A SDKEY-Based Secure Storage and Transmission Approach for Android Phone
Title | A SDKEY-Based Secure Storage and Transmission Approach for Android Phone |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Ma Licui, Li Meihong, Li Lun, Du Ye, Zhang Dawei |
Conference Name | Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2014 International Conference on |
Date Published | Oct |
Keywords | Android (operating system), Android phones, Android system, authentication, Ciphers, data files, data protection, decryption operation, dual-authentication scheme, Encryption, encryption operation, Encryption Storage, encryption transmission, fine-grained encryption scheme, Key exchange, key exchange mechanisms, lock screen, message authentication, PIN, prototype system, public key cryptography, public key exchange, Receivers, SDKEY, SDKEY device, SDKEY-based secure storage, SDKEY-based transparent encryption storage, secure computation environment, sensitive data leakage, smart phones, storage management, system boot, transmission approach, zero-key exchange |
Abstract | To resolve the more and more serious problems of sensitive data leakage from Android systems, a kind of method of data protection on encryption storage and encryption transmission is presented in this paper by adopting secure computation environment of SDKEY device. Firstly, a dual-authentication scheme for login using SDKEY and PIN is designed. It is used for login on system boot and lock screen. Secondly, an approach on SDKEY-based transparent encryption storage for different kinds of data files is presented, and a more fine-grained encryption scheme for different file types is proposed. Finally, a method of encryption transmission between Android phones is presented, and two kinds of key exchange mechanisms are designed for next encryption and decryption operation in the following. One is a zero-key exchange and another is a public key exchange. In this paper, a prototype system based on the above solution has been developed, and its security and performance are both analyzed and verified from several aspects. |
DOI | 10.1109/CyberC.2014.10 |
Citation Key | 6984271 |
- SDKEY-based transparent encryption storage
- PIN
- prototype system
- public key cryptography
- public key exchange
- Receivers
- SDKEY
- SDKEY device
- SDKEY-based secure storage
- message authentication
- secure computation environment
- sensitive data leakage
- smart phones
- storage management
- system boot
- transmission approach
- zero-key exchange
- encryption
- Android phones
- Android system
- authentication
- Ciphers
- data files
- Data protection
- decryption operation
- dual-authentication scheme
- Android (operating system)
- encryption operation
- Encryption Storage
- encryption transmission
- fine-grained encryption scheme
- Key exchange
- key exchange mechanisms
- lock screen