Skip to main content

Research on SQLite Database Encryption Technology in Instant Messaging Based on Android Platform

  • Conference paper
  • First Online:
Book cover Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques (IScIDE 2015)

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 9243))

  • 2927 Accesses

Abstract

Due to the characteristics of the current open-source Android system, and looser user rights management mechanism, information security issues become a problem of common concern to the user. At the present stage, there are many measures encrypting data for Android database, which are divided into several aspects of hardware layer, core layer, virtual machine layer and application framework layer. This paper presents a method which achieves the database encryption by modifying SQLite source code in Libraries and Android Runtime Layer. The encryption function can not only encrypt the data itself, but also be invoked by the upper application though JNI interface, so that the application can access more secure database, and improve the security of the instant messaging application. Experimental results show feasibility and effectiveness of the SQLite database encryption which is used in the instant messaging application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Android, the world’s most popular mobile platform (2014). http://developer.android.com/about/index.html

  2. The Android Story (2014). http://www.android.com/history

  3. Enck, W., Octeau, D., McDaniel, P., et al.: A study of android application security. In: USENIX Security Symposium, vol. 2, p. 2 (2011)

    Google Scholar 

  4. Owens, M., Allen, G.: The Definitive Guide to SQLite. Apress, Berkeley (2006)

    Google Scholar 

  5. Kleidermacher, D.: Bringing security to Android-based devices. http://www.igmagazine-online.coin/current/pdf/Pg56-58_IQ_32-Bringing—Security—to—Android-based—Devices.pdf. Accessed 22 October 2010

  6. Shabtai, A., Fledel, Y., Elovici, Y.: Securing Android-powered mobile devices using SELinux. IEEE Secur. Priv. 8(3), 36–44 (2010)

    Article  Google Scholar 

  7. Lange, M., Liebergeld, S., Lackorzynski, A., et al.: L4Android: a generic operating system framework for secure smartphones. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 39–50. ACM (2011)

    Google Scholar 

  8. Barr, K., Bungale, P., Deasy, S., et al.: The VMware mobile virtualization platform: is that a hypervisor in your pocket? ACM SIGOPS Oper. Syst. Rev. 44(4), 124–135 (2010)

    Article  Google Scholar 

  9. Barham, P., Dragovic, B., Fraser, K., et al.: Xen and the art of virtualization. ACM SIGOPS Oper. Syst. Rev. 37(5), 164–177 (2003)

    Article  Google Scholar 

  10. Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Berlin (2002)

    Book  MATH  Google Scholar 

Download references

Acknowledgment

This work is supported by the Fundamental Research Funds for the Central Universities (Grant No. 201413065); National Key Technology R&D Program (Grant No. 2012BAH17F03).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yongquan Yang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhao, A., Wei, Z., Yang, Y. (2015). Research on SQLite Database Encryption Technology in Instant Messaging Based on Android Platform. In: He, X., et al. Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques. IScIDE 2015. Lecture Notes in Computer Science(), vol 9243. Springer, Cham. https://doi.org/10.1007/978-3-319-23862-3_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23862-3_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23861-6

  • Online ISBN: 978-3-319-23862-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics