Google Play Store: Analysis of App Verification and Security Gaps

Verified

Added on  2021/02/20

|8
|2437
|63
Report
AI Summary
This report delves into the Google Play Store's app verification process, highlighting significant gaps in the current system that allow fake and malicious applications to proliferate. The study emphasizes the importance of data management and the use of information systems to analyze app data, identify vulnerabilities, and enhance user data protection. The report examines the current methods used by the Google Play Store to verify apps, finding that the lack of rigorous verification processes, including the absence of app certification, leads to data breaches and security risks. It suggests implementing information system techniques, improving documentation, and enhancing verification processes to identify and eliminate fake apps, thereby protecting user data and improving the overall security of the platform. The report also analyzes various methodologies used to gather data, including interviews with IT administrators, and proposes strategies to address the existing gaps in the Google Play Store's app verification procedures.
Document Page
GOOGLE PLAY STORE
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract
It has been described in study the main base of google play store is data. They are having a
large database which stores, analyse, etc. data and info. Currently, there are many fake apps
which is available on play store. In report it is discussed about the gap that exists in google play
store. The apps are not been verified and certified by them. The report is prepared to analyze
how this gap can be reduced, what current techniques are been used by play store to verify apps.
Moreover, at last it is explained about what effective business strategy for addressing gap.
Document Page
Table of Contents
Abstract............................................................................................................................................2
Literature review..............................................................................................................................1
Methodology....................................................................................................................................3
Method followed..............................................................................................................................3
Results..............................................................................................................................................3
Discussion........................................................................................................................................4
REFERENCES................................................................................................................................5
Document Page
Literature review
In present time data and information is the main thing that a company needs to store and
maintain. This is because by analysing data it is easy to identify users, applications used by them,
etc. also, and many organisations is using third parties to store and manage data. The parties
provide large dataset which help in storing of info. This makes it easy for them to analyze data
and use it in appropriate way. As said by Albrecht, Hasenfuß and von Jan, 2018, with
advancement in technology it has become important for large companies like Google to store and
manage their data. Also, google play store manage and keep a large data set which enable in
analysing and storing of all applications info. It also stores data and info of users, reviews, errors,
etc. that are occurring in different apps. Moreover, it uses Bigtable dataset to store data. The app
developers and user register themselves to download app. It is important for company to manage
and store dataset in proper way so that it is not stolen. Furthermore, it is essential to understand
how app works and maintain database of review management. Data management is main
component through which user data is protected and stored in effective way. As elucidated by ()
the fake app produces bugs to steal user info. In play store there are many other application as
well that are verified but still it is fake. This is also a major gap that needs to be addressed. The
reason behind is lack of authenticity in process and certificate. So, developer can easily upload it
on play store and access user info.
Williams and Mahmoud, 2018, stated that google play store is official platform from where
app are downloaded. It includes N numbers of applications. However, each app is verified by
google. It follows a systematic process of verifying app. They are responsible for authentication
of app as well. There occur several types of frauds in application. The frauds are malware, virus,
ransomware, etc. through which user data and info is hacked. In such cases a user is not able to
identify whether it is authentic or not. They click on it on app. Major frauds are occurred within
app. So, the company is responsible for finding out those fake apps.
There are various techniques or ways that can be used by business to verify fake app. Here,
with implementation of IS the app URL can be checked. The app can be downloaded and any
malicious activity is recognised. With this measure or action can be taken to remove app from
play store. If URL of app is checked it shows that whether it is authentic or not. There is another
solution which can be used by google play store. They can execute a new practice where all
documents of developer and user is identified. The overall app information can be gathered such
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
as bug, pop ups, data usage, etc. and then it can be analyzed. This will help in making things
easy and checking authenticity of app.
According to Effendi and et.al., 2019, in recent times it has been identified that there are
many apps in google play store that are fake and steal user personal data and info. Alongside it,
there is a gap in play store due to which developers are able to sell fake apps. The gap has
occurred because google is not verifying the authenticity of app. They are not checking whether
app is authentic or not and allowing developer to sell it. The apps are not certified which is
resulting in data loss or security issues of user information. However, developers are easily
hacking data user info. The fake apps are leading to malicious activities on play store. This is
major issue which needs to be addressed. The GUI attacks on app background leads to data
access. It happens when user clicks on any particular app button. Due to rise in fake apps
company brand image is decreasing. They are facing difficulty to control and reduce fake apps.
Many users are complaining about data been stolen. They are giving bad reviews on play store
regarding it. google is not addressing that issue as they are not verifying app properly. However,
in spite of taking measures fake apps are not removed.
In order to manage data IS is been used. The information systems consist of various ICT
tools to interact with people and support in business process. There are many types of IS
available consisting of unique features. For example- TPS, MIS, etc. They are used by
organisation on basis of their purpose. It enables in managing data and information through an
effective process. Beside this, technological advancement has integrated AI with IS. so, it has
become easy for company to implement and use IS.
As elucidated by AlSubaihin and et.al., 2019, with passage of time technology advancement
taking place at rapid pace. In many nations internet packs are very costly. Due to this reason,
data saver or data management applications were developed by developers. They are been used
by large companies to manage data of user. A user download app from play store directly. For
using that app user has to sign in by entering essential details. Therefore, in fake app user details
are directly stored in database. So, the hacker can easily steal data from it. There is need to find
out fake apps by gathering data and info. From it, data is managed in segregated way. Also, the
data of each app will be stored, utilized and analyzed. Then, accordingly app verification is done.
google pay store data management stores data of various applications, user info, developer info,
reviews, etc. However, many times data management support in utilizing app data.
2
Document Page
Methodology
In order to address the issue there is certain method which is followed. Here, google play
store data management process was analyzed. Moreover, the reviews of people related to app
were evaluated. This enabled in finding out that what are the reasons due to which user data and
info is stolen. Moreover, for gathering data the google play store data management and interview
of IT administrators is taken. This was done to get in depth information about how google play
stores works and app are verified (Özeke, 2018). Beside this, google cloud was used to get data
of different apps available and how data is stored by google. Alongside, various users were asked
questions about use of app and what malicious activities were observed by them. By this it is
easy to identify issue in google play store. This method enabled in collecting in depth data from
various sources. The questions were as follows –
What are issues been faced by google play store?
What is the current process used by them to verify applications developed by developers?
What strategy or technique can be applied to address gap?
Method followed
The data and information related to issue is required to analyze it and generate outcomes.
Also, data collected should be authentic so that results are easily interpreted. Similarly, the
results were attained by analysing data set and collecting information from it. Also, different data
server applications were used to evaluate data of google play store. It enabled in gathering broad
information about different apps and facts and figure were developed. Furthermore, by
interpreting answers of IT administrators through interview results were attained. Also, open
ended questions were asked to them regarding registration process and how app is certified by
google.
Results
From above it can be identified that there are many apps available on google play store.
Each app is verified by google and uploaded on it. But not all apps are certified by google,
instead they are only just approved. So, due to this fake app are easily able to access user data
and information (Jha and Mahmoud, 2018). Apart from it, on various apps users are facing
malicious activities thus leading to accessing their personal data. The data administrator said that
3
Document Page
google play store only approve app and do not verify it. Also, they do not give any type of
certificate to those apps and directly upload it on play store. Thus, due to unauthenticated of apps
there are many fake apps been uploaded on play store. Therefore, it is resulting in access of user
data. Also, it is identified from results that the GUI attacks are stealing user data. These apps run
on background of app after user clicks it. So, it is also an issue faced by google play store.
The data administrator stated that to address gap of unauthenticated app google play store
needs to develop strategy. For this they can use information system technique that will help in
maintaining authenticity of app. Besides this, IS will enable in identifying any malicious activity
or fake application. The IS can store and manage data in proper way. By this it will be easy to
reduce number of fake apps and remove them from database. IS is useful tool that integrate
database, app, etc. It has also been useful in storing of user data and info in effective way.
Discussion
It is analyzed that there are certain gaps in google play store due to which user personal data
and information is stolen. This is because of not certification and verification of Apps uploaded
by developer. Apart from it, the authenticity of app is not checked. Also, many times user
observes malicious activity on apps (Edelman, 2015). IS technique can be used to identify and
eliminate fake apps. With help of it, google play store can modify verification process. IS will
help in finding out unwanted activities and analysing app data with it. However, documentation
of providing certificate to app can be improved. It will support in gathering app data from
database and then verifying authenticity of app.
In order to reduce gap google play store can use information system technique. It will enable
in verifying app and making it authentic to ensure it is safe for user to use that app. Also, with
help of IS data of all app and user is stored in proper way. It will benefit in identifying any
malicious activity and taking appropriate measure. By using IS data can be stored and managed.
However, google is only providing approvals to developers to upload their app on play store. It is
making it easy to upload various types of app on play store easily. So, it supports finding out any
error or pop ups that appear on play store.
Thus, by implementing both methods google play store will be able to identify fake apps and
removing them. Moreover, they can address gap and decrease number of fake apps registered.
Also, with this activities such as virus, ransomware, phishing, etc. can be detected and user are
aware about it.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
REFERENCES
Books and Journals
Albrecht, U.V., Hasenfuß, G. and von Jan, U., 2018. Description of cardiological apps from the
German app store: semiautomated retrospective app store analysis. JMIR mHealth and
uHealth, 6(11), p.e11753.
AlSubaihin, A. and et.al., 2019. App store effects on software engineering practices. IEEE
Transactions on Software Engineering.
Edelman, B., 2015. Does Google leverage market power through tying and bundling?. Journal of
Competition Law & Economics, 11(2), pp.365-400.
Effendi, T.D. and et.al., 2019, May. Educational Content Analysis of The Most Popular Game in
Android Application Based on Play Store Version. In 2nd International Conference on
Arts and Culture (ICONARC 2018). Atlantis Press.
Jha, N. and Mahmoud, A., 2018. Using frame semantics for classifying and summarizing
application store reviews. Empirical Software Engineering, 23(6), pp.3734-3767.
Özeke, V., 2018. Evaluation of Educational Mobile Apps for Turkish Preschoolers from Google
Play Store. Online Submission, 4(4), pp.238-259.
Williams, G. and Mahmoud, A., 2018, August. Modeling user concerns in the app store: a case
study on the rise and fall of yik yak. In 2018 IEEE 26th International Requirements
Engineering Conference (RE) (pp. 64-75). IEEE.
5
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]