Skip to main content

Study of Transparent File Encryption Technology on Android Platform

  • Conference paper
  • First Online:
  • 976 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12383))

Abstract

Aiming at the data security problem of Android platform, a transparent encryption system based on file filter driver is designed and implemented, according to the technology of file transparent encryption and decryption system based on hook transparent encryption technology and file filtering driven transparent encryption technology used on windows platform. This system is different from the traditional APP development method of Android system. By intercepting the system call function and using the secret-key converted from the host MAC address, the encryption and decryption algorithm is written into the kernel, which fundamentally guarantees the security of user information. At the same time, the user's security experience is improved by putting authentication on the screen unlocking. The system design and implementation are described in this paper from system requirement analysis to overall design and detailed design of each module. Android application development technology and cross-compiling principle are used in the coding process. The system test results show that the system can effectively transparently encrypt files and protect the privacy of mobile files.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ma, L., Gu, L., Wang, J.: Research and development of mobile application for android platform. Int. J. Multimedia Ubiq. Eng. 9(4), 187–198 (2014)

    Article  Google Scholar 

  2. Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Secur. Priv. 7(1), 50–57 (2009)

    Article  Google Scholar 

  3. Mei, K., Li, Y.: Transparent file safety encryption method of enterprise lan based on Filter Driver. Comput. Technol. Dev. 4, 238–241 (2012)

    Google Scholar 

  4. Yang, D., Peng, Y., Fang, Z.: The application of transparent decryption in trusted storage of electronic documents. Electron. Sci. Technol. 4(04), 147–150 (2017)

    Google Scholar 

  5. Zhu, T., Shi, Y., Xue, Z.: Research on android transparent encryption file system based on Xposed. Comput. Technol. Dev. 27(2), 64–67 (2017)

    Google Scholar 

  6. Shao, Z.P., Li, N.G., Chen, M., et al.: Design and implementation of a highly adaptable android transparent encryption framework. In: Proceedings of the 2017 International Conference on Wireless Communications, Networking and Applications (WCNA), pp. 45–50 (2017)

    Google Scholar 

  7. Peng, G., Shao, Y., Wang, T.: Technology and implementation in privacy protection of mobile phone based on Android. Netinfo Secur. 4 (2012)

    Google Scholar 

  8. Wang, Q., Zhou, Q., Liu, Y.: Research on file system transparent encryption techniques. Comput. Technol. Dev. 20, 147–150 (2010)

    Google Scholar 

  9. Faruki, P., Bharmal, A., Laxmi, V., et al.: Android security: a survey of issues, malware penetration, and defenses. IEEE Commun. Surv. Tutorials 17(2), 998–1022 (2014)

    Article  Google Scholar 

  10. Liu, W., Li, D.: A file protection scheme based on the transparent encryption technology. In: 2018 IEEE International Conference of Safety Produce Informatization (IICSPI), pp. 793–795 (2018)

    Google Scholar 

  11. Sun, X., Yang, T., Hu, X.: A file system protection scheme based on file filter driver and truecrypt. Mod. Comput (Prof.) 3, 77–80 (2010)

    Google Scholar 

  12. Pang, P., Aourra, K., Xue, Y., et al.: A transparent encryption scheme of video data for android devices. In: 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), pp. 817–822 (2017)

    Google Scholar 

  13. Lin, Y.: Application of MVVM design pattern and MVP design pattern based on ZK. J. Chongqing Univ. Arts Sci. (Nat. Sci. Ed.) 72–74, 78 (2010)

    Google Scholar 

  14. Zeng, L: Application research of MVP for android. Comput. Eng. Softw., 75–78 (2016)

    Google Scholar 

  15. Fu, C.: Design of transparent encryption system for documents based on windows kernel. J. Chongqing Univ. Educ. 28, 171–173 (2015)

    Google Scholar 

  16. Nawaz, Y., Wang, L., Ammour, K.: Processing analysis of confidential modes of operation. In: International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS), pp. 98–110 (2018)

    Google Scholar 

  17. Qiu, P., Wang, D., Lv, Y., et al.: Voltjockey: breaching trustzone by software-controlled voltage manipulation over multi-core frequencies. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 195–209 (2019)

    Google Scholar 

  18. Salman, H., Uddin, M.N., Acheampong, S., et al.: Design and implementation of IoT based class attendance monitoring system using computer vision and embedded linux platform. In: Workshops of the International Conference on Advanced Information Networking and Applications (AINA), pp. 25–34 (2019)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongzhong Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Y., Zhang, S., Li, Y. (2021). Study of Transparent File Encryption Technology on Android Platform. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12383. Springer, Cham. https://doi.org/10.1007/978-3-030-68884-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68884-4_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68883-7

  • Online ISBN: 978-3-030-68884-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics