IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 05 Special Issue: 04 | ICESMART-2016 | May-2016, Available @ http://www.esatjournals.org 110 COMPREHENSIVE OVERVIEW ON SECURITY SOLUTIONS FOR MOBILE DEVICES Annie Sujith 1 , Chitra S Nair 2 , Salonee Mishra 3 , Manjusha Kulkarni 4 1 Assistant Professor, Department of CSE, T. John Institute of Technology, Karnataka, India 2 Assistant Professor, Department of CSE, T. John Institute of Technology, Karnataka, India 3 Assistant Professor, Department of CSE, T. John Institute of Technology, Karnataka, India 4 Assistant Professor, Department of CSE, T. John Institute of Technology, Karnataka, India Abstract “A smartphone is a mobile phone with an advanced mobile operating system which combines features of a personal computer and more important is its size, advanced processing capability as well as connectivity capabilities, smaller cost, and their ability to connect multi-purpose third party or devices applications. Smartphone’s are in high demands in both office and private work”. Use of android permission-based security model makes the application access to device resources very difficult. The main drawback is that users cannot have adequate control over the device and also it does not provide information how third party applications uses personal data of users. While installing applications and getting permission warnings users are unable to take right security decisions.This paper provides the overview about development of a risk assessment method in order to resolve security related issues at Android Smart phone. In this paper authors have given 3 methods:1)“Smartphone risk assessment (SRA) is the design of risk assessment implemented on Android Smartphone”. System Usability Scale (SUS) is being used as a questionnaire for the evaluation of SRA and the result is remarkable. The users find SRA very beneficial against the threats of the smartphones or any applications related to sensitive data leakage.2) “WHYPER a framework using Natural Language Processing (NLP) techniques which is basically used to identify sentences that describe the need for a given permission in an application description”.3)one more method of risk assessment that authors have discussed in this paper is RiskMon that gives idea about assessing risks based on machine learned ranking sustained by users for applications based on Android.The main advantage of this method is that if there is “any sensitive data leakage users can increase the level of security of the device.” Keywords: Smartphone’s; Android; Risk Assessment --------------------------------------------------------------------***----------------------------------------------------------------- 1. INTRODUCTION Smartphone are in high demands in recent trends because of their portability, small size, very advanced connectivity and processing capabilities, low cost and most important their capability to host multi-purpose third party applications. Various kindof data such as sensor data, multimedia data, and data created or consumed by applications, communication logs etc are hosted by smart phones. Smartphone users carry the device on different multiple locations throughout day and night and make connections to different networks which is not secure. Smartphone’s contains most valuable information of personal and business data as users use the device for both personal and professional work. In comparison to Smartphone OS market Android share showed a remarkable increase of 85% in Q2 2015. Consumers who own an Android-powered Smartphone are almost as satisfied with their purchases as are iPhone owners, who have been historically extremely happy with their hardware. Of the people who told Change Wave they had an Android handset, 72% said they were "very satisfied;" 77% of those who reported they own an iPhone answered the same way. But sometimes user’s habits and behavior increases the risk level on Android smart phones. So the main aim of this study is to develop a risk assessment method on Android Smartphone whose main aim is to increase the security level of the device basically against sensitive data leakage. There are two approaches used for risk assessment method, one is sensitive data risk assessment which is based on combination of permissions from all applications installed on the device and security configuration level assessment which is based on built-in Android Smartphone configurations. The design of risk assessment implemented on Android Smartphone is SRA whose results help users to determine potential threats of their Smartphone’s and any applications that has potential to leak sensitive data. The 2nd method that we are using in the paper is WHYPER which is a framework using Natural Language Processing (NLP) techniques which is basically used to identify sentences that describe the need for a given permission in an application description. The main aim of the WHYPER framework is to connect the relative gap of user expectations by identifying whypermission is required by an application. The 3rd method that we are using in the paper is RiskMonRiskMon that gives idea about assessing risks based on machine learned ranking sustained by users for applications based on Android. The main job of Riskmon is to combine the runtime behaviors of trusted applications and users’ coarse