Skip to main content
Top

2019 | OriginalPaper | Chapter

A Data Protection Scheme via Isolating Android Partitions

Authors : Kai Yang, Xiaoya Ma, Hongwei Jiang, Yuan Xue, Wencong Han, Lianfang Wang, Lu Liu

Published in: Cyberspace Safety and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the continuous development of Android devices, the sensitive data of users have been leaked and maliciously deleted. In this article, a data security protection scheme based on TF card is designed to meet the security requirements of the physical isolation of data in different scenarios for users. The advantage of the scheme is that the data protection is not achieved by using chips or other peripheral devices. In order to achieve this goal, the scheme builds an ecosystem exactly like the normal system on the TF card. This article introduces the design and implementation of the private zone. The prototype of the private zone is realized on the Android related mobile phones and can be easily transplanted to other Android embedded devices. At the same time, in order to illustrate the usage and security of the private zone, this article makes some experiments to evaluate the performance cost between the normal system and the private zone. Experimental results show that this method has reasonable performance and can effectively reduce the risk of sensitive information leakage.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bahis, K.: Mobile internet connection status in 2018. GSM Assoc. 2(5), 1–63 (2018) Bahis, K.: Mobile internet connection status in 2018. GSM Assoc. 2(5), 1–63 (2018)
3.
go back to reference Liang, C., Tan, Y.-a., Zhang, X., Wang, X., Zheng, J., Zhang, Q.: Building packet length covert channel over mobile VoIP traffics. J. Netw. Comput. Appl. 118, 144–153 (2018) Liang, C., Tan, Y.-a., Zhang, X., Wang, X., Zheng, J., Zhang, Q.: Building packet length covert channel over mobile VoIP traffics. J. Netw. Comput. Appl. 118, 144–153 (2018)
4.
go back to reference Liang, C., Wang, X., Zhang, X., Zhang, Y., Sharif, K., Tan, Y.-a.: A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf. Sci. 465, 162–173 (2018) Liang, C., Wang, X., Zhang, X., Zhang, Y., Sharif, K., Tan, Y.-a.: A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf. Sci. 465, 162–173 (2018)
5.
go back to reference Gu, J., Li, C., et al.: Combination attack of android apps analysis scheme based on privacy leak. In: Proceedings of 2016 4th IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS 2016, pp. 62–66 (2016) Gu, J., Li, C., et al.: Combination attack of android apps analysis scheme based on privacy leak. In: Proceedings of 2016 4th IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS 2016, pp. 62–66 (2016)
6.
go back to reference Short, A., Li, F.: Android smartphone third party advertising library data leak analysis. In: Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014, pp. 749–754 (2015) Short, A., Li, F.: Android smartphone third party advertising library data leak analysis. In: Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014, pp. 749–754 (2015)
7.
go back to reference Tan, Y.-a., Zhang, X., Sharif, K., Liang, C., Zhang, Q., Li, Y.: Covert timing channels for IoT over mobile networks. IEEE Wirel. Commun. 25(6), 38–44 (2018) Tan, Y.-a., Zhang, X., Sharif, K., Liang, C., Zhang, Q., Li, Y.: Covert timing channels for IoT over mobile networks. IEEE Wirel. Commun. 25(6), 38–44 (2018)
8.
go back to reference Yoon, S., Jeon, Y.: Security threat analysis for Android based Mobile Device. In: 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 775–776 (2014) Yoon, S., Jeon, Y.: Security threat analysis for Android based Mobile Device. In: 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 775–776 (2014)
9.
go back to reference Maier, D., Protsenko, M., et al.: A game of Droid and Mouse: the threat of split-personality malware on Android. Comput. Secur. 54, 2–15 (2015)CrossRef Maier, D., Protsenko, M., et al.: A game of Droid and Mouse: the threat of split-personality malware on Android. Comput. Secur. 54, 2–15 (2015)CrossRef
11.
go back to reference Wu, Q., Zhao, C., Guo, Y.: Android Security Mechanism Analysis and App Practice, 2nd edn. The China Machine Press, Beijing (2013) Wu, Q., Zhao, C., Guo, Y.: Android Security Mechanism Analysis and App Practice, 2nd edn. The China Machine Press, Beijing (2013)
12.
go back to reference Zhang, Q., et al.: A self-certified cross-cluster asymmetric group key agreement for wireless sensor networks. Chin. J. Electron. 28(2), 280–287 (2019)CrossRef Zhang, Q., et al.: A self-certified cross-cluster asymmetric group key agreement for wireless sensor networks. Chin. J. Electron. 28(2), 280–287 (2019)CrossRef
13.
go back to reference Fanjiao, M., et al.: A high efficiency encryption scheme of dual data partitions for android devices. In: Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017, vol. 1, pp. 823–828 (2017) Fanjiao, M., et al.: A high efficiency encryption scheme of dual data partitions for android devices. In: Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017, vol. 1, pp. 823–828 (2017)
14.
go back to reference Rachmat, N.: Performance analysis of 256-bit AES encryption algorithm on android smartphone. J. Phys. Conf. Ser. 1196, 012049 (2019). 6 pp.CrossRef Rachmat, N.: Performance analysis of 256-bit AES encryption algorithm on android smartphone. J. Phys. Conf. Ser. 1196, 012049 (2019). 6 pp.CrossRef
15.
go back to reference Tan, Y.-a., et al.: A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. Appl. 107, 69–82 (2018) Tan, Y.-a., et al.: A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. Appl. 107, 69–82 (2018)
16.
go back to reference SAMSUNG: Samsung Knox Technology White article (2018) SAMSUNG: Samsung Knox Technology White article (2018)
17.
go back to reference Zhang, X., Liang, C., Zhang, Q., Li, Y., Zheng, J., Tan, Y.-a.: Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445–446, 66–78 (2018) Zhang, X., Liang, C., Zhang, Q., Li, Y., Zheng, J., Tan, Y.-a.: Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445–446, 66–78 (2018)
18.
go back to reference Guan, L., et al.: TrustShadow: secure execution of unmodified apps with ARM TrustZone. In: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM (2017) Guan, L., et al.: TrustShadow: secure execution of unmodified apps with ARM TrustZone. In: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM (2017)
19.
go back to reference Rubinov, K., et al.: Automated partitioning of android apps for trusted execution environments. In: ICSE (2016) Rubinov, K., et al.: Automated partitioning of android apps for trusted execution environments. In: ICSE (2016)
20.
go back to reference Guan, Z., et al.: Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun. Mag. 56(7), 82–88 (2018)CrossRef Guan, Z., et al.: Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun. Mag. 56(7), 82–88 (2018)CrossRef
21.
go back to reference Guan, Z., Zhang, Y., Zhu, L., Wu, L., Yu, S.: EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci. China Inf. Sci. 62, 1–14 (2019)CrossRef Guan, Z., Zhang, Y., Zhu, L., Wu, L., Yu, S.: EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci. China Inf. Sci. 62, 1–14 (2019)CrossRef
22.
go back to reference Xue, Y., Tan, Y.-a., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018) Xue, Y., Tan, Y.-a., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)
Metadata
Title
A Data Protection Scheme via Isolating Android Partitions
Authors
Kai Yang
Xiaoya Ma
Hongwei Jiang
Yuan Xue
Wencong Han
Lianfang Wang
Lu Liu
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-37337-5_8

Premium Partner