Abstract
Due to the characteristics of the current open-source Android system, and looser user rights management mechanism, information security issues become a problem of common concern to the user. At the present stage, there are many measures encrypting data for Android database, which are divided into several aspects of hardware layer, core layer, virtual machine layer and application framework layer. This paper presents a method which achieves the database encryption by modifying SQLite source code in Libraries and Android Runtime Layer. The encryption function can not only encrypt the data itself, but also be invoked by the upper application though JNI interface, so that the application can access more secure database, and improve the security of the instant messaging application. Experimental results show feasibility and effectiveness of the SQLite database encryption which is used in the instant messaging application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Android, the world’s most popular mobile platform (2014). http://developer.android.com/about/index.html
The Android Story (2014). http://www.android.com/history
Enck, W., Octeau, D., McDaniel, P., et al.: A study of android application security. In: USENIX Security Symposium, vol. 2, p. 2 (2011)
Owens, M., Allen, G.: The Definitive Guide to SQLite. Apress, Berkeley (2006)
Kleidermacher, D.: Bringing security to Android-based devices. http://www.igmagazine-online.coin/current/pdf/Pg56-58_IQ_32-Bringing—Security—to—Android-based—Devices.pdf. Accessed 22 October 2010
Shabtai, A., Fledel, Y., Elovici, Y.: Securing Android-powered mobile devices using SELinux. IEEE Secur. Priv. 8(3), 36–44 (2010)
Lange, M., Liebergeld, S., Lackorzynski, A., et al.: L4Android: a generic operating system framework for secure smartphones. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 39–50. ACM (2011)
Barr, K., Bungale, P., Deasy, S., et al.: The VMware mobile virtualization platform: is that a hypervisor in your pocket? ACM SIGOPS Oper. Syst. Rev. 44(4), 124–135 (2010)
Barham, P., Dragovic, B., Fraser, K., et al.: Xen and the art of virtualization. ACM SIGOPS Oper. Syst. Rev. 37(5), 164–177 (2003)
Daemen, J., Rijmen, V.: The Design of Rijndael: AES-the Advanced Encryption Standard. Springer, Berlin (2002)
Acknowledgment
This work is supported by the Fundamental Research Funds for the Central Universities (Grant No. 201413065); National Key Technology R&D Program (Grant No. 2012BAH17F03).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhao, A., Wei, Z., Yang, Y. (2015). Research on SQLite Database Encryption Technology in Instant Messaging Based on Android Platform. In: He, X., et al. Intelligence Science and Big Data Engineering. Big Data and Machine Learning Techniques. IScIDE 2015. Lecture Notes in Computer Science(), vol 9243. Springer, Cham. https://doi.org/10.1007/978-3-319-23862-3_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-23862-3_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23861-6
Online ISBN: 978-3-319-23862-3
eBook Packages: Computer ScienceComputer Science (R0)