Skip to main content

Research and Implementation Key Technology of Security Mobile Office

  • Conference paper
  • First Online:
Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10067))

  • 852 Accesses

Abstract

To address the information leakage problems existed in the smartphone mobility office of enterprises and institutions, we propose security mobile office architecture and design application security authentication mechanism, software and hardware resource control mechanism, security storage isolation mechanism, which provide safe protection for sensitive data. To evaluate the propose schemes, we implement them in the android system and cloud service platform. The evaluation results verify the feasibility and effectiveness of the security mobile office technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS 2012), San Diego, USA, February 2012

    Google Scholar 

  2. Kim, J., Yoon, Y., Yi, K., Shin, J.: SCANDAL: static analyzer for detecting privacy leaks in android applications. In: Proceedings of the Mobile Security Technologies (MoST 2012), San Francisco, USA, May 2012

    Google Scholar 

  3. Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of Android application security. In: Proceedings of the 20th USENIX Conference on Security (SEC 2011), San Francisco, USA, August 2011

    Google Scholar 

  4. Liang, S., Keep, A.W., Might, M., Lyde, S., Gilray, T., Aldous, P., Horn, D.V.: Sound and precise malware analysis for android via pushdown reachability and entry-point saturation. In: Proceedings of the 3rd ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2013), Berlin, Germany, November 2013

    Google Scholar 

  5. Fuchs, A., Chaudhuri, A., Foster, J.: Scandroid: automated security certification of android applications (2009). http://www.cs.umd.edu/~avik/papers/scandroidascaa.pdf

  6. Enck, W., Gilbert, P., Chun, B.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 7th USENIX Conference on Operating Systems Design and Implementation (OSDI 2010), Canada, October 2010

    Google Scholar 

  7. Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren’t the droids you’re looking for: retrofitting Android to protect data from imperious applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), Chicago, Illinois, USA, October 2011

    Google Scholar 

  8. Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, USA, November 2009

    Google Scholar 

  9. Nauman, M., Khan, S., Zhang, X.: Apex: extending Android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010), Beijing, China, April 2010

    Google Scholar 

  10. Jeon, J., Micinski, K., Vaughan, J., Fogel, A., Reddy, N., Foster, J., Millstein, T.: Dr. Android and Mr. Hide: fine-grained permissions in Android applications. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2012), North Carolina, USA, October 2012

    Google Scholar 

  11. Conti, M., Crispo, B., Pernandes, E., Zhauniarovich, Y.: CRePE: a system for enforcing fine-grained context-related policy on Android. IEEE Trans. Inf. Forensics Secur. 7(5), 1426–1438 (2012)

    Article  Google Scholar 

  12. Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming information-stealing smartphone applications (on Android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 93–107. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21599-5_7

    Chapter  Google Scholar 

  13. Lange, M., Liebergeld, S., Lackorzynski, A., Warg, A., Peter, M.: L4Android: a generic operating system framework for secure smartphones. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile devices (SPSM 2011), Chicago, USA, October 2011

    Google Scholar 

  14. Sven, B., Lucas, D., Alexandra, D., Stephan, H., Ahmad-reza, S., Bhargava, S.: Practical and lightweight domain isolation on Android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile devices (SPSM 2011), Chicago, USA, October 2011

    Google Scholar 

  15. Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and efficient access to outsourced data. In: Proceedings of CCSW 2009, Chicago, USA, November 2009

    Google Scholar 

Download references

Acknowledgments

Supported by the “Strategic Priority Research Program” of the Chinese Academy of Sciences, Grant No. XDA06010703.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Feng Qiu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Qiu, F., Li, X. (2016). Research and Implementation Key Technology of Security Mobile Office. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49145-5_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49144-8

  • Online ISBN: 978-3-319-49145-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics