Abstract
Nowadays, mobile devices are widely used. Mobile smartphones are not only a carrier for users to record, store, or transfer sensitive data in social network, but also a covert forensic tool for some security departments. In some extreme cases like war correspondent being about to be captured, the operation records of shooting and communication on the mobile phone will bring them disadvantages. Immediately performing a factory recovery is the smartest option. However, this operation will clear all user data, including those important case scene evidence. This paper proposes a flexible and reliable factory recovery mechanism to protect sensitive data under factory recovery. By analyzing the factory recovery process and mastering the Linux kernel execution process, to ensure that when users perform factory recovery operations, applications and data can be cleared normally, and the private data that users want to keep is protected. We evaluated the safety and usability of the method.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Faruki, P., et al.: Android security: a survey of issues, malware penetration, and defenses
Statista. https://www.statista.com/statistics/262176/market-share-held-by-mobile-operating-systems-in-china/. Accessed 27 Nov 2019
Kim, J., Jung, I.Y.: Private data protection of android application (2018)
https://zt.360.cn/1101061855.php?dtid=1101061451&did=210942656. Accessed 10 Nov 2019
Li, Z., Yang, J., Cui, B.: Study on sensitive data protection based on SEAndroid. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) (2018)
Shahriar, H., et al.: Data protection labware for mobile security (2019)
Nguyen, N.H., et al.: No-key protocol for deniable encryption (2018)
Xue, Y., Tan, Y., Liang, C., Zhang, C.Y., Zheng, J.: An optimized data hiding scheme for Deflate codes. Soft. Comput. 22(13), 4445–4455 (2017). https://doi.org/10.1007/s00500-017-2651-2
Yu, X.: A fault-tolerant and energy-efficient continuous data protection system. J. Amb. Intell. Hum. Comput. 10, 1–10 (2018)
Xiao, Yu., Changyou, Z., Yuan, X., Hongfei, Z., Yuanzhang, L., Yu-An, T.: An extra-parity energy saving data layout for video surveillance. Multimedia Tools Appl. 77(4), 4563–4583 (2017). https://doi.org/10.1007/s11042-017-4540-1
Yu, X., et al.: A high-performance hierarchical snapshot scheme for hybrid storage systems. Chin. J. Electr. 27(1), 76–85 (2018)
Zhang, X., Tan, Y., Zhang, C., Xue, Y., Li, Y., Zheng, J.: A code protection scheme by process memory relocation for android devices. Multimedia Tools Appl. 77(9), 11137–11157 (2017). https://doi.org/10.1007/s11042-017-5363-9
Schwamm, R.: Effectiveness of the Factory Reset on a Mobile Device (2014)
Zhu, D., Fan, Z., Na, P.: A dynamic credible factory reset mechanism of personal data in android device
Dong, H.K., Eom, Y.I.: iDiscard: enhanced Discard() scheme for flash storage devices. In: 2018 IEEE International Conference on Big Data and Smart Computing (BigComp) (2018)
Xue, Y., et al.: Isolating host environment by booting android from OTG devices. Chin. J. Electr 27(03), 617–624 (2018)
Zhu, H., Zhang, Q., Liu, L., Aourra, K., Tan, Y.: Research of optimizing the system partition in android system. In: Xhafa, F., Patnaik, S., Yu, Z. (eds.) IISA 2016. AISC, vol. 541, pp. 168–173. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-49568-2_23
Wang, H.S.O.C., et al.: An Analysis of the File System for Linux., Korea, p. 5 (2012)
Yudha, F., Prayudi, Y.: Block and inode based analysis on EXT4 File System 24(1), 652–655 (2018)
Fang, D.R., et al.: Research on recovery method of deleted data for android system. 40(10), 275–280 (2014)
Bovet, D., Cesati, M., Oram, A.: Understanding the Linux Kernel, 2n edn. (2002)
Yuan, P., et al.: Device-specific Linux kernel optimization for android smartphones (2018)
Park, J.H., et al.: An enhanced security framework for reliable Android operating system. Secur. Commun. Networks p. n/a-n/a
Talley, A.V.: Content analysis tools in android memory forensics (2014)
Liu, Z.L., Pun, C.M.: Reversible data-hiding in encrypted images by redundant space transfer. s 433–434, 188–203 (2018)
Abdel-Nabi, H., Al-Haj, A.: Efficient joint encryption and data hiding algorithm for medical images security. In: 2017 8th International Conference on Information and Communication Systems (ICICS) (2017)
Jiang, R., et al.: A high-capacity reversible data hiding method in encrypted images based on block shifting. In: 2017 2nd International Conference on Multimedia and Image Processing (ICMIP) (2017)
Abdulaziz, N.K.: Digital watermarking and data hiding in multimedia (2017)
Sharma, A., Sharma, N., Kumar, A.: A new algorithm to secure image steganographic file. In: 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence (Confluence) (2017)
Acknowledgments
This work was supported by the National Natural Science Foundation of China under Grant No. 61876019.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Lianfang, W., Ye, W., Gang, Z., Lu, L., Xiaohui, K. (2020). Keeping Privacy Data Secure Under Factory Recovery. In: Xiang, Y., Liu, Z., Li, J. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2020. Communications in Computer and Information Science, vol 1298. Springer, Singapore. https://doi.org/10.1007/978-981-15-9031-3_20
Download citation
DOI: https://doi.org/10.1007/978-981-15-9031-3_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9030-6
Online ISBN: 978-981-15-9031-3
eBook Packages: Computer ScienceComputer Science (R0)