Skip to main content

2023 | OriginalPaper | Buchkapitel

A Mobile Data Leakage Prevention System Based on Encryption Algorithms

verfasst von : Wen Shen, Hongzhang Xiong

Erschienen in: Big Data and Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile Internet is an emerging field that is developing rapidly. However, the frequent data leakage events caused by the security problems of mobile Internet have brought great impact to enterprises and individuals. Cryptography is promising way for data security and is widely used in the industries such as power systems. How to effectively use data encryption algorithms in the field of mobile Internet to meet the security requirements of data sharing is a problem to be solved. Therefore, this paper proposes a mobile data leakage prevention system that adopts the encryption algorithms SM3 and SM4 that are approved by the State Cryptography Administration of China. The cipher-text retrieval model is proposed for secure data sharing between data owner and data user via cloud servers. The system model that is built based on the studied encryption algorithms and models is describe. Additional functions are also designed for mobile data leakage prevention such as data security management and security data analysis. The proposed system is expected protect the data transmission, storage and sharing between data owner, data user and cloud server, providing an architecture to build a security mechanism to lower the risks from data theft, eavesdropping and tampering.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cheng, X., Fang, L., Yang, L., Cui, S.: Mobile big data: the fuel for data-driven wireless. IEEE Internet Things J. 4(5), 1489–1516 (2017)CrossRef Cheng, X., Fang, L., Yang, L., Cui, S.: Mobile big data: the fuel for data-driven wireless. IEEE Internet Things J. 4(5), 1489–1516 (2017)CrossRef
2.
Zurück zum Zitat Yin, X., He, J., Gao, Y., Li, J.: Multi-source data analysis method of exhibition site based on mobile internet. Int. Wireless Commun. Mobile Comput. (IWCMC) 2021, 41–44 (2021)CrossRef Yin, X., He, J., Gao, Y., Li, J.: Multi-source data analysis method of exhibition site based on mobile internet. Int. Wireless Commun. Mobile Comput. (IWCMC) 2021, 41–44 (2021)CrossRef
3.
Zurück zum Zitat Zhang, Q.: An overview and analysis of hybrid encryption: the combination of symmetric encryption and asymmetric encryption. In: 2021 2nd International Conference on Computing and Data Science (CDS), pp. 616–622 (2021) Zhang, Q.: An overview and analysis of hybrid encryption: the combination of symmetric encryption and asymmetric encryption. In: 2021 2nd International Conference on Computing and Data Science (CDS), pp. 616–622 (2021)
4.
Zurück zum Zitat Zheng, X., Xu, C., Hu, X., Zhang, Y., Xiong, X.: The software/hardware co-design and implementation of SM2/3/4 encryption/decryption and digital signature System. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10), 2055–2066 (2020)CrossRef Zheng, X., Xu, C., Hu, X., Zhang, Y., Xiong, X.: The software/hardware co-design and implementation of SM2/3/4 encryption/decryption and digital signature System. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10), 2055–2066 (2020)CrossRef
5.
Zurück zum Zitat Atmaja, I.M.A.D.S., Astawa, I.N.G.A., Wisswani, N.W., Nugroho, I.M.R.A., Sunu, P.W., Wiratama, I.K.: Document encryption through asymmetric RSA cryptography. Int. Conf. Appl. Sci. Technol. (iCAST) 2020, 46–49 (2020) Atmaja, I.M.A.D.S., Astawa, I.N.G.A., Wisswani, N.W., Nugroho, I.M.R.A., Sunu, P.W., Wiratama, I.K.: Document encryption through asymmetric RSA cryptography. Int. Conf. Appl. Sci. Technol. (iCAST) 2020, 46–49 (2020)
6.
Zurück zum Zitat Rajeshwaran, K., Kumar, K.A.: Cellular automata based hashing algorithm (cabha) for strong cryptographic hash function. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–6 (2019) Rajeshwaran, K., Kumar, K.A.: Cellular automata based hashing algorithm (cabha) for strong cryptographic hash function. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–6 (2019)
7.
Zurück zum Zitat Li, T., et al.: Energy-efficient and secure communication toward UAV networks. IEEE Internet Things J. 9(12), 10061–10076 (2022)MathSciNetCrossRef Li, T., et al.: Energy-efficient and secure communication toward UAV networks. IEEE Internet Things J. 9(12), 10061–10076 (2022)MathSciNetCrossRef
8.
Zurück zum Zitat Jin, C., Zeng, Z., Miao, W., Bao, Z., Zhang, R.: A nonlinear white-box SM4 implementation applied to edge IoT agents. In: 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2), pp. 3358–3363 (2021) Jin, C., Zeng, Z., Miao, W., Bao, Z., Zhang, R.: A nonlinear white-box SM4 implementation applied to edge IoT agents. In: 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2), pp. 3358–3363 (2021)
9.
Zurück zum Zitat Liu, D., Wang, R., Zhang, H., Chen, J., Liu, X., Ma, L.: Research on terminal security technology of ubiquitous power internet of things based on PUF and SM3. In: 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2), pp. 910–915 ( 2019) Liu, D., Wang, R., Zhang, H., Chen, J., Liu, X., Ma, L.: Research on terminal security technology of ubiquitous power internet of things based on PUF and SM3. In: 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2), pp. 910–915 ( 2019)
10.
Zurück zum Zitat Wang, T., et al.: The research of the SM2, SM3 and SM4 Algorithms in WLAN of transformer substation. In: 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE), pp. 276–283 (2019) Wang, T., et al.: The research of the SM2, SM3 and SM4 Algorithms in WLAN of transformer substation. In: 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE), pp. 276–283 (2019)
11.
Zurück zum Zitat Zang, S., et al.: IEEE 5th advanced information technology. Electron. Autom. Control Conf. (IAEAC) 2021, 915–919 (2021) Zang, S., et al.: IEEE 5th advanced information technology. Electron. Autom. Control Conf. (IAEAC) 2021, 915–919 (2021)
12.
Zurück zum Zitat Liu, Y., Zhao, R., Han, L., Xie, J.: Research and implementation of parallel optimization of SM3 algorithm based on multithread. In: 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), pp. 330–33 (2022) Liu, Y., Zhao, R., Han, L., Xie, J.: Research and implementation of parallel optimization of SM3 algorithm based on multithread. In: 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), pp. 330–33 (2022)
13.
Zurück zum Zitat Feng, X., Ma, J., Liu, S., Miao, Y., Liu, X., Choo, K.-K.R.: Transparent ciphertext retrieval system supporting integration of encrypted heterogeneous database in cloud-assisted IoT. IEEE Internet Things J. 9(5), 3784–3798 (2022)CrossRef Feng, X., Ma, J., Liu, S., Miao, Y., Liu, X., Choo, K.-K.R.: Transparent ciphertext retrieval system supporting integration of encrypted heterogeneous database in cloud-assisted IoT. IEEE Internet Things J. 9(5), 3784–3798 (2022)CrossRef
14.
Zurück zum Zitat He, H., Chen, R., Liu, C., Feng, K., Zhou, X.: An efficient ciphertext retrieval scheme based on homomorphic encryption for multiple data owners in hybrid cloud. IEEE Access 9, 168547–168557 (2021)CrossRef He, H., Chen, R., Liu, C., Feng, K., Zhou, X.: An efficient ciphertext retrieval scheme based on homomorphic encryption for multiple data owners in hybrid cloud. IEEE Access 9, 168547–168557 (2021)CrossRef
Metadaten
Titel
A Mobile Data Leakage Prevention System Based on Encryption Algorithms
verfasst von
Wen Shen
Hongzhang Xiong
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-3300-6_40

Premium Partner