Abstract
To address the information leakage problems existed in the smartphone mobility office of enterprises and institutions, we propose security mobile office architecture and design application security authentication mechanism, software and hardware resource control mechanism, security storage isolation mechanism, which provide safe protection for sensitive data. To evaluate the propose schemes, we implement them in the android system and cloud service platform. The evaluation results verify the feasibility and effectiveness of the security mobile office technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Zhou, Y., Wang, Z., Zhou, W., Jiang, X.: Hey, you, get off of my market: detecting malicious apps in official and alternative android markets. In: Proceedings of the 19th Annual Symposium on Network and Distributed System Security (NDSS 2012), San Diego, USA, February 2012
Kim, J., Yoon, Y., Yi, K., Shin, J.: SCANDAL: static analyzer for detecting privacy leaks in android applications. In: Proceedings of the Mobile Security Technologies (MoST 2012), San Francisco, USA, May 2012
Enck, W., Octeau, D., McDaniel, P., Chaudhuri, S.: A study of Android application security. In: Proceedings of the 20th USENIX Conference on Security (SEC 2011), San Francisco, USA, August 2011
Liang, S., Keep, A.W., Might, M., Lyde, S., Gilray, T., Aldous, P., Horn, D.V.: Sound and precise malware analysis for android via pushdown reachability and entry-point saturation. In: Proceedings of the 3rd ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2013), Berlin, Germany, November 2013
Fuchs, A., Chaudhuri, A., Foster, J.: Scandroid: automated security certification of android applications (2009). http://www.cs.umd.edu/~avik/papers/scandroidascaa.pdf
Enck, W., Gilbert, P., Chun, B.: TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 7th USENIX Conference on Operating Systems Design and Implementation (OSDI 2010), Canada, October 2010
Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren’t the droids you’re looking for: retrofitting Android to protect data from imperious applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), Chicago, Illinois, USA, October 2011
Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), Chicago, USA, November 2009
Nauman, M., Khan, S., Zhang, X.: Apex: extending Android permission model and enforcement with user-defined runtime constraints. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010), Beijing, China, April 2010
Jeon, J., Micinski, K., Vaughan, J., Fogel, A., Reddy, N., Foster, J., Millstein, T.: Dr. Android and Mr. Hide: fine-grained permissions in Android applications. In: Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2012), North Carolina, USA, October 2012
Conti, M., Crispo, B., Pernandes, E., Zhauniarovich, Y.: CRePE: a system for enforcing fine-grained context-related policy on Android. IEEE Trans. Inf. Forensics Secur. 7(5), 1426–1438 (2012)
Zhou, Y., Zhang, X., Jiang, X., Freeh, V.W.: Taming information-stealing smartphone applications (on Android). In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 93–107. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21599-5_7
Lange, M., Liebergeld, S., Lackorzynski, A., Warg, A., Peter, M.: L4Android: a generic operating system framework for secure smartphones. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile devices (SPSM 2011), Chicago, USA, October 2011
Sven, B., Lucas, D., Alexandra, D., Stephan, H., Ahmad-reza, S., Bhargava, S.: Practical and lightweight domain isolation on Android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile devices (SPSM 2011), Chicago, USA, October 2011
Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and efficient access to outsourced data. In: Proceedings of CCSW 2009, Chicago, USA, November 2009
Acknowledgments
Supported by the “Strategic Priority Research Program” of the Chinese Academy of Sciences, Grant No. XDA06010703.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Qiu, F., Li, X. (2016). Research and Implementation Key Technology of Security Mobile Office. In: Wang, G., Ray, I., Alcaraz Calero, J., Thampi, S. (eds) Security, Privacy and Anonymity in Computation, Communication and Storage. SpaCCS 2016. Lecture Notes in Computer Science(), vol 10067. Springer, Cham. https://doi.org/10.1007/978-3-319-49145-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-49145-5_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49144-8
Online ISBN: 978-3-319-49145-5
eBook Packages: Computer ScienceComputer Science (R0)