Abstract
Aiming at the data security problem of Android platform, a transparent encryption system based on file filter driver is designed and implemented, according to the technology of file transparent encryption and decryption system based on hook transparent encryption technology and file filtering driven transparent encryption technology used on windows platform. This system is different from the traditional APP development method of Android system. By intercepting the system call function and using the secret-key converted from the host MAC address, the encryption and decryption algorithm is written into the kernel, which fundamentally guarantees the security of user information. At the same time, the user's security experience is improved by putting authentication on the screen unlocking. The system design and implementation are described in this paper from system requirement analysis to overall design and detailed design of each module. Android application development technology and cross-compiling principle are used in the coding process. The system test results show that the system can effectively transparently encrypt files and protect the privacy of mobile files.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ma, L., Gu, L., Wang, J.: Research and development of mobile application for android platform. Int. J. Multimedia Ubiq. Eng. 9(4), 187–198 (2014)
Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Secur. Priv. 7(1), 50–57 (2009)
Mei, K., Li, Y.: Transparent file safety encryption method of enterprise lan based on Filter Driver. Comput. Technol. Dev. 4, 238–241 (2012)
Yang, D., Peng, Y., Fang, Z.: The application of transparent decryption in trusted storage of electronic documents. Electron. Sci. Technol. 4(04), 147–150 (2017)
Zhu, T., Shi, Y., Xue, Z.: Research on android transparent encryption file system based on Xposed. Comput. Technol. Dev. 27(2), 64–67 (2017)
Shao, Z.P., Li, N.G., Chen, M., et al.: Design and implementation of a highly adaptable android transparent encryption framework. In: Proceedings of the 2017 International Conference on Wireless Communications, Networking and Applications (WCNA), pp. 45–50 (2017)
Peng, G., Shao, Y., Wang, T.: Technology and implementation in privacy protection of mobile phone based on Android. Netinfo Secur. 4 (2012)
Wang, Q., Zhou, Q., Liu, Y.: Research on file system transparent encryption techniques. Comput. Technol. Dev. 20, 147–150 (2010)
Faruki, P., Bharmal, A., Laxmi, V., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutorials 17(2), 998–1022 (2014)
Liu, W., Li, D.: A file protection scheme based on the transparent encryption technology. In: 2018 IEEE International Conference of Safety Produce Informatization (IICSPI), pp. 793–795 (2018)
Sun, X., Yang, T., Hu, X.: A file system protection scheme based on file filter driver and truecrypt. Mod. Comput (Prof.) 3, 77–80 (2010)
Pang, P., Aourra, K., Xue, Y., et al.: A transparent encryption scheme of video data for android devices. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), pp. 817–822 (2017)
Lin, Y.: Application of MVVM design pattern and MVP design pattern based on ZK. J. Chongqing Univ. Arts Sci. (Nat. Sci. Ed.) 72–74, 78 (2010)
Zeng, L: Application research of MVP for android. Comput. Eng. Softw., 75–78 (2016)
Fu, C.: Design of transparent encryption system for documents based on windows kernel. J. Chongqing Univ. Educ. 28, 171–173 (2015)
Nawaz, Y., Wang, L., Ammour, K.: Processing analysis of confidential modes of operation. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS), pp. 98–110 (2018)
Qiu, P., Wang, D., Lv, Y., et al.: Voltjockey: breaching trustzone by software-controlled voltage manipulation over multi-core frequencies. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 195–209 (2019)
Salman, H., Uddin, M.N., Acheampong, S., et al.: Design and implementation of IoT based class attendance monitoring system using computer vision and embedded linux platform. In: Workshops of the International Conference on Advanced Information Networking and Applications (AINA), pp. 25–34 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Li, Y., Zhang, S., Li, Y. (2021). Study of Transparent File Encryption Technology on Android Platform. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12383. Springer, Cham. https://doi.org/10.1007/978-3-030-68884-4_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-68884-4_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-68883-7
Online ISBN: 978-3-030-68884-4
eBook Packages: Computer ScienceComputer Science (R0)