Skip to main content

Keeping Privacy Data Secure Under Factory Recovery

  • Conference paper
  • First Online:
Security and Privacy in Social Networks and Big Data (SocialSec 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1298))

  • 771 Accesses

Abstract

Nowadays, mobile devices are widely used. Mobile smartphones are not only a carrier for users to record, store, or transfer sensitive data in social network, but also a covert forensic tool for some security departments. In some extreme cases like war correspondent being about to be captured, the operation records of shooting and communication on the mobile phone will bring them disadvantages. Immediately performing a factory recovery is the smartest option. However, this operation will clear all user data, including those important case scene evidence. This paper proposes a flexible and reliable factory recovery mechanism to protect sensitive data under factory recovery. By analyzing the factory recovery process and mastering the Linux kernel execution process, to ensure that when users perform factory recovery operations, applications and data can be cleared normally, and the private data that users want to keep is protected. We evaluated the safety and usability of the method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Faruki, P., et al.: Android security: a survey of issues, malware penetration, and defenses

    Google Scholar 

  2. Statista. https://www.statista.com/statistics/262176/market-share-held-by-mobile-operating-systems-in-china/. Accessed 27 Nov 2019

  3. Kim, J., Jung, I.Y.: Private data protection of android application (2018)

    Google Scholar 

  4. https://zt.360.cn/1101061855.php?dtid=1101061451&did=210942656. Accessed 10 Nov 2019

  5. Li, Z., Yang, J., Cui, B.: Study on sensitive data protection based on SEAndroid. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) (2018)

    Google Scholar 

  6. Shahriar, H., et al.: Data protection labware for mobile security (2019)

    Google Scholar 

  7. Nguyen, N.H., et al.: No-key protocol for deniable encryption (2018)

    Google Scholar 

  8. Xue, Y., Tan, Y., Liang, C., Zhang, C.Y., Zheng, J.: An optimized data hiding scheme for Deflate codes. Soft. Comput. 22(13), 4445–4455 (2017). https://doi.org/10.1007/s00500-017-2651-2

    Article  Google Scholar 

  9. Yu, X.: A fault-tolerant and energy-efficient continuous data protection system. J. Amb. Intell. Hum. Comput. 10, 1–10 (2018)

    Google Scholar 

  10. Xiao, Yu., Changyou, Z., Yuan, X., Hongfei, Z., Yuanzhang, L., Yu-An, T.: An extra-parity energy saving data layout for video surveillance. Multimedia Tools Appl. 77(4), 4563–4583 (2017). https://doi.org/10.1007/s11042-017-4540-1

    Article  Google Scholar 

  11. Yu, X., et al.: A high-performance hierarchical snapshot scheme for hybrid storage systems. Chin. J. Electr. 27(1), 76–85 (2018)

    Article  Google Scholar 

  12. Zhang, X., Tan, Y., Zhang, C., Xue, Y., Li, Y., Zheng, J.: A code protection scheme by process memory relocation for android devices. Multimedia Tools Appl. 77(9), 11137–11157 (2017). https://doi.org/10.1007/s11042-017-5363-9

    Article  Google Scholar 

  13. Schwamm, R.: Effectiveness of the Factory Reset on a Mobile Device (2014)

    Google Scholar 

  14. Zhu, D., Fan, Z., Na, P.: A dynamic credible factory reset mechanism of personal data in android device

    Google Scholar 

  15. Dong, H.K., Eom, Y.I.: iDiscard: enhanced Discard() scheme for flash storage devices. In: 2018 IEEE International Conference on Big Data and Smart Computing (BigComp) (2018)

    Google Scholar 

  16. Xue, Y., et al.: Isolating host environment by booting android from OTG devices. Chin. J. Electr 27(03), 617–624 (2018)

    Google Scholar 

  17. Zhu, H., Zhang, Q., Liu, L., Aourra, K., Tan, Y.: Research of optimizing the system partition in android system. In: Xhafa, F., Patnaik, S., Yu, Z. (eds.) IISA 2016. AISC, vol. 541, pp. 168–173. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-49568-2_23

    Chapter  Google Scholar 

  18. Wang, H.S.O.C., et al.: An Analysis of the File System for Linux., Korea, p. 5 (2012)

    Google Scholar 

  19. Yudha, F., Prayudi, Y.: Block and inode based analysis on EXT4 File System 24(1), 652–655 (2018)

    Google Scholar 

  20. Fang, D.R., et al.: Research on recovery method of deleted data for android system. 40(10), 275–280 (2014)

    Google Scholar 

  21. Bovet, D., Cesati, M., Oram, A.: Understanding the Linux Kernel, 2n edn. (2002)

    Google Scholar 

  22. Yuan, P., et al.: Device-specific Linux kernel optimization for android smartphones (2018)

    Google Scholar 

  23. Park, J.H., et al.: An enhanced security framework for reliable Android operating system. Secur. Commun. Networks p. n/a-n/a

    Google Scholar 

  24. Talley, A.V.: Content analysis tools in android memory forensics (2014)

    Google Scholar 

  25. Liu, Z.L., Pun, C.M.: Reversible data-hiding in encrypted images by redundant space transfer. s 433–434, 188–203 (2018)

    Google Scholar 

  26. Abdel-Nabi, H., Al-Haj, A.: Efficient joint encryption and data hiding algorithm for medical images security. In: 2017 8th International Conference on Information and Communication Systems (ICICS) (2017)

    Google Scholar 

  27. Jiang, R., et al.: A high-capacity reversible data hiding method in encrypted images based on block shifting. In: 2017 2nd International Conference on Multimedia and Image Processing (ICMIP) (2017)

    Google Scholar 

  28. Abdulaziz, N.K.: Digital watermarking and data hiding in multimedia (2017)

    Google Scholar 

  29. Sharma, A., Sharma, N., Kumar, A.: A new algorithm to secure image steganographic file. In: 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence (Confluence) (2017)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grant No. 61876019.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liu Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lianfang, W., Ye, W., Gang, Z., Lu, L., Xiaohui, K. (2020). Keeping Privacy Data Secure Under Factory Recovery. In: Xiang, Y., Liu, Z., Li, J. (eds) Security and Privacy in Social Networks and Big Data. SocialSec 2020. Communications in Computer and Information Science, vol 1298. Springer, Singapore. https://doi.org/10.1007/978-981-15-9031-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9031-3_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9030-6

  • Online ISBN: 978-981-15-9031-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics