IDEAS home Printed from https://ideas.repec.org/a/gam/jmathe/v10y2022i12p2011-d836180.html
   My bibliography  Save this article

Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices

Author

Listed:
  • Xiaolei Yang

    (School of Information Science and Engineering, Yanshan University, Qinhuangdao 066000, China)

  • Yongshan Liu

    (School of Information Science and Engineering, Yanshan University, Qinhuangdao 066000, China)

  • Jiabin Xie

    (School of Information Science and Engineering, Yanshan University, Qinhuangdao 066000, China)

Abstract

(1) Background: Smart mobile devices provide conveniences to people’s life, work, and entertainment all the time. The basis of these conveniences is the data exchange across the entire cyberspace, and privacy data leakage has become the focus of attention. (2) Methods: First, we used the method of directed information flow to conduct an API test for all applications in the application market, then obtained the application data transmission. Second, by using tablet computers, smart phones, and bracelets as the research objects, and taking the scores of senior users on the selected indicators as the original data, we used the fusion information entropy and Markov chain algorithm skillfully to build a data leakage risk assessment mode to obtain the steady-state probability values of different risk categories of each device, and then obtained the entropy values of three devices. (3) Results: Tablet computers have the largest entropy in the risk of data leakage, followed by bracelets and mobile phones. (4) Conclusions: This paper compares the risk situation of each risk category of each device, and puts forward simple avoidance opinions, which might lay a theoretical foundation for subsequent research on privacy protection strategies, image steganography, and device security improvements.

Suggested Citation

  • Xiaolei Yang & Yongshan Liu & Jiabin Xie, 2022. "Information Leakage Detection and Risk Assessment of Intelligent Mobile Devices," Mathematics, MDPI, vol. 10(12), pages 1-13, June.
  • Handle: RePEc:gam:jmathe:v:10:y:2022:i:12:p:2011-:d:836180
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2227-7390/10/12/2011/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2227-7390/10/12/2011/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:10:y:2022:i:12:p:2011-:d:836180. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.