Visible to the public A SDKEY-Based Secure Storage and Transmission Approach for Android Phone

TitleA SDKEY-Based Secure Storage and Transmission Approach for Android Phone
Publication TypeConference Paper
Year of Publication2014
AuthorsMa Licui, Li Meihong, Li Lun, Du Ye, Zhang Dawei
Conference NameCyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2014 International Conference on
Date PublishedOct
KeywordsAndroid (operating system), Android phones, Android system, authentication, Ciphers, data files, data protection, decryption operation, dual-authentication scheme, Encryption, encryption operation, Encryption Storage, encryption transmission, fine-grained encryption scheme, Key exchange, key exchange mechanisms, lock screen, message authentication, PIN, prototype system, public key cryptography, public key exchange, Receivers, SDKEY, SDKEY device, SDKEY-based secure storage, SDKEY-based transparent encryption storage, secure computation environment, sensitive data leakage, smart phones, storage management, system boot, transmission approach, zero-key exchange
Abstract

To resolve the more and more serious problems of sensitive data leakage from Android systems, a kind of method of data protection on encryption storage and encryption transmission is presented in this paper by adopting secure computation environment of SDKEY device. Firstly, a dual-authentication scheme for login using SDKEY and PIN is designed. It is used for login on system boot and lock screen. Secondly, an approach on SDKEY-based transparent encryption storage for different kinds of data files is presented, and a more fine-grained encryption scheme for different file types is proposed. Finally, a method of encryption transmission between Android phones is presented, and two kinds of key exchange mechanisms are designed for next encryption and decryption operation in the following. One is a zero-key exchange and another is a public key exchange. In this paper, a prototype system based on the above solution has been developed, and its security and performance are both analyzed and verified from several aspects.

DOI10.1109/CyberC.2014.10
Citation Key6984271