Skip to main content

A Data Protection Scheme via Isolating Android Partitions

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11982))

Included in the following conference series:

  • 1037 Accesses

Abstract

With the continuous development of Android devices, the sensitive data of users have been leaked and maliciously deleted. In this article, a data security protection scheme based on TF card is designed to meet the security requirements of the physical isolation of data in different scenarios for users. The advantage of the scheme is that the data protection is not achieved by using chips or other peripheral devices. In order to achieve this goal, the scheme builds an ecosystem exactly like the normal system on the TF card. This article introduces the design and implementation of the private zone. The prototype of the private zone is realized on the Android related mobile phones and can be easily transplanted to other Android embedded devices. At the same time, in order to illustrate the usage and security of the private zone, this article makes some experiments to evaluate the performance cost between the normal system and the private zone. Experimental results show that this method has reasonable performance and can effectively reduce the risk of sensitive information leakage.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bahis, K.: Mobile internet connection status in 2018. GSM Assoc. 2(5), 1–63 (2018)

    Google Scholar 

  2. StatCounter Homepage. http://gs.statcounter.com/os-market-share#monthly-201803-201903. Accessed 25 Mar 2019

  3. Liang, C., Tan, Y.-a., Zhang, X., Wang, X., Zheng, J., Zhang, Q.: Building packet length covert channel over mobile VoIP traffics. J. Netw. Comput. Appl. 118, 144–153 (2018)

    Google Scholar 

  4. Liang, C., Wang, X., Zhang, X., Zhang, Y., Sharif, K., Tan, Y.-a.: A payload-dependent packet rearranging covert channel for mobile VoIP traffic. Inf. Sci. 465, 162–173 (2018)

    Google Scholar 

  5. Gu, J., Li, C., et al.: Combination attack of android apps analysis scheme based on privacy leak. In: Proceedings of 2016 4th IEEE International Conference on Cloud Computing and Intelligence Systems, CCIS 2016, pp. 62–66 (2016)

    Google Scholar 

  6. Short, A., Li, F.: Android smartphone third party advertising library data leak analysis. In: Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014, pp. 749–754 (2015)

    Google Scholar 

  7. Tan, Y.-a., Zhang, X., Sharif, K., Liang, C., Zhang, Q., Li, Y.: Covert timing channels for IoT over mobile networks. IEEE Wirel. Commun. 25(6), 38–44 (2018)

    Google Scholar 

  8. Yoon, S., Jeon, Y.: Security threat analysis for Android based Mobile Device. In: 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp. 775–776 (2014)

    Google Scholar 

  9. Maier, D., Protsenko, M., et al.: A game of Droid and Mouse: the threat of split-personality malware on Android. Comput. Secur. 54, 2–15 (2015)

    Article  Google Scholar 

  10. StatCounter Homepage. https://blog.cSDn.net/luoshengyang/article/details/35392905. Accessed 15 Dec 2018

  11. Wu, Q., Zhao, C., Guo, Y.: Android Security Mechanism Analysis and App Practice, 2nd edn. The China Machine Press, Beijing (2013)

    Google Scholar 

  12. Zhang, Q., et al.: A self-certified cross-cluster asymmetric group key agreement for wireless sensor networks. Chin. J. Electron. 28(2), 280–287 (2019)

    Article  Google Scholar 

  13. Fanjiao, M., et al.: A high efficiency encryption scheme of dual data partitions for android devices. In: Proceedings - 2017 IEEE International Conference on Computational Science and Engineering and IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, CSE and EUC 2017, vol. 1, pp. 823–828 (2017)

    Google Scholar 

  14. Rachmat, N.: Performance analysis of 256-bit AES encryption algorithm on android smartphone. J. Phys. Conf. Ser. 1196, 012049 (2019). 6 pp.

    Article  Google Scholar 

  15. Tan, Y.-a., et al.: A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. Appl. 107, 69–82 (2018)

    Google Scholar 

  16. SAMSUNG: Samsung Knox Technology White article (2018)

    Google Scholar 

  17. Zhang, X., Liang, C., Zhang, Q., Li, Y., Zheng, J., Tan, Y.-a.: Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445–446, 66–78 (2018)

    Google Scholar 

  18. Guan, L., et al.: TrustShadow: secure execution of unmodified apps with ARM TrustZone. In: Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM (2017)

    Google Scholar 

  19. Rubinov, K., et al.: Automated partitioning of android apps for trusted execution environments. In: ICSE (2016)

    Google Scholar 

  20. Guan, Z., et al.: Privacy-preserving and efficient aggregation based on blockchain for power grid communications in smart communities. IEEE Commun. Mag. 56(7), 82–88 (2018)

    Article  Google Scholar 

  21. Guan, Z., Zhang, Y., Zhu, L., Wu, L., Yu, S.: EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci. China Inf. Sci. 62, 1–14 (2019)

    Article  Google Scholar 

  22. Xue, Y., Tan, Y.-a., Liang, C., Li, Y., Zheng, J., Zhang, Q.: RootAgency: a digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444, 36–50 (2018)

    Google Scholar 

Download references

Acknowledgment

This work is supported by National Natural Science Foundation of China (No. 61876019 & U1636213).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lu Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, K. et al. (2019). A Data Protection Scheme via Isolating Android Partitions. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11982. Springer, Cham. https://doi.org/10.1007/978-3-030-37337-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37337-5_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37336-8

  • Online ISBN: 978-3-030-37337-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics