[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Next Article in Journal
Social Media, Quo Vadis? Prospective Development and Implications
Previous Article in Journal
Topic Detection Based on Sentence Embeddings and Agglomerative Clustering with Markov Moment
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews

by
Franklin Tchakounté
1,*,
Athanase Esdras Yera Pagor
1,*,
Jean Claude Kamgang
2 and
Marcellin Atemkeng
3
1
Department of Mathematics and Computer Science, Faculty of Science, University of Ngaoundéré, Ngaoundéré A0C 0A9, Cameroon
2
Department of Mathematics and Computer Science, National School of Agro-Industrial Science, University of Ngaoundéré, Ngaoundéré A0C 0A9, Cameroon
3
Department of Mathematics, Rhodes University, Grahamstown 6139, South Africa
*
Authors to whom correspondence should be addressed.
Future Internet 2020, 12(9), 145; https://doi.org/10.3390/fi12090145
Submission received: 31 July 2020 / Accepted: 17 August 2020 / Published: 27 August 2020
(This article belongs to the Section Cybersecurity)

Abstract

:
To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions. However, they are not totally efficient since they rely on application features and application execution threads. Google provides additional elements to enable consumers to collectively evaluate applications providing their experiences via reviews or showing their satisfaction through rating. The latter is more informal and hides details of rating whereas the former is textually expressive but requires further processing to understand opinions behind it. Literature lacks approaches which mine reviews through sentiment analysis to extract useful information to improve the security aspects of provided applications. This work goes in this direction and in a fine-grained way, investigates in terms of confidentiality, integrity, availability, and authentication (CIAA). While assuming that reviews are reliable and not fake, the proposed approach determines review polarities based on CIAA-related keywords. We rely on the popular classifier Naive Bayes to classify reviews into positive, negative, and neutral sentiment. We then provide an aggregation model to fusion different polarities to obtain application global and CIAA reputations. Quantitative experiments have been conducted on 13 applications including e-banking, live messaging and anti-malware apps with a total of 1050 security-related reviews and 7,835,322 functionality-related reviews. Results show that 23% of applications (03 apps) have a reputation greater than 0.5 with an accent on integrity, authentication, and availability, while the remaining 77% has a polarity under 0.5. Developers should make a lot of effort in security while developing codes and that more efforts should be made to improve confidentiality reputation. Results also show that applications with good functionality-related reputation generally offer a bad security-related reputation. This situation means that even if the number of security reviews is low, it does not mean that the security aspect is not a consumer preoccupation. Unlike, developers put much more time to test whether applications work without errors even if they include possible security vulnerabilities. A quantitative comparison against well-known rating systems reveals the effectiveness and robustness of CIAA-RepDroid to repute apps in terms of security. CIAA-RepDroid can be associated with existing rating solutions to recommend developers exact CIAA aspects to improve within source codes.

1. Introduction

Due to its open-source nature, Android is the most popular mobile operating system [1] and it is expected to keep this popularity until 2023 [2]. Android markets, such as Google Play [3] and other third-party markets (AppChina [4], Anzhi [5]) play an important role in the popularity of Android applications. Their number has significantly increased from one million in 2013 to about 2,900,000 applications [6] making Google Play a rich place where people can satisfy their needs.
In order to maintain its business notoriety, Google emphasizes on the quality control of the applications in Google Play. This control aims to ensure aspects such as ergonomics, correct running of the application’s functionality and security. The last aspect is a major challenge since it preserves confidentiality, integrity and availability of user data. On Android, most of the approaches use static analysis relying on static features related to applications [7,8,9,10,11], dynamic analysis relying on features observed during their execution [12,13,14] and hybrid analysis combining the both [15,16,17]. Despite Google Play Protect provided by Google, to filter threats, there are still malicious applications carefully designed by bad people to have an impact on the security and privacy of users [8,18]. The aforementioned solutions therefore need additional knowledge.
The better quality the apps are, the more satisfied customers will be. So satisfaction of Android customers makes a lot of money to Google. However, as noted by Woods and Moore [19], the market for information security products such as Android apps, is subject to asymmetry meaning that consumers lack information about quality of apps they acquire. As a result of that, they can easily be victims of attacks because they have consumed (unknowingly) low quality products called lemons. In the market ecosystem, three general approaches have been so far designed to address this issue. Liability laws charge vendors costs in the case of an ineffective product. However, it is not easy to prove that it is the vendor who defects the product. Another approach is to involve expert people to certify that a product is secure. This approach is constrained by the fact that vendor creates fake expertise and that security flaws is detected in real execution. The reputation is the last approach to evaluate effectiveness of products [20]. In this approach, marketing activities massively communicate about functionality and even they present the contrary of what products reflect.
Through Google Play, consumers are able to download and install products related to their needs. After exploitation, they experience app functionality and they can provide reviews and ratings helpful to prevent future consumers to take bad products. By doing that, Google is informed about claims and developer product vulnerabilities, and therefore takes measures to sanitize its market. These elements can therefore be useful to overcome issues of “lemons”.
Evaluation by ratings in Google Play consists of giving a number in the scale [1,2,6,7,8]. The less it is, the less the user has been satisfied. Google assigns a sort of global reputation based on this rating by aggregating individual ratings. Evaluation by reviews is the way users can post textual reviews about usage experiences. Rating is subjective to the user because it is not possible to have the reasons for which this rate is provided. Reviews are much more expressive and are provided in text form by the user to appreciate, depreciate and recommend an application. Consumers also use these reviews to draw attention to shortcomings in terms of ergonomics, operations and security. Researchers have shown that there is often a big difference between rating and the reviews given by users [21]. In addition, these reviews can reveal several different feelings such as positive, negative and neutral on different aspects of the application [22]. Such reviews are useful and relevant to developers and application store owners to better understand their customers and to recommend improvements [23,24]. However, they are provided subjectively and descriptively, therefore harder exploitable for decision making whether or not to install the application.
As for any social ecosystem, an application (seen as an agent) should be associated with a reputation score to predict bad behaviors [25]. Returning to Android, reputation can be evaluated based on permissions requests [26,27,28], Application Programming Interface (API) calls [8], information flow analysis [29,30] and other features [9]. These approaches require prior installation and are based on app features. Unlike we would like to prevent installation through analysis of reviews. Interesting outcomes are obtained, revealing that reviews are useful to understand user sentiments in regard to Android products with the use of machine learning and deep learning techniques [31,32,33]. This understanding comes from efficient extraction and summarizing of key topics from reviews [24,27,34,35,36,37], required to tell the developers exactly where to improve across updates [23,35,38,39,40,41,42,43,44]. The security aspect is a serious concern while updating. Concerning effectiveness of apps regarding the security point of view, literature provides with very few attempts. Mobile App Reviews Summarization (MARS) [45] and Security-Related Review Miner (SRR-Miner) [46] are two systems designed to summarize and mine security-related reviews to provide quick understanding to developers. Unlike evaluating security reputation, their aim is just to facilitate understanding and recommendations towards security. They are too coarse-grained since they deal with threat-related security keywords and the analysis is performed down to sentence-level. One with no knowledge about security would not be able to understand summaries and some knowledge is missing from the whole comment since only sentences with security-keywords are extracted. The last limitation is that authors do not consider negative sentiments, although the whole terms of comment are linked. Apart from SRR-Miner having a reliable dataset of keywords, the others are not consistent in selection of keywords. Tesfay et al. [47] evaluated security-related reputation based on user feedback, the number of users who installed the studied application and the reputation of vendors. This proposal is subjective, does not exploit sentiment analysis on feedbacks and is subject to false reputation in case there are few feedbacks. Their interest focuses more on functional aspects than specifically on security. Like traditional Google star rating subject to inconsistencies across user perceptions, SERS [48] is a scheme proposed to rate applications regarding security claims. Authors rely on two opposed ways; the static analysis of required permissions leaking data and the sentiment analysis of reviews. However, it is unclear how they proceed with keywords and polarities and they only deal with the confidentiality aspect. Authors are not specific to reviews concerned with the whole reviews of apps.
In light with all the aforementioned limitations, this work proposes, CIAA-RepDroid, a reputation scheme based on a review-level sentiment analysis of security-related reviews. CIAA-RepDroid exploits the probabilistic model Naive Bayes to estimate probability that the reputation of an app is likely good or bad. The specificity of the proposal is that we study more fine-grained aspects such as confidentiality, integrity, authentication and availability (CIAA) to provide enough ingredients to developers for improvement of future versions. More interestingly, with this system, a reputed app in term of security cannot be reputed in one of CIAA aspects. Experiments were conducted with 13 applications including live messaging, e-banking, social media and anti-malware including a total of 1050 security-related reviews and 7,835,322 functionality-related reviews. Results show that applications are badly reputed lacking effective measures for confidentiality, integrity, authentication and availability. Analysis of security-related claims show that confidentiality is the service the most neglected during the development of Android apps. Moreover, apps display good reputation in terms of functionality. This means that developers put a lot of efforts in functional aspect than security aspect. A quantitative comparison with SERS and Google rating shows that our approach is more precise and robust to estimate trust in terms of security. CIAA-RepDroid is able to recommend developers exact CIAA aspects to improve within their source codes. This work provides two main contributions.
  • CIAA-RepDroid, a fine-grained security-related reputation based on sentiment analysis of security-related reviews and probabilistic classification model of polarities;
  • a decomposition of reputation into confidentiality, integrity, authentication and availability reputations;
  • experiments against existing rating system approaches demonstrating effectiveness of CIAA-RepDroid to related security flaws in Android apps.
The terms app and application are interchangeably used in the document. The rest of the paper is structured as follows. Section 2 provides a broad overview of authors who conducted similar works. Section 3 presents the proposed reputation model. Section 4 presents and discusses results obtained with real applications and comparison against similar approaches. We conclude and provide further research to enhance our methods.

2. Literature Review

According to [9,24], the app source environment and user reviews contain relevant information about user experience and expectations. They recommend that developers and application store owners could leverage the information to better understand their customers. Their findings motivate this work which evaluates applications based on analysis of reviews to recommend developers and owners about security-related improvements. Any agent in social network ecosystem should be estimated a reputation score which is a predictor of future behavior based on previous interactions [10]. If they act positively in the past, they will be likely trust in the future because they are expected to act likewise. The reputation is a characteristic helpful to minimize dishonest agents. In this regards, every app in Android ecosystem is an agent which should be associated with a reputation score. This work predicts its actions based on analysis of experiences from users who installed. Based on review analysis, this work derives probabilistic model to assess reputation of any application and therefore estimates whether it is honest or dishonest seen as malicious or benign in terms of security aspects. Due to the unstructured aspects of texts, sentiment analysis comes therefore into play. Several proposals have come out to understand consumers’s satisfaction through their comments and to evaluate app effectiveness in different aspects such as functionalities, security based on comments. This section presents six research trends related to our proposal.

2.1. Security of Android Apps

The first trend dedicated to security of Android is provided in three ways. Static analysis [7] aims at looking into app features such as permissions, source codes and other static characteristics to detect abnormal activities. Static analysis is not able to observe exploits deployed during runtime. This limitation is overcome in dynamic analysis [13], by scrutinizing data flows involved during runtime, which are helpful to identify malicious paths. Hybrid analysis [49,50] takes advantage of compromise between static and dynamic analysis and switch from one to another based on contexts. Unlike these works, we are about looking for reviews to evaluate and improve security-related health of apps on Google Play. Our work is complementary to the others. Reputation can also be evaluated through the risk induced based on permissions requests [26,27,28], API calls [8], information flow analysis [29,30] and complementary features [9]. The main flaw related to such reputation schemes is that they require the application to be installed. Even if they are successful, the application would have already caused damages. The purpose of our proposal is to prevent dangerous installations by investigating applications in the store.

2.2. Classification of Reviews Based on Polarities

The second trend includes mechanisms that look for best learning algorithms able to classify reviews based on sentiment polarities. Day and Lin [31] investigated the incidence brought by deep learning concerning sentiment analysis of Chinese reviews in Google Play. Long Short Term Memory (LSTM), Naive Bayes (NB) and support vector machine (SVM) have been used on a collection of 96.651 reviews on Google Play. Experimental results give an accuracy of deep learning of 94% which outperforms Naive Bayes (74.12%) and support vector machine (76.46%). Karim et al. [32,51] also study performance of machine learning algorithms while understanding reviews from Google Play. They found that Logistic Regression outperforms K-Nearest Neighbors, Naive Bayes and Random Forest in terms of precision, accuracy, recall and F1. Oyebode et al. [33] compared performance of five classifiers on 104 Android mental health apps by performing sentiment analysis of a total of 88,125 reviews. The best one comes out with F1-score of 89.42% and was therefore exploited to predict polarities helpful to study specific themes impacting satisfaction. Unlike these works, our aim is not investigate performance but security-related reputation of apps based on analysis of reviews.

2.3. Extraction and Summarization of Key Topics

The third trend is about extracting and summarizing key topics and features from reviews reliable to understand consumer preoccupations. Guzman and Maalej [34] proposed an approach which extracts key app features from reviews to help understanding quickly the opinions behind it. They obtain sentiments of the identified features using sentiment analysis and attribute to reviews general scores. They obtain via their method a precision of 0.59 and a recall of 0.51 on 7 apps. In the same vision, Noei et al. [24] developed an approach to extract the key topics from reviews that are more likely related to ratings of a specific category. Doing this will help the developer to concentrate on aspects which elevates user satisfaction. Experiments with a collection of 4,193,549 reviews of 623 Android apps in ten different categories show that there is a relation between app categories and review topics. Gu and Kim [37] designed Software User Review Miner (SUR-Miner), a tool to summarize and classify reviews. With this tool, one can extract essential aspects from reviews to assist developers to catch real improvements required by users. Khalid et al. [36] specifically study complaints in the reviews. They succeed summarizing 12 types of complaints relevant to users. This information is necessary for developers to consider proper user issues. Li et al. [27,35] developed mechanisms to understand the impact of an app’s release by investigating the variation of user’s sentiment in this app’s reviews. Unlike to the above methods our topics concern security issues. We therefore extract key terms related to security complaints but to help identifying CIAA aspects from reviews. Then, we process by sentiment analysis coupled with Naive Bayes to determine a score referring to security-related reputation. Other works has been proposed to summarize comments on specific application aspects. These works can support our proposed method even if we specifically deal with security aspect.

2.4. Consideration of Reviews in the Updates

The fourth trend includes investigations of consideration of reviews in the updates. Nguyene et al. [38] established a connection between app reviews and the evolution of application’s security and privacy to help developers cleaning apps. They investigated whether user reviews impact developers to consider their opinions for the next version. Experiments with a collection of 2583 apps with a total of 4.5 million user reviews showed that user really influence security evolution with their reviews across versions. However, they look for reviews completely dedicated to security and privacy. This is a limitation because within a review, users can talk about many aspects such as ergonomics and security simultaneous. Therefore knowledge is missed in their dataset. Unlike in our work where we look for security aspects in every review through CIAA keywords. Moreover, we avoid manipulating features related characterizing application such as permissions. Authors argue at the end, that future research on user reviews must be conducted to improve security. This recommendation motivates our work. ChangeAdvisor is a tool designed by Palomba et al. [39] to help developers in classifying reviews useful for app updates. ChangeAdvisor associates NLP, text analysis and sentiment analysis to automatically classify app reviews provided by consumers. WisCom is another tool proposed by Fu et al. [40] which analyzes reviews and ratings in mobile stores. Using regression and latent Dirichlet Allocation models, this tool successfully identifies inconsistencies in reviews and reasons justifying reject of apps by users. Authors of ChangeAdvisor and WisCom do not deal with defining reputation-based security aspects. There are more works dealing with mining reviews to improve next versions. Villarroel et al. proposed (Crowd Listener for releAse Planning) CLAP [41], a tool to categorize and cluster reviews by analyzing contents. Authors then assign priorities to clusters of reviews for upcoming releases. Gao et al. [42,43] developed a scheme to extract and categorize raised issues across reviews in different versions. Yu et al. [44] enhanced ChangeAdvisor providing ReviewSolver to locate the code part having problem. More research in this direction is provided in [23]. Unlike these works which are more general, ours aim is to provide fine-grained elements to help developers to improve security. Li et al. [35] proposed a scheme to identify the period during which problematic updates have been performed although considerable negativity expressed in reviews. Our work does not deal with updates.

2.5. Mining Security Issues

The fifth trend deals with mining security issue reviews and user sentiments on that mined information. Hatamian et al. [45] proposed MARS, a tool which summarizes reviews and extracts privacy issues from them provided to help in decision making. Authors use machine learning, natural language processing and sentiment analysis to detect significant reviews related to privacy threats. Their method is able to provide precision, recall and F-score of 94.84%, 91.30% and 92.79%. This work considers the terms privacy and security as main keywords and determines the reputation of apps based on privacy threats such as tracking and spyware, phishing, unauthorized charges, unintended data disclosure, targeted ads, spam and others. We argue that (i) security and privacy as keywords are not fine-grained since one can express privacy or security issues with other words. (ii) Dealing with threats is also coarse-grained because it is hard for summarizing to semantically understand that a review poses privacy problem. (iii) For developers or users with no knowledge about privacy and security, recommendations are hardly understandable. To deal with these limitations, our objective is to find app reputation based on confidentiality, integrity, authentication and availability which are understandable basic terms in security. In other words, rather than to present in terms of threat, we present in terms of CIAA. For that, specific keywords indicating each security service are compiled. Tao et al. [46] developed SRR-Miner, a tool to summarize security problems and related sentiments of users. However their method has some problems in different aspects. The whole keyword can appear in a review. In this case, their categories will not be useful and therefore it is not possible to recommend exactly where improvements should hold. Moreover, categories are not precise since they are not related to security but to groups of applications. For example, the definition of the first category states that “… issues causing negative effect on devices…” but the negative effects are unclear. As the authors mentioned, SRR-Miner is not able to correctly label sentences with positive polarity including security services words such as authorization, authentication, login, etc. This fact reveals a limitation resulting from the fact to leave positive sentence and to compute polarity at the sentence level. In our work, we offer several aspects. We deal with positive, negative and neutral polarities at the review level. Categories on a fine-grained basis are security services including confidentiality, integrity, authentication and availability. A review poses a security issue if the application has some misbehavior in one of these services. The consideration of the three polarities coupled to CIAA categories allows the developer to easily circumscribe the problem. Moreover, their aim is to synthesize security-related comments by extracting security-related review sentences and identifying verbs representing the app’s misbehavior from users’ negative and neutral feedback. Our method’s aim is to evaluate security-related reputation of the app based on sentiments extracted from comments.

2.6. Reputation and Rating Schemes

The sixth trend is about research proposing ways to evaluate application trust in some aspects. Tesfay et al. [47] put in place a private cloud to control user installations of Android applications and to keep track of feedbacks from users. They evaluate qualitative reputation of applications based on feedbacks, vendor’s reputation and number of users who run the same application. This work holds for a private cloud, so customers are already known and their interests too. Their proposal does not propose formal scheme. It is subjective and somehow more related to permissions than feedbacks and is just informative. Our work deals with crowd users in Google Play whose interests are understood through reviews. Our proposal is formal based on sentiment analysis of comments provided by users in Google Play. In [48], authors provided a mechanism to rate apps based on static analysis of flows related to required permissions and sentiment analysis of reviews. Sentiments related to confidentiality are evaluated from reviews and internal abilities of the application to make possible data disclosure. It is unclear how they proceed with keywords and polarities. As result, they obtain a rate of app meaning trust that the app does not disclose critical data. Unlike our scheme which considers four security aspects confidentiality, integrity, authentication and availability, their keywords only relate confidentiality. In our work, we are able to determine global security-related reputation and reputation for each of CIAA services. SERS appears to be similar to ours since it computes a value indicating the nature of apps. A global rating scheme is provided in popular app stores (such as Google Play and iOS store) to make customers evaluating based on their experience with an app. This per-user evaluation is expressed as number on a scale between one and five in the corresponding app and the system aggregates as the cumulative average of all individual user ratings over all the versions. The global rating value refers to satisfaction one could have after using an app or to a kind of reputation that users associate to an application. As reported in [24], different users with the same experience may provide different star ratings. Google rating is subject to inconsistencies across user perceptions. In our proposal, we take into account the current reviews to remove old reviews which may have been considered in previous versions. Moreover, our reputation relies on reviews.

3. Reputation Model

The methodology can be summarized in four main steps, illustrated in Figure 1. The first step concerns the collection of applications and selection of reviews related to security. The second step is to determine the polarity of the reviews based on the sentiment analysis. In the third step, review polarities are classified within security services such as confidentiality, integrity, authentication and availability. The fourth step is to determine the global reputation of an application based on the review polarities in terms of security-related keywords. Details of each step are provided below.

3.1. Collecting Applications and Selecting Reviews

In this phase, we gather applications from Google Play based on reviews which point out security concerns and other criteria which can influence reputation of the application. These criteria include user ratings, number of users who downloaded the application and the number of reviews made by the customers. The process of extraction of applications and reviews is supported by the tool Google Play scraper [52] which is very flexible according to expected results and its ability to consider different languages. This tool also enables to filter reviews based on key terms, an important characteristic since we deal with security aspects. Reviews are filtered as follows. First, we exploit Appbot [53] to identify applications which show critical words from their reviews. Figure 2 shows an example of the app Instagram which has critical words such as Bug, Error, Crash. Appbot takes as input sensitive applications that are expected to manipulate confidential information such as e-banking and messaging apps as well as app susceptible to prevent confidential data leaks such as antivirus. Once those applications are provided to Appbot, it gives for each app a list of critical words from the whole reviews of that application. We therefore select applications having reviews with critical words to perform deeper analyses. An analysis concerns extracting only reviews related to security aspects. Our method interchangeably translates keywords in French and English meaning that we consider both versions of the same keywords. The compilation of keywords is guided based on definitions of the main security services: confidentiality, integrity, availability and authentication. We refer to definitions of such services specifically in mobile environments [54]. Appendix A presents such keywords classified by security service with descriptions given considering the attacker side. For instance, concerning confidentiality the keyword “sniffing” is the art to passively observe information transmitted in the system. In the side of attacker, the one performing this action is not authorized to do that and tries to escalate privileges to capture information. Once we extract reviews of applications, some tools are used to mine keywords in reviews. The objective of mining is to confirm the effective presence of keywords in the reviews. We used two Search Engine Optimization (SEO) based tools, Alyze [55] and Keywordtool [56], to extract possible keywords from a review taken as input, associated with information such as number of occurrence and weight associated to each term of the review. They are of importance because it tells us whether our keyword appears or not. Even if it is associated with weight of 1, we consider the term as crucial to security aspect taken as a whole. Then we use Appbot, which is helpful since it deals with all the application’s reviews and refreshes automatically with added or deleted reviews. It provides the frequency of apparition of a keyword within application reviews. This information helps to confirm whether a keyword is relevant to consider. All the keywords have been found relevant to use in the proposed model. Figure 2 shows an example of the search.
Appendix A depicts 10 reviews (in the original and translated forms) concerning security flaws made on the Instagram application. This example is exploited further on to illustrate the methodology steps.

3.2. Determination of Review Polarity

This step evaluates feelings that each user experiences when he makes a review. It is represented here as positive (+), negative (−) or neutral. This evaluation relies on Naive Bayes which is the most popular classification method for documents [57]. Its simplicity and flexibility makes it speedy and accurate to deal with large and diverse information manipulated in opinion mining. Within the scope of this work, a review is considered as a document. By definition, a Naive Bayes classifier is a classifier based on Bayes’ theorem with the naive assumption that the entities are independent of each other. According to Bayes’ theorem [58], for a characteristic vector X = ( X 1 , X 2 , , X n ) and a class variable C k , Bayes’ theorem states that:
P ( C k X ) = P ( X C k ) P ( C k ) P ( X ) , For k = 1 , 2 , , K ,
where, K is any choosing natural number and P ( C k X ) is the posterior probability. P ( X C k ) is the (previous) probability. P ( C k ) is the prior class probability (likelihood) and P ( X ) is the previous probability of predictor (evidence). Using the chain rule, the probability P ( C k X ) can be broken down as:
P ( X C k ) = P ( x 1 , x n C k ) = P ( x 1 x 2 X n , C k ) P ( x 2 x 3 X n , C k ) P ( x n 1 x n , C k ) P ( x n C k ) .
Two environments of analysis are used to obtain polarity: the sentiment analysis environment for Natural Language ToolKit (NLTK [59]) and the Spider environment [60]. These environments are well known for sentiment analysis and text classification. They evaluate whether texts express a positive, negative or neutral feeling. Using hierarchical classification, neutrality is determined then the polarity of feelings follows, but only if the text is not neutral. This classification is called Naive Bayes classification, which is nothing more than the application of Bayes rules for the formation of classification probabilities. This environment provides an overall feeling that a user has for a given application. For our work, it is a question of obtaining the polarity of feeling from a review by relying on the security aspects. We write Python script to exploit the keywords related to security services. Figure 3 depicts the polarity of each review from the script. In this specific case, the review has a negative polarity of 77.9% and a positive polarity of 22.1%. This review is therefore classified as negative.

3.3. Polarity Classification by Security Service

This step determines feelings behind each review based on polarity and classifies them by security service. Based on model in the previous section, review polarities for the Instagram application are obtained and presented in Table 1. The review C2 for example, has a negative feeling with a probability of 0.84.
Now we look for classifying polarities by security service. For that, for a given application, we evaluate the distribution of apparition of security-related keywords in each security service. Then we match the sentiment to the distribution in each review. Concerning the application Instagram for example, Table 2 shows the breakdown of keywords by security service for reviews. Sentiments from reviews are obtained based on the model in Section 3.2.
Based on Table 2’s outputs,
  • C1 has a negative polarity in terms of confidentiality and availability;
  • C2 has a negative polarity in terms of integrity and availability;
  • C3 has a negative polarity in terms of integrity and availability;
  • C4 has a negative polarity in terms of availability;
  • C5 has a positive polarity in terms of authentication and availability; etc.

3.4. Determination of Reputation by Security Service and Global Reputation

The aim in this stage is to determine the reputation of an application based on the number of reviews recorded in Google Play, as well as their respective polarities while taking into account the security service that each review releases. We obtain the probability that an application has a good or a bad reputation, by subsequently relying on a probabilistic model defined as in Equation (3) [25].
E ( p α , β ) = α α + β , with 0 p 1 ; α , β 0 ,
where
  • α = ∑ N p o s = α C + α I + α A + α D (total number of positive polarity);
  • β = ∑ N p o s = β C + β I + β A + β D (total number of negative polarity)
and
  • α C (resp.) β C is the positive (resp. negative) polarity value for the service confidentiality;
  • α I (resp.) β I is the positive (resp. negative) polarity value for the service integrity;
  • α A (resp.) β A is the positive (resp. negative) polarity value for the service authentication;
  • α D (resp.) β D is the positive (resp. negative) polarity value for the service availability.
Such that
( α i , β i ) = 1 .
Table 3 summarizes different polarity values for each review in the Instagram application. These values are obtained as follows: the value obtained after implementing the Python script on a given review, the polarities obtained, namely positive and negative (Table 3) are represented here while respecting the distribution of word numbers linked to the various security services mentioned above (Table 2). Thus to obtain the values α i and β i for a given review, we recover the number of words of the review distributed by security service, then we bring out the exact value of polarity obtained in Table 3 for each security service having a positive number (i.e., α i , β i 0). The final polarity value is therefore obtained as a function of the total number of words in the review highlighting the security aspect and the number of words distributed by security service (Table 3).
We can therefore determine the reputation likelihood by security service by exploiting the formula of the probabilistic model E ( p α , β ) for each service. We have:
  • Confidentiality: E C = α c / ( α c + β c ) = 0.6 .
  • Integrity: E I = α I / ( α I + β I ) = 0.7 .
  • Authentication: E A = α A / ( α A + β A ) = 0.2 .
  • Availability: E D = α D / ( α D + β D ) = 0.4 .
With:
α C = N p o s ( C o n i ) ; α I = N p o s ( I n t i ) ; α A = N p o s ( A u t i ) ; α D = N p o s ( A v a i )
β C = N n e g ( C o n i ) ; β I = N n e g ( I n t i ) ; β A = N n e g ( A u t i ) ; β D = N n e g ( A v a i ) .
The global reputation of a given application is the average of security services’s reputations of the same application.
E ( p α , β ) = Mean ( E C , E I , E A , E D ) = 0.32 .
The global reputation must be within the interval [0–1] and is interpreted as follows: for an application with a good reputation in terms of security, the value of E must be greater than the value 0.5. An application with E less than 0.5 has a bad reputation and an application for a value equal to 0.5 has a neutral reputation. For instance, the Instagram application does not have a good reputation regarding the security aspect since this application has a reputation below 0.5.
In a more specific context, as shown in Table 3, we can infer the reputation of the application in terms of security services, which suggests to developers to improve security aspects in the next version. Interpretation of security service reputations is the same as for the global reputation.

4. Results and Discussions

This section presents the main findings from applying the proposed model to real applications in the Google Play. This section includes four experimentations: the first refers to study the reputation of Android applications on the security aspect. The second refers to evaluate their effectiveness in terms of functionality aspect. The third is dedicated to study how far developers ensure security aspect compared to functional aspect. The fourth is dedicated to compare our approach with SERS [48] and Google Play rating. The last experiment is dedicated to measure impact of changing keywords to keywords in SRR-Miner [46].

4.1. Dataset

We gathered 13 applications from Google Play in different categories: live messaging, social media, mobile banking, productivity and security tools. The intuitive justification of the selection of these applications is as follows: due to covid-19, people communicate more via live messaging and social media avoiding physical contacts. They are more interested in e-banking to perform facilities (paying bills, money transactions) and for that they install security tools and other tools to protect infiltrations. Studying applications falling in these categories is of high interest. Table 4 provides the number of reviews of each application in terms of security and functionalities as well as the aggregated rating based on number of votes.

4.2. Reputation Based on Security

Based on the reputation model, we obtain the results provided in Table 5.
Table 5 presents the polarity of the applications on a defined number of reviews related to security services. Then, it presents the security related reputation of these applications in general and by security service. Some of them (QR scanner, Messenger, Whatapp) have almost average reputation. It appears that none of those applications has a very good reputation. In particular, it reveals for example that “Security Master” has a bad reputation (42%) in terms of security design. Users feel not comfortable while using this application. Developers have missed to put effort on the security aspect in general. However, authentication measures are desirable within the application (67%). The other services are not respected. Despite the fact that Whatsapp has an average reputation, its developers put efforts on integrity (58%), authentication (68%) and availability (67%) to guarantee non alteration of exchanges, to guarantee the service and to verify identity of communicators. The “Express Union” application aiming to provide banking operations has a bad reputation (41%) meaning that users feel not safe when using this application to perform banking transactions.

4.3. Reputation Based on Functionality

Table 6 shows the reputation of the same applications in terms of functional aspects. This is realized based on Appbot from which an evaluation of functionality on Android applications is provided depending on the point of view of ratings and review polarity.
It reveals for example that “Security Master” has a very good reputation (86%) in terms of what it has been designed for. Users feel very comfortable while using this application. Unlike, Express Union which has a bad reputation (15%) meaning that users are not satisfied when using this application to perform banking transactions.

4.4. Reputation-Based Security vs. Reputation-Based Functionality

Figure 4 matches the reputation based on functionality with the reputation based on security. Apart from two applications Express Union and Age Scanner Finger, applications are always more reputed in terms of functionality than in security. This fact can be explained by two situations. The first situation is that people feel more comfortable in terms of service than in terms of security. The second situation is that developers use vulnerable APIs which generate security flaws. Another remark is that developers of messaging applications tend to put more accents in security service than the others. This is the case of Messenger and Whatsapp. The correlation coefficient between reputation based security and reputation based functionality is 0.44 indicating that there is no relation between reputation based security and reputation based functionality. This result confirms that it is not possible to estimate security enforcement based on functionalities implementation. In other words, consumer reviews reveal that developers really lack to look into security aspects.

4.5. Comparison of CIAA-RepDroid to SERS and Google Play Rating

Table 7 summarizes results concerning reputation determined in our proposed scheme compared to ratings in SERS work and the traditional rating of Google. In this experimentation, the dataset of communication applications in [48] has been used. In this work, authors have computed their ratings shown in columns (R2), (R3) and (R4). They also have collected traditional rating available in column R5. What we did is to apply our approach to their samples to obtain R1. R11 is the fine-grained reputation in term of confidentiality, R12 in term of integrity, R13 in term of authentication and R14 in term of availability. As it is defined in the SERS’s work, R2 is a rating value of the application based only on sentiment analysis of the whole reviews (They consider all the reviews of the app to have R2); R3 is a rating value of the application based only on static analysis of required permissions; R4 is the global rating aggregating R2 and R3. To obtain R4. we have computed the average of weighted R2 and R3. The column #total reviews is the total number of reviews per application and # security reviews is the number of reviews related to security.
The first observation is that app ID #3 is the one having the higher number of reviews while app ID #15 is the one having more security-related reviews. Concerning column R5, we observe also that users have rated these apps of at least 4. meaning that they are very well satisfied about these apps. R2 slightly coincides with R4 except some apps such as 6, 9, 10, 13, 14 and 15 with which the gaps is around 1. This observation is similar between R3 and R4 and R4 and R5. The trend from the above observations (according to [24]) is that traditional ratings fit with rating based on reviews. Our work comes to explicitly determine security-related rating of app based on security-related reviews. Column R1 provides values of reputation less than 2.5 (in average 1.70), it means if we come to the original scale [0.1] that all the applications have a reputation under 0.5. Therefore, users all have negative sentiment while expressing their reviews. These negative sentiments are spread in all security aspects concerning CIAA for all apps where reputations are below 2.5 in average. Confidentiality is the aspect the most concerned with the smallest value of R1 in average. Developers should therefore reinforce this aspect. For instance, the app ID#2 with five (05) security-related reviews has a negative reputation of 2.2. This app is bad at confidentiality, availability but developers have inserted enough primitives for authentication (3.0/5). We also see that despite the fact that app ID#1 has a low reputation in security (confidentiality, authentication, availability), this app is almost good at integrity. This variability of reputation in security services strengthens of our model since it brings precise directions to developers in future improvements.
Now we compare the proposed reputation to the others. For that, we analyze absolute gaps between R1 and the others provided additionally in Table 8. We see that gaps are around 2 meaning that there is really a distance between satisfaction related to security, satisfaction provided by SERS and satisfaction traditionally expressed in Google. This observation is confirmed since the distance is almost constant in Gap R1-R2, Gap R1-R3, Gap R1-R4 and Gap R1-R5. Moreover, since there is a small number reviews concerning security among all reviews for each app, the security-related reputation should be distant from the one underlined by users (R5). However, these results are consistent because an application can have a good rate but a bad reputation in specific aspect. This is what is translated here. Ratings provided in Google show that users who rate are satisfied (4+ in R5) but in security (R1) they are not and also specifically in services CIAA. Here also our reputation finds its place. SERS aims at providing two ratings (i) based on security features of apps which overpass confidentiality and leak data (ii) based on reviews expressed by users. The second is biased since it deals with the whole reviews and therefore is not adapted to really security flaws to overcome compared to ours. Indeed, we have in average a rating of 3.70 in R2 showing that users are satisfied with apps, which is contrary to the objective of SERS to evaluate security rating. This lack in SERS is more visible since with five security reviews among 2586 (app ID#2), R2 provides positive satisfaction unless showing somehow that there are several dangerous vulnerabilities. This add-on is provided by our scheme through R11, R12, R13 and R14.
Now that we showed the completeness of what we propose against SERS reviews analysis, we come to compare to the second SERS rating. Since it relies on app features to detect data leaks (R3), we think that this rating is the more appropriate to compare with. Again, a distance exists between, R1 and R3. Unfortunately, the gap existing between R1 and R3 means that SERS’s second rating is not really expressive in terms of security. The average value in R3 is 4.06 which mean that applications do not leak any data by the use of risky permissions. This result is false since App ID #2 deals with a dangerous permission access (such as R E A D _ P H O N E _ S T A T E ). Our reputation expresses more reliably this situation.
From Table 9, we note some more important points concerning our proposal. The first is that app 2 has the highest reputation in terms of security and the same has the highest reputation in terms of functional aspect. This coincidence has a sense. In fact, it means that authors of this app made a lot of effort to strengthen it against security flaws. Indeed, only five security reviews are stated among 2586 reviews. This application happens to be considered as the more secure since few users confront security problems. The second is that the app 9 has the lowest reputation in terms of security and the lowest reputation in terms of functional aspect. This result simply means that users note through their 37 security reviews that this app has severe security pitfalls and users do not really recommend this app. The number of users put the Google rate to 4 since Google aggregates all the rates.
Table 9 shows the five reviews which relate security from our scheme. Effectively, they stipulate hacking, phishing via terms such as fake and denial of service through terms such as crash. Unlike SERS and Google that finally express functional aspects, we are able to see that developers miss to look at these aspects and customers suffer from consequences. Although our scheme reveals CIAA flaws, improvements should be made to indicate type of vulnerability or threat based on semantics and ontology in words.

5. Study of Change from CIAA-RepDroid Keywords to SRR-Miner Keywords

Table 10 illustrates results about the determination of reputation with our CIAA keywords and the determination of reputation with SSR-Miner keywords published by the authors here. The objective is to investigate the impact of keywords to CIAA-RepDroid, which are key elements for sentiment analysis. Columns with identification of one (1) refer to processing with our approach. For example, # security Review 1 is the number of security-related reviews extracted using the CIAA-RepDroid keywords from the whole reviews whereas #security Review 2 is the number of security-related reviews extracted using the SSR-Miner keywords from the whole reviews. The three following points are to be discussed.
  • The increase and the decrease of the number of reviews;
  • the reduction of badness and goodness of app reputations;
  • the stagnation of reputations despite the variation of the number of reviews.
Increase and decrease of the number of reviews. We observe fluctuations in the number of reviews from exploiting keywords of CIAA-RepDroid to exploitation of SSR-Miner keywords and vice-versa. In case of increase (from 1 to 2), the SSR-Miner keywords are able to catch more reviews than those in CIAA-RepDroid. In case of decrease (from 1 to 2), the CIAA-RepDroid keywords are able to catch more reviews than those in SSR-Miner. In one and another case, the terms to extract security-related reviews are complementary and can be associated.
Reduction of badness and goodness of app reputations. Concerning the global reputation, we note a slight variation of distance ±0.1 apart from the application 10 which increases from 1.7 to 2.4 and apps where this reputation is constant. The first interpretation is that despite the difference between the set of keywords in both studies, the reputation obtained is quite the same. In other words, our reputation scheme gives the keywords the same semantics of representation security flaws. CIAA-RepDroid is therefore robust. The second interpretation concerning the decrease of badness or augmentation of goodness (in terms of security, from 1 to 2) is that several keywords do not appear in reviews in case 2 compared to case 1, in which it is possible to have several keywords in one review. Therefore, there are keywords unexploited in case 2. The third interpretation concerning the decrease of goodness or augmentation of badness (in terms of security, from 1 to 2) is that several keywords can appear in one of the reviews simultaneously in case 2 compared to case 1. Therefore, there are keywords unexploited in case 2. There are several cases where the two previous situations are amplified meaning the distance is much higher (For example: Application 1: authentication from 1 to 1.5; application 2: integrity from 2.4 to 2.8; authentication from 3 to 2.1. Application 3: integrity from 1.9 to 1.6). The justification remains the same but what we can add more is that the changeability of keywords can be helpful to signal risks in security services. Application 10 has a particular behavior since this CIAA-RepDroid considerably increases its global and specific reputations despite the reduction of reviews from 40 to 31 (global: +0.7, confidentiality: +0.6, integrity +0.6, authentication: 0.4. availability +1.3). After investigations, we discover that SSR-Miner keywords extracting the 31 reviews are also found in the same extracted CIAA-RepDroid reviews, but there are no keywords found within the 9 reviews left. Unlike in case 1 where several keywords were found in some reviews, keywords are evenly distributed, one per review. Something also interesting is that CIAA-RepDroid finds neutral polarities in neutrality in some statements. CIAA-RepDroid is therefore adaptive to user expressiveness in the reviews.
Stagnation of reputations. We note several applications where reputations are identical despite the variation of the number of reviews. For example, application 14 keeps the same reputations everywhere apart from availability. Despite the change of keywords, the reputation remains the same. Reputation is therefore independent of keywords. Our model reveals that there are semantically synonymous keywords and groups of keywords that refer to a keyword. A study of their vocabulary and semantics would be an asset to better understand this result.
Summary. Results in this section show CIAA-RepDroid keywords and SRR-Miner keywords can be complementary used. These results show effectiveness of CIAA-RepDroid to adapt to new keywords as well as robustness of CIAA-RepDroid to keep consistent security reputation.

5.1. CIAA-RepDroid Advantages

The proposed model contributes in some key points:
  • CIAA-RepDroid reveals that reviews can be effective to indicate security flaws to overcome across updated versions;
  • CIAA-RepDroid is able to prioritize security services in terms of reinforcement in the next version;
  • CIAA-RepDroid is able to provide fine-grained security reputations. The model finds through opinions various CIIA security pitfalls to overcome before one installs inside the smartphone. It can be exploited to recommend developers and vendors.
  • The reputation based on functionality is in major cases much higher than the reputation based on security except some applications;
  • CIAA-RepDroid is more expressive and precise in terms of security than existing rating schemes;
  • CIAA-RepDroid keeps a certain robustness despite the change of security-related keywords.

5.2. Limitations and Recommendations

Results show that the proposed model is effective in determining the security related reputation of an Android application. However, CIAA-RepDroid has some limitations:
  • This model does not distinguish fake reviews from real ones. We assumed all reviews as true reviews.
  • The consideration of the date of publication of reviews is not taken into account. Over time, applications can have improvements thanks to updates and customers change their feelings to positive.
  • We have only considered one application source: Google Play Store. People can make reviews on the same application through different application stores.
This work firmly recommends app vendors to exploit fine-grained schemes such as CIAA-RepDroid to associate to the traditional rating to draw attention on security improvements about low-quality products.

6. Conclusions and Perspectives

Products are provided by app vendors to users through app stores. Despite offering rating schemes indicating user satisfaction, they lack efficiency to deal with low-quality products in specific aspects to improve their market. Security claims for instance should be overcome in this context. The objective of this research was therefore to propose an approach relying on review analysis able to recommend improvements to vendors and developers. In this regard, existing research (i) concentrates on ratings dealing with functional aspect to the detriment of security aspects, (ii) related to security are dedicated to summarization aspects and exploitation of code features for detection. This work proposed, CIAA-RepDroid, a fine-grained mechanism to evaluate security-related reputation based on probabilistic model and sentiment analysis. Additionally, we provided means to have reputations in terms of confidentiality, integrity, authentication and availability to fully identify security aspects where developers should put more efforts. We have experimented CIAA-RepDroid on 13 applications including a total of 1050 security-related reviews and 7,835,322 functionality-related reviews. Results revealed that in majority of cases, developers neglect security specifications in their development as well as security claims in their updates. Applications are more reputed in functional aspects than in security aspects. Moreover, confidentiality reputation remains the lowest, indicating that related measures are mitigated in their code. Therefore it is possible for attackers to access prohibited data as the owner. This aspect must be investigated deeply. A comparison of CIAA-RepDroid to existing approaches demonstrated its efficiency, precision and completeness to present security flaws through reviews. A further investigation in the change of keywords related to another study showed that CIAA-RepDroid remains robust. Despite all these positive points coupled to its applicability, CIAA-RepDroid is subject to some pitfalls that require further investigations.
Products are provided by app vendors to users through app stores. Despite offering rating schemes indicating user satisfaction, they lack efficiency to deal with low-quality products in specific aspects to improve their market. Security claims for instance should be overcome in this context. The objective of this research was therefore to propose an approach relying on review analysis able to recommend improvements to vendors and developers. In this regard, existing research (i) concentrates on ratings dealing with functional aspect to the detriment of security aspects, (ii) related to security are dedicated to summarization aspects and exploitation of code features for detection. This work proposed, CIAA-RepDroid, a fine-grained mechanism to evaluate security-related reputation based on probabilistic model and sentiment analysis. Additionally, we provided means to have reputations in terms of confidentiality, integrity, authentication and availability to fully identify security aspects where developers should put more efforts. We have experimented CIAA-RepDroid on 13 applications including a total of 1050 security-related reviews and 7,835,322 functionality-related reviews. Results revealed that in majority of cases, developers neglect security specifications in their development as well as security claims in their updates. Applications are more reputed in functional aspects than in security aspects. Moreover, confidentiality reputation remains the lowest, indicating that related measures are mitigated in their code. Therefore it is possible for attackers to access prohibited data as the owner. This aspect must be investigated deeply. A comparison of CIAA-RepDroid to existing approaches demonstrated its efficiency, precision and completeness to present security flaws through reviews. A further investigation in the change of keywords related to another study showed that CIAA-RepDroid remains robust. Despite all these positive points coupled to its applicability, CIAA-RepDroid is subject to some pitfalls that require further investigations.
  • CIAA-RepDroid will be extended to consider fake reviews;
  • CIAA-RepDroid will include the fact reviews update with time and versions;
  • CIAA-RepDroid will consider the fact that for an application, reviews are made in different stores.

Author Contributions

Conceptualization, F.T. and A.E.Y.P.; methodology, F.T. and A.E.Y.P.; software, A.E.Y.P.; validation, F.T.; writing—original draft preparation, F.T., A.E.Y.P. and M.A.; writing—review and editing, J.C.K. and M.A.; supervision, F.T.; All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Keywords and descriptions.
Table A1. Keywords and descriptions.
Security AspectKeywordsJustifications
ConfidentialitySniffing, spoofingSniffing refer to capturing and listening data that are transmitted across the whole system/network. The attacker violates confidentiality to achieve such actions. Spoofing helps the attacker to disguise as original entity to infiltrate a system. By doing that, one obtains privilege to access confidential information.
Intrusion, usurpation,An attacker needs to violate confidentiality by stealing identify to intrude the system. Then, he accesses unauthorized data.
Steal, hacked, abuseThese terms refer to personal data used without the permission of the owner, and sometimes these data are used to harm the owner or other people.
Malicious, virus, compromise, trojanThese terms refer to software that infects a computer system without the knowledge of its user by exploiting human or technical vulnerabilities They compromise confidentiality.
Fake, alert, relentlessSome terms often used to deceive the user or influence opinion on a particular subject. The finality is to lure to bring out unknowingly confidential data.
AuthenticationScam, theft, breach, sniffing, spoofing,We recall sniffing and spoofing since they rely on authentication to proceed. Additionally, attackers escalate authentication via scamming, identity theft and exploitation of vulnerabilities.
Anomaly, authorized, erroneous, vulnerable, protect, certifiedThese terms refer to authentication in the sense that a user cannot access his account, but he nevertheless provides the correct information. The user can also spot suspicious activity in their account. During authentication process, a system must certify identities and prevent erroneous authorizations. Based on vulnerabilities, a malware profit to pose anomaly activities.
IntegrityRepudiation, nonsense, anomaly, abnormalOnce the state of the system changed and those data are altered, some related elements become nonsense. This alteration shows abnormal and anomaly behaviors throughout the system. Alterations are helpful to detect attacker traces. The latter generally uses repudiation measures to evade detections.
Fraud, spam, lie, scammer, scamThese terms relate to social engineering attacks consisting of luring user to provide critical data. The reason why we put them into the integrity category is that their objective is the infiltration to the target. This infiltration makes the state changed.
AvailabilityWrong, Error, Bug, Bugger, nonsense, Available, Crash, impracticalThese terms refer to the inaccessibility or unavailability of a service or feature when using an application. Most of the time, users encounter access errors, applications that crash during their user, which sometimes leads to data loss.
Table A2. Instagram reviews.
Table A2. Instagram reviews.
Review 1Originalil n y a aucun moyen de denoncer des comptes fake !! je passe mon temps a bloquer des personnes qui volent et utilisent les photos d autres comptes et qui drague de manière très agressive !! review faire pour nous proteger de cela !! Pour ne pas changer votre mise à jour BUG!!! cela devient très fatigant car ça se produit à chaque fois depuis presque 1an.
TranslatedThere is no way to report fake accounts!! I spend my time blocking people who steal and use photos from other accounts and who flirt very aggressively!! how to protect us from that !! To not change your BUG update!!! it becomes very tiring because it has been happening every time for almost 1 year.
Review 2OriginalDepuis quelques temps, les bugs s’enchaînent sur cette appli et ça devient agaçant.. Cette fois-ci, impossible de recharger une page, impossible de voir les messages privées et impossible de se reconnecter sans avoir un message indiquant “une erreur s’est produite“. Faites quelque chose!
TranslatedFor some time, bugs are linked on this app and it becomes annoying. This time, impossible to reload a page, impossible to see private messages and impossible to reconnect without having a message indicating “an error is produced “. Do something!
Review 3OriginalJe ne peux même plus liker, reviewer ou m’abonner et lorsque je signale le problème, Instagram ne réponds pas. J’ai bien signaler le problème au moins 4 fois mais rien ne se passe. Le service est très mal organisé. Merci de me remettre les options qui m’ont été prises.
TranslatedI can’t even like, review or subscribe anymore and when I report the problem, Instagram doesn’t respond. I did report the problem at least 4 times but nothing happens. The service is very poorly organized. Thank you for giving me the options that have been taken.
Review 4OriginalMalheureusement, il y a de plus en plus de beugs avec cette application. Que ça soi au niveau des stories ou du partage de photos dans notre fils d’actualité, ça fait déjà la troisième fois (en même pas 1 mois !) que je rencontre des soucis avec Instagram..
TranslatedUnfortunately, there are more and more bugs with this application. Whether it’s at the level of stories or sharing photos in our news feed, it’s already been the third time (not even 1 month!) That I have encountered problems with Instagram.
Review 5OriginalJe suis dans l’incapacité de me connecter sur mon compte car le site ne reconnaît pas mon adresse mail. J’ai vérifier son orthographe mais toujours rien. Je me connecte alors en utilisant mon nom d’utilisateur, je suis redirigé vers une page disant qu’une connexion suspecte à été détectée, d’aller sur la page d’aide afin de pouvoir me connecter. Là aucune information ne correspond à mon cas. Je ne peux pas non plus créer un nouveau compte parce que là mon adresse mail est reconnue…
TranslatedI am unable to log into my account because the site does not recognize my email address. I checked his spelling but still nothing. I then connect using my username, I am redirected to a page saying that a suspicious connection has been detected, to go to the help page so that I can connect. There no information corresponds to my case. I also cannot create a new account because my email address is recognized there …
Review 6Originalj’aime cette application d’Instagram. Je conseil énergiquement de surfer sur ce réseau social…il faut toujours soutenir toutes initiatives qui conduisent à la communication, à tout moment je peux avoir accès à mes ancienne photo, c’est vraiment bien.
TranslatedI like this Instagram app. I strongly advise to surf on this social network … you must always support all initiatives that lead to communication, at any time I can have access to my old photo, it’s really good.
Review 7OriginalÇa fait bien 3 ou 4 fois que mon compte est repris ou piraté par un tiers, je ne sais plus me connecter et quand je recherche mon profil il est attribué à quelqu’un d’autre. Impossible de joindre quelqu’un chez Instagram qui pourrait m’aider. M’expliquer pourquoi ça arrive et pourquoi autant de fois? Soit je deviens parano soit il y a une explication… Soit j’arrête Instagram pour de bon.
TranslatedIt’s been 3 or 4 times that my account is taken over or hacked by a third party, I no longer know how to log in and when I search for my profile it is assigned to someone else. Can’t reach someone on Instagram who could help me. Explain to me why it happens and why so many times? Either I become paranoid or there is an explanation … Either I stop Instagram for good.
Review 8OriginalTrès déçu de Instagram récemment. Je ne parviens pas à me connecter à mon compte car l’utilisateur n’existe pas. Mais je ne peux pas créer d’autres compte car mon adresse email est déjà utilisée !! veuillez régler ce problème MAJEUR quu m’empêche d’utiliser votre application.
TranslatedVery disappointed with Instagram recently. I cannot connect to my account because the user does not exist. But I cannot create other accounts because my email address is already used !! Please resolve this MAJOR problem that prevents me from using your application.
Review 9OriginalDepuis la dernière mise à jour, les conversations privées sont impraticables. Les messages prennent beaucoup plus de place, les images et les gifs prennent absolument toute la page, les déformant, et rendant la conversation illisible et surtout, il est devenu impossible de cliquer dessus pour mieux les voir. Si vous pouviez régler rapidement ce problème car ce n’est pas la première fois qu’il y a des bugs après de MAJ et ça arrive de plus en plus souvent, ça en dit long sur l’intérêt que vous portez à votre appli…
TranslatedSince the last update, private conversations have been impractical. The messages take up much more space, the images and gifs take up the whole page, distorting them, and making the conversation unreadable and above all, it has become impossible to click on them to better see them. If you could quickly resolve this problem because it is not the first time that there are bugs after update and it happens more and more often, it says a lot about the interest you have in your app…
Review 10OriginalÇa fait déjà plusieurs années que je suis sur instagram et je n’ai jamais été insatisfait de ce réseau social. Si je devais vous en recommander un, ce serait celui-ci. Cette application permet de poster de publications d’une manière simple et fluide, de plus nous disposons de filtres assez sympas. Vraiment cool!
TranslatedI have been on Instagram for several years now and I have never been dissatisfied with this social network. If I had to recommend one, it would be this. This application allows you to post publications in a simple and fluid way, plus we have pretty cool filters. Really cool!

References

  1. Rasool, G.; Ali, A. Recovering Android Bad Smells from Android Applications. Arab. J. Sci. Eng. 2020, 1–27. [Google Scholar] [CrossRef]
  2. O’Dea, S. Global Market Share Smartphone Operating Systems of Unit Shipments 2014–2023; Technology Telecommunications: Lanzhou, China, 2020; Available online: https://www.statista.com/statistics/272307/market-share-forecast-for-smartphone-operating-systems/ (accessed on 12 July 2020).
  3. My Android Apps. Google, USA. 2020. Available online: https://play.google.com/apps (accessed on 20 July 2020).
  4. The AppInChina App Store Index. AppInChina, China. 2020. Available online: https://www.appinchina.co/market/app-stores/ (accessed on 27 July 2020).
  5. Anzhi Market. Anzhi, China. 2020. Available online: http://www.anzhi.com/ (accessed on 28 July 2020).
  6. Number of Available Applications in the Google Play Store from December 2009 to December 2019; Statista: Hamburg, Germany, 2020; Available online: https://www.statista.com/statistics/266210/number-of-available-applications-in-the-google-play-store/ (accessed on 27 July 2020).
  7. Pan, Y.; Ge, X.; Fang, C.; Fan, Y. A Systematic Literature Review of Android Malware Detection Using Static Analysis. IEEE Access 2020, 8, 116363–116379. [Google Scholar] [CrossRef]
  8. Alazab, M.; Alazab, M.; Shalaginov, A.; Mesleh, A.; Awajan, A. Intelligent mobile malware detection using permission requests and API calls. Future Gener. Comput. Syst. 2020, 107, 509–521. [Google Scholar] [CrossRef]
  9. Taheri, R.; Ghahramani, M.; Javidan, R.; Shojafar, M.; Pooranian, Z.; Conti, M. Similarity-based Android malware detection using Hamming distance of static binary features. Future Gener. Comput. Syst. 2020, 105, 230–247. [Google Scholar] [CrossRef] [Green Version]
  10. Tchakounté, F.; Hayata, F. Supervised Learning Based Detection of Malware on Android. In Mobile Security and Privacy: Advances, Challenges and Future Research Directions; Syngress Publishing: Rockland, MA, USA, 2017; pp. 101–154. [Google Scholar] [CrossRef]
  11. Tchakounté, F.; Djakene Wandala, A.; Tiguiane, Y. Detection of Android Malware based on Sequence Alignment of Permissions. Int. J. Comput. (IJC) 2019, 35, 26–36. [Google Scholar]
  12. De Lorenzo, A.; Martinelli, F.; Medvet, E.; Mercaldo, F.; Santone, A. Visualizing the outcome of dynamic analysis of Android malware with VizMal. J. Inf. Secur. Appl. 2020, 50, 102423. [Google Scholar] [CrossRef]
  13. Gajrani, J.; Laxmi, V.; Tripathi, M.; Gaur, M.S.; Zemmari, A.; Mosbah, M.; Conti, M. Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. In Advances in Computers; Academic Press Inc.: Cambridge, MA, USA, 2020; Volume 119, pp. 73–120. [Google Scholar] [CrossRef]
  14. Abdullah, Z.; Muhadi, F.W.; Saudi, M.M.; Hamid, I.R.A.; Foozy, C.F.M. Android Ransomware Detection Based on Dynamic Obtained Features. In Advances in Intelligent Systems and Computing; Springer: Berlin/Heidelberg, Germany, 2020; Volume 978 AISC, pp. 121–129. [Google Scholar] [CrossRef]
  15. Tang, J.; Li, R.; Wang, K.; Gu, X.; Xu, Z. A novel hybrid method to analyze security vulnerabilities in android applications. Tsinghua Sci. Technol. 2020, 25, 589–603. [Google Scholar] [CrossRef]
  16. Raghuraman, C.; Suresh, S.; Shivshankar, S.; Chapaneri, R. Static and dynamic malware analysis using machine learning. In Advances in Intelligent Systems and Computing; Springer: Berlin/Heidelberg, Germany, 2020; Volume 1045, pp. 793–806. [Google Scholar] [CrossRef]
  17. Wang, Y.; Xu, G.; Liu, X.; Mao, W.; Si, C.; Pedrycz, W.; Wang, W. Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis. J. Syst. Softw. 2020, 167, 110609. [Google Scholar] [CrossRef]
  18. Alzaylaee, M.K.; Yerima, S.Y.; Sezer, S. DL-Droid: Deep learning based android malware detection using real devices. Comput. Secur. 2020, 89, 101663. [Google Scholar] [CrossRef]
  19. Woods, D.W.; Moore, T. Cyber Warranties: Market Fix or Marketing Trick? Commun. ACM 2020, 63, 104–107. [Google Scholar] [CrossRef] [Green Version]
  20. Hendrikx, F.; Bubendorfer, K.; Chard, R. Reputation systems: A survey and taxonomy. J. Parallel Distrib. Comput. 2015, 75, 184–197. [Google Scholar] [CrossRef]
  21. Islam, M.R. Numeric rating of Apps on Google Play Store by sentiment analysis on user reviews. In Proceedings of the 1st International Conference on Electrical Engineering and Information and Communication Technology, ICEEICT 2014, Dhaka, Bangladesh, 10–12 April 2014; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2014. [Google Scholar] [CrossRef]
  22. Mojica Ruiz, I.J.; Nagappan, M.; Adams, B.; Berger, T.; Dienst, S.; Hassan, A.E. Examining the Rating System Used in Mobile-App Stores. IEEE Softw. 2016, 33, 86–92. [Google Scholar] [CrossRef]
  23. Genc-Nayebi, N.; Abran, A. A systematic literature review: Opinion mining studies from mobile app store user reviews. J. Syst. Softw. 2017, 125, 207–219. [Google Scholar] [CrossRef]
  24. Ehsan, N.; Kelly, L. A survey of utilizing user-reviews posted on Google play store. In Proceedings of the the 29th Annual International Conference on Computer Science and Software Engineering, CASCON’19, Toronto, ON, Canada, 4–6 November 2019; ACM: Toronto, ON, Canada, 2019; pp. 54–63. [Google Scholar] [CrossRef]
  25. Ureña, R.; Kou, G.; Dong, Y.; Chiclana, F.; Herrera-Viedma, E. A review on trust propagation and opinion dynamics in social networks and group decision making frameworks. Inf. Sci. 2019, 478, 461–475. [Google Scholar] [CrossRef]
  26. Alshehri, A.; Marcinek, P.; Alzahrani, A.; Alshahrani, H.; Fu, H. Puredroid: Permission Usage and Risk Estimation for Android Applications; ACM International Conference Proceeding Series; Association for Computing Machinery: New York, NY, USA, 2019; pp. 179–184. [Google Scholar] [CrossRef]
  27. Li, J.; Sun, L.; Yan, Q.; Li, Z.; Srisa-An, W.; Ye, H. Significant Permission Identification for Machine-Learning-Based Android Malware Detection. IEEE Trans. Ind. Inform. 2018, 14, 3216–3225. [Google Scholar] [CrossRef]
  28. Xiao, J.; Chen, S.; He, Q.; Feng, Z.; Xue, X. An Android application risk evaluation framework based on minimum permission set identification. J. Syst. Softw. 2020, 163, 110533. [Google Scholar] [CrossRef] [Green Version]
  29. Bashir, M.A.; Arshad, S.; Robertson, W.; Wilson, C. Tracing Information Flows Between Ad Exchanges Using Retargeted Ads. In Proceedings of the the 25th USENIX Conference on Security Symposium, SEC’16, Austin, TX, USA, 10–12 August 2016; ACM: Austin, TX, USA, 2016; pp. 481–496. [Google Scholar]
  30. Sun, M.; Wei, T.; Lui, J.C. TaintART: A practical multi-level information-flow tracking system for Android RunTime. In Proceedings of the ACM Conference on Computer and Communications Security, New York, NY, USA, 24–28 October 2016; Association for Computing Machinery: New York, NY, USA, 2016; pp. 331–342. [Google Scholar] [CrossRef]
  31. Day, M.Y.; Lin, Y.D. Deep learning for sentiment analysis on google play consumer review. In Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, IRI 2017, San Diego, CA, USA, 4–6 August 2017; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2017; pp. 382–388. [Google Scholar] [CrossRef]
  32. Karim, A.; Azhari, A.; Belhaouri, S.B.; Qureshi, A.A. Machine Learning Algorithm’s Measurement and Analytical Visualization of User’s Reviews for Google Play Store. Preprints 2020. [Google Scholar] [CrossRef] [Green Version]
  33. Oyebode, O.; Alqahtani, F.; Orji, R. Using Machine Learning and Thematic Analysis Methods to Evaluate Mental Health Apps Based on User Reviews. IEEE Access 2020, 8, 111141–111158. [Google Scholar] [CrossRef]
  34. Guzman, E.; Maalej, W. How do users like this feature? A fine grained sentiment analysis of App reviews. In Proceedings of the 2014 IEEE 22nd International Requirements Engineering Conference, RE 2014-Proceedings, Karlskrona, Sweden, 25–29 August 2014; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2014; pp. 153–162. [Google Scholar] [CrossRef]
  35. Li, X.; Zhang, B.; Zhang, Z.; Stefanidis, K. A Sentiment-Statistical Approach for Identifying Problematic Mobile App Updates Based on User Reviews. Information 2020, 11, 152. [Google Scholar] [CrossRef] [Green Version]
  36. Khalid, H.; Shihab, E.; Nagappan, M.; Hassan, A.E. What do mobile app users complain about? IEEE Softw. 2015, 32, 70–77. [Google Scholar] [CrossRef]
  37. Gu, X.; Kim, S. What parts of your apps are loved by users? In Proceedings of the 2015 30th IEEE/ACM International Conference on Automated Software Engineering, ASE 2015, Lincoln, NE, USA, 9–13 November 2015; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2015; pp. 760–770. [Google Scholar] [CrossRef]
  38. Nguyen, D.C.; Derr, E.; Backes, M.; Bugiel, S. Short text, large effect: Measuring the impact of user reviews on android app security & privacy. In Proceedings of the IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 19–23 May 2019; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2019; pp. 555–569. [Google Scholar] [CrossRef]
  39. Palomba, F.; Salza, P.; Ciurumelea, A.; Panichella, S.; Gall, H.; Ferrucci, F.; De Lucia, A. Recommending and Localizing Change Requests for Mobile Apps Based on User Reviews. In Proceedings of the 2017 IEEE/ACM 39th International Conference on Software Engineering, ICSE 2017, Buenos Aires, Argentina, 20–28 May 2017; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2017; pp. 106–117. [Google Scholar] [CrossRef] [Green Version]
  40. Fu, B.; Lin, J.; Liy, L.; Faloutsos, C.; Hong, J.; Sadeh, N. Why people hate your App-Making sense of user feedback in a mobile app store. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Chicago, IL, USA, 11–14 August 2013; Association for Computing Machinery: New York, NY, USA, 2013; Volume Part F128815, pp. 1276–1284. [Google Scholar] [CrossRef]
  41. Villarroel, L.; Bavota, G.; Russo, B.; Oliveto, R.; Di Penta, M. Release planning of mobile apps based on user reviews. In Proceedings of the International Conference on Software Engineering, IEEE Computer Society, Austin, TX, USA, 14–22 May 2016; pp. 14–24. [Google Scholar] [CrossRef]
  42. Gao, C.; Zeng, J.; Lyu, M.R.; King, I. Online App Review Analysis for Identifying Emerging Issues; Association for Computing Machinery (ACM): New York, NY, USA, 2018; pp. 48–58. [Google Scholar] [CrossRef]
  43. Gao, C.; Wang, B.; He, P.; Zhu, J.; Zhou, Y.; Lyu, M.R. PAID: Prioritizing App Issues for Developers by Tracking User Reviews over Versions. In Proceedings of the 2015 IEEE 26th International Symposium on Software Reliability Engineering, ISSRE 2015, Gaithersburg, MD, USA, 2–5 November 2015; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2015; pp. 35–45. [Google Scholar] [CrossRef]
  44. Yu, L.; Chen, J.; Zhou, H.; Luo, X.; Liu, K. Localizing function errors in mobile apps with user reviews. In Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN, Luxembourg, 25–28 June 2018; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2018; pp. 418–429. [Google Scholar] [CrossRef]
  45. Hatamian, M.; Serna, J.; Rannenberg, K. Revealing the unrevealed: Mining smartphone users privacy perception on app markets. Comput. Secur. 2019, 83, 332–353. [Google Scholar] [CrossRef] [Green Version]
  46. Tao, C.; Guo, H.; Huang, Z. Identifying security issues for mobile applications based on user review summarization. Inf. Softw. Technol. 2020, 122, 106290. [Google Scholar] [CrossRef]
  47. Tesfay, W.B.; Booth, T.; Andersson, K. Reputation based security model for android applications. In Proceedings of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012-11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012, Liverpool, UK, 25–27 June 2012; pp. 896–901. [Google Scholar] [CrossRef] [Green Version]
  48. Chowdhury, N.S.; Raje, R.R. SERS: A security-related and evidence-based ranking scheme for mobile apps. In Proceedings of the 1st IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2019, Los Angeles, CA, USA, 12–14 December 2019; Institute of Electrical and Electronics Engineers Inc.: Piscataway, NJ, USA, 2019; pp. 130–139. [Google Scholar] [CrossRef]
  49. Kumar, S.; Shukla, S.K. The State of Android Security; Springer: Singapore, 2020; pp. 17–22. [Google Scholar] [CrossRef]
  50. Tchakounté, F.; Ndjeumou Ngassi, R.C.; Kamla, V.C.; Udagepola, K.P. LimonDroid: A system coupling three signature-based schemes for profiling Android malware. Iran J. Comput. Sci. 2020, 1–20. [Google Scholar] [CrossRef]
  51. Karim, A.; Azhari, A.; Aldabbas, H.; Alruily, M.; Belhaouri, S.B.; Qureshi, A.A. Classification of Google Play Store Application Reviews Using Machine Learning. Preprints 2020. [Google Scholar] [CrossRef] [Green Version]
  52. Liu, D. Google Play Store Application Scraper. MIT, USA. 2019. Available online: https://github.com/danieliu/play-scraper (accessed on 25 July 2020).
  53. App Review & Ratings Analysis for Mobile Teams. AppBot, Australia. 2020. Available online: https://appbot.co/ (accessed on 27 July 2020).
  54. Vidas, T.; Votipka, D.; Christin, N. All your droid are belong to us: A survey of current android attacks. In Proceedings of the 5th USENIX Conference on Offensive technologies (WOOT’11), San Francisco, CA, USA, 8 August 2011; p. 10. [Google Scholar]
  55. Tourette, A. Advanced SEO Tool. Alyze, France. 2020. Available online: https://en.alyze.info/ (accessed on 27 July 2020).
  56. Keyword Tool. Keywordtool, Hong Kong. 2020. Available online: https://keywordtool.io/ (accessed on 27 July 2020).
  57. Haryanto, B.; Ruldeviyani, Y.; Rohman, F.; Julius Dimas, T.N.; Magdalena, R.; Muhamad Yasil, F. Facebook analysis of community sentiment on 2019 Indonesian presidential candidates from Facebook opinion data. Procedia Comput. Sci. 2019, 161, 715–722. [Google Scholar] [CrossRef]
  58. Miettinen, O.; Steurer, J.; Hofman, A. The Bayes’ Theorem Framework for Diagnostic Research. In Clinical Research Transformed; Springer Publishing: Berlin/Heidelberg, Germany, 2019; pp. 109–114. [Google Scholar] [CrossRef]
  59. Natural Language Toolkit. 2020. Available online: https://www.nltk.org/ (accessed on 25 July 2020).
  60. Raybaut, P. SpiderLib. 2020. Available online: https://github.com/jromang/spyderlib (accessed on 27 July 2020).
Figure 1. Research design.
Figure 1. Research design.
Futureinternet 12 00145 g001
Figure 2. Excerpt of critical words of the Instagram application.
Figure 2. Excerpt of critical words of the Instagram application.
Futureinternet 12 00145 g002
Figure 3. Result of the analysis of a review.
Figure 3. Result of the analysis of a review.
Futureinternet 12 00145 g003
Figure 4. Reputation-based security vs. reputation-based functionality.
Figure 4. Reputation-based security vs. reputation-based functionality.
Futureinternet 12 00145 g004
Table 1. Polarity of reviews related to the security of the Instagram application.
Table 1. Polarity of reviews related to the security of the Instagram application.
ReviewsPositive Polarity (%)Negative Polarity (%)
C10.220.78
C20.160.84
C30.270.73
C40.310.69
C50.320.68
C60.510.49
C70.360.64
C80.330.67
C90.220.78
C100.640.36
Table 2. Distribution of security-related keywords.
Table 2. Distribution of security-related keywords.
SentimentConfidentiality Related WordsIntegrity WordsAuthentication Related WordsAvailability Related Words
C1Negative2001
C2Negative0102
C3Negative0101
C4Negative0001
C5Negative0011
C6Positive0101
C7Negative1101
C8Negative0012
C9Negative1102
C10Positive0102
Table 3. Determination of ( α i , β i ).
Table 3. Determination of ( α i , β i ).
ReviewsPolarity Index (+/−) N pos ( α ) N neg ( β )
Con.Int.Aut.Ava.Con.Int.Aut.Ava.
C10.15000.070.52000.26
C200.0500.1100.2800.56
C300.1300.1400.3600.37
C40000.310000.69
C5000.150.17000.330.35
C6+00.2500.2600.2400.25
C70.120.1200.120.210.2100.22
C8000.110.22000.220.45
C90.060.0500.110.200.1900.39
C10+00.2100.4300.1200.24
Total: α C α I α A α D β C β I β A β D
Table 4. Dataset characteristics.
Table 4. Dataset characteristics.
ApplicationCategorySecurity Related ReviewsFunctionality Related ReviewsRating
InstagramSocial media1002,288,4024.5
FacebookSocial media1501,479,7794.2
CICFinance9017154.7
MessengerCommunication150101,0654.2
SGC ConnectFinance6104.2
WhatappCommunication1502,824,9364.3
QR scannerTools8011,0264.7
EcobankFinance1506433.5
Clean MasterSecurity tools98139,0704.5
Security MasterSecurity tools10378,8402.8
Age Scanner FingerEntertainment1051182.3
Express UnionFinance13133.6
BICEC MobileFinance253.8
Table 5. Reputation in terms of security; −: negative, +: positive.
Table 5. Reputation in terms of security; −: negative, +: positive.
ApplicationNumber Security Related ReviewsApplication PolarityE ( p α , β ) SecurityE (p α , β ) by Security Service
Con.Int.Aut.Ava.
Instagram1000.400.360.450.320.47
Facebook1500.310.420.360.110.33
CIC900.230.120.340.180.26
Messenger150+0.510.570.430.370.66
SGC Connect60.180.130.250.150.17
Whatapp150+0.580.380.580.680.67
QR scanner80+0.510.460.570.340.68
Ecobank1500.300.520.330.110.22
Clean Master980.390.430.380.190.43
Security Master1030.420.210.350.670.43
Age Scanner Finger1050.190.010.080.10.56
Express Union130.410.430.330.640.23
BICEC Mobile20.410.340.470.450.38
Table 6. Reputation in terms of functionality.
Table 6. Reputation in terms of functionality.
ApplicationsNumber of ReviewsPositive Sentiments (%)Negative Sentiments (%)E (p α , β ) Functionality
Instagram2,288,40275%25%0.75
Facebook1,479,77963%37%0.63
CIC171576%24%0.76
Messenger1,010,76565%35%0.65
SGC Connect1050%50%0.50
Whatapp2,824,93670%30%0.70
QR scanner11,02682%18%0.82
Ecobank64343%57%0.43
Clean Master139,07083%17%0.83
Sécurity Master78.84086%14%0.86
Age Scanner Finger1185%95%0.05
Express Union1315%85%0.15
BICEC Mobile560%40%0.60
Table 7. Results about reputation and rating without gaps.
Table 7. Results about reputation and rating without gaps.
App CharacteristicsOur ModelSERSGoogle
App Id#Total
Reviews
#Security
Reviews
Global
Reputation (R1)
Con.
R11
Int.
R12
Aut.
R13
Ava.
R14
Rating Based
Reviews (R2)
Rating Based Static
Analysis (R3)
Global Rating
(R4)
Traditional
Rating (R5)
12573211.91.72.61.01.84.094.223.664.1
2258652.21.82.43.02.04.443.983.954.6
32590521.71.61.91.61.84.214.083.824.5
42567411.61.51.71.71.94.234.463.864.5
52598281.61.81.41.51.64.374.924.464.5
62586621.61.61.81.61.52.814.513.434.3
72566241.81.52.11.81.54.224.373.954.1
82546221.61.61.41.61.74.322.814.524.4
92578371.61.61.71.71.53.794.222.514
102580401.71.61.81.81.63.614.324.254.1
112572541.61.61.51.61.84.273.794.194.6
122598431.71.81.51.71.53.913.613.444.6
132500421.61.51.81.51.63.514.273.294.2
142598431.71.71.61.81.72.793.913.894.2
152552651.71.61.61.91.73.323.512.554.1
Average2573391.701.631.781.721.683.854.063.714
Table 8. Results about reputation and rating with gaps.
Table 8. Results about reputation and rating with gaps.
Our SchemeSERSGoogleGaps
App Id# Total
Reviews
# Security
Reviews
Global Reputation
(R1)
Rating Based
Reviews (R2)
Rating Based Static
Analysis (R3)
Global
Rating (R4)
Traditional
Rating (R5)
Gap
R1-R2
Gap
R1-R3
Gap
R1-R4
Gap
R1-R5
12573211.94.094.223.664.12.192.321.762.2
2258652.24.443.983.954.62.241.781.752.4
32590521.74.214.083.824.52.512.382.122.8
42567411.64.234.463.864.52.632.862.262.9
52598281.64.374.924.464.52.773.322.862.9
62586621.62.814.513.434.31.212.911.832.7
72566241.84.224.373.954.12.422.572.152.3
82546221.64.322.814.524.42.721.212.922.8
92578371.63.794.222.5142.192.620.912.4
102580401.73.614.324.254.11.912.622.552.4
112572541.64.273.794.194.62.672.192.593
122598431.73.913.613.444.62.211.911.742.9
132500421.63.514.273.294.21.912.671.692.6
142598431.72.793.913.894.21.092.212.192.5
152552651.73.323.512.554.11.621.810.852.4
Average2573391.703.854.063.7142.152.352.012.61
Table 9. Security-related reviews of app ID #2.
Table 9. Security-related reviews of app ID #2.
Reviews
app 2it’s always in my apps using my data, even after I uninstalled it and I am sick of it. been hacked
Very very disappointing app don’t install this video app % fake
it’s a after thought a copy cat FaceTime…. where is your imagination???? and what’s up with all the animation and Kitty shows this is supposed to be Facebook not fake book not babysitter book the mon where is the news we used to have the party that used to have the fun Facebook used to be now it’s just bogus people are raising their beers and their fingers to the whole it would have been better had it been passed off as a lesbian game show 0h. …………). yyyb be by
always crashes and video never clear st
Receiving calls causes crashing of the app.
Table 10. SRR-Miner keywords vs. our approach’s keywords. Conf.: confidentiality, Int.: Integrity, Auth.: Authentication, Avail.: Availability.
Table 10. SRR-Miner keywords vs. our approach’s keywords. Conf.: confidentiality, Int.: Integrity, Auth.: Authentication, Avail.: Availability.
# Security ReviewGlobal ReputationConf. ReputationInt. ReputationAuth. ReputationAvail. Reputation
App ID# Total Reviews121212121212
1257321261.91.81.71.72.62.611.51.81.7
22586592.22.21.81.82.42.832.122.8
3259052411.71.71.61.61.91.61.61.71.82
4256741321.61.71.51.51.71.81.71.71.91.9
5259828431.61.61.81.71.41.51.51.81.61.3
6258662781.61.61.61.71.81.71.61.61.51.5
7256624351.81.71.51.72.11.81.81.51.51.7
8254622301.61.61.61.61.41.71.61.81.71.8
9257837291.61.71.61.71.71.81.71.61.51.7
10258040311.72.41.62.21.82.61.82.21.62.9
11257254681.61.71.61.81.51.71.61.51.82.1
12259843571.71.61.81.61.51.81.71.51.51.9
13250042341.61.71.51.51.81.81.51.71.61.7
14259843391.71.71.71.71.61.61.81.81.71.5
15255265811.71.61.61.61.61.61.91.81.71.6
Average2572.738.642.21.701.751.631.691.781.891.721.721.681.87

Share and Cite

MDPI and ACS Style

Tchakounté, F.; Yera Pagor, A.E.; Kamgang, J.C.; Atemkeng, M. CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews. Future Internet 2020, 12, 145. https://doi.org/10.3390/fi12090145

AMA Style

Tchakounté F, Yera Pagor AE, Kamgang JC, Atemkeng M. CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews. Future Internet. 2020; 12(9):145. https://doi.org/10.3390/fi12090145

Chicago/Turabian Style

Tchakounté, Franklin, Athanase Esdras Yera Pagor, Jean Claude Kamgang, and Marcellin Atemkeng. 2020. "CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews" Future Internet 12, no. 9: 145. https://doi.org/10.3390/fi12090145

APA Style

Tchakounté, F., Yera Pagor, A. E., Kamgang, J. C., & Atemkeng, M. (2020). CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews. Future Internet, 12(9), 145. https://doi.org/10.3390/fi12090145

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop