about the droid auditor or the forensic analysis of the application layer
privilege attacks on android. This resource describes the utilization of a content provider and the
sharing of data.
Document Page
2. This resource describes the security and sharing of confidential data and to detect the intrusion
for those attacks in android applications.
3. This particular resource describes about the security of applications in the mobile phones for
any Android version.
4. This resource describes about the popularity of android smart phones and their
implementations. The resource also describes about the basic concept of content providers.
5. This particular resource describes about the permission based android security. It also
describes the problems and counter measures.
Document Page
References
Fang, Z., Han, W. and Li, Y., 2014. Permission based Android security: Issues and
countermeasures. computers & security, 43, pp.205-218.
Grover, J., 2013. Android forensics: Automated data collection and reporting from a mobile
device. Digital Investigation, 10, pp.S12-S20.
Heuser, S., Negro, M., Pendyala, P.K. and Sadeghi, A.R., 2016, January. DroidAuditor: Forensic
Analysis of Application-Layer Privilege Escalation Attacks on Android. In Proceedings of the
20th International Conference on Financial Cryptography and Data Security.
Jiang, Y.Z.X. and Xuxian, Z., 2013, February. Detecting passive content leaks and pollution in
android applications. In Proceedings of the 20th Network and Distributed System Security
Symposium (NDSS).
Vepsäläinen, A., 2016. Application security: In Android application development.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]