Abstract
With the continuous development of Android devices, the sensitive data of users have been leaked and maliciously deleted. In this article, a data security protection scheme based on TF card is designed to meet the security requirements of the physical isolation of data in different scenarios for users. The advantage of the scheme is that the data protection is not achieved by using chips or other peripheral devices. In order to achieve this goal, the scheme builds an ecosystem exactly like the normal system on the TF card. This article introduces the design and implementation of the private zone. The prototype of the private zone is realized on the Android related mobile phones and can be easily transplanted to other Android embedded devices. At the same time, in order to illustrate the usage and security of the private zone, this article makes some experiments to evaluate the performance cost between the normal system and the private zone. Experimental results show that this method has reasonable performance and can effectively reduce the risk of sensitive information leakage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bahis, K.: Mobile internet connection status in 2018. GSM Assoc. 2(5), 1–63 (2018)
StatCounter Homepage. http://gs.statcounter.com/os-market-share#monthly-201803-201903. Accessed 25 Mar 2019
Liang, C., Tan, Y.-a., Zhang, X., Wang, X., Zheng, J., Zhang, Q.: Building packet length covert channel over mobile VoIP traffics. J. Netw. Comput. Appl. 118, 144–153 (2018)
Liang, C., Wang, X., Zhang, X., Zhang, Y., Sharif, K., Tan, Y.-a.: A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf. Sci. 465, 162–173 (2018)
Gu, J., Li, C., et al.: Combination attack of android apps analysis scheme based on privacy leak. In: Proceedings of 2016 4th IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS 2016, pp. 62–66 (2016)
Short, A., Li, F.: Android smartphone third party advertising library data leak analysis. In: Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014, pp. 749–754 (2015)
Tan, Y.-a., Zhang, X., Sharif, K., Liang, C., Zhang, Q., Li, Y.: Covert timing channels for IoT over mobile networks. IEEE Wirel. Commun. 25(6), 38–44 (2018)
Yoon, S., Jeon, Y.: Security threat analysis for Android based Mobile Device. In: 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 775–776 (2014)
Maier, D., Protsenko, M., et al.: A game of Droid and Mouse: the threat of split-personality malware on Android. Comput. Secur. 54, 2–15 (2015)
StatCounter Homepage. https://blog.cSDn.net/luoshengyang/article/details/35392905. Accessed 15 Dec 2018
Wu, Q., Zhao, C., Guo, Y.: Android Security Mechanism Analysis and App Practice, 2nd edn. The China Machine Press, Beijing (2013)
Zhang, Q., et al.: A self-certified cross-cluster asymmetric group key agreement for wireless sensor networks. Chin. J. Electron. 28(2), 280–287 (2019)
Fanjiao, M., et al.: A high efficiency encryption scheme of dual data partitions for android devices. In: Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017, vol. 1, pp. 823–828 (2017)
Rachmat, N.: Performance analysis of 256-bit AES encryption algorithm on android smartphone. J. Phys. Conf. Ser. 1196, 012049 (2019). 6Â pp.
Tan, Y.-a., et al.: A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. Appl. 107, 69–82 (2018)
SAMSUNG: Samsung Knox Technology White article (2018)
Zhang, X., Liang, C., Zhang, Q., Li, Y., Zheng, J., Tan, Y.-a.: Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445–446, 66–78 (2018)
Guan, L., et al.: TrustShadow: secure execution of unmodified apps with ARM TrustZone. In: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM (2017)
Rubinov, K., et al.: Automated partitioning of android apps for trusted execution environments. In: ICSE (2016)
Guan, Z., et al.: Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun. Mag. 56(7), 82–88 (2018)
Guan, Z., Zhang, Y., Zhu, L., Wu, L., Yu, S.: EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci. China Inf. Sci. 62, 1–14 (2019)
Xue, Y., Tan, Y.-a., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)
Acknowledgment
This work is supported by National Natural Science Foundation of China (No. 61876019 & U1636213).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Yang, K. et al. (2019). A Data Protection Scheme via Isolating Android Partitions. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-37337-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37336-8
Online ISBN: 978-3-030-37337-5
eBook Packages: Computer ScienceComputer Science (R0)