A SDKEY-Based Secure Storage and Transmission Approach for Android Phone
M Licui, L Meihong, L Lun, D Ye… - … Conference on Cyber …, 2014 - ieeexplore.ieee.org
M Licui, L Meihong, L Lun, D Ye, Z Dawei
2014 International Conference on Cyber-Enabled Distributed …, 2014•ieeexplore.ieee.orgTo resolve the more and more serious problems of sensitive data leakage from Android
systems, a kind of method of data protection on encryption storage and encryption
transmission is presented in this paper by adopting secure computation environment of
SDKEY device. Firstly, a dual-authentication scheme for login using SDKEY and PIN is
designed. It is used for login on system boot and lock screen. Secondly, an approach on
SDKEY-based transparent encryption storage for different kinds of data files is presented …
systems, a kind of method of data protection on encryption storage and encryption
transmission is presented in this paper by adopting secure computation environment of
SDKEY device. Firstly, a dual-authentication scheme for login using SDKEY and PIN is
designed. It is used for login on system boot and lock screen. Secondly, an approach on
SDKEY-based transparent encryption storage for different kinds of data files is presented …
To resolve the more and more serious problems of sensitive data leakage from Android systems, a kind of method of data protection on encryption storage and encryption transmission is presented in this paper by adopting secure computation environment of SDKEY device. Firstly, a dual-authentication scheme for login using SDKEY and PIN is designed. It is used for login on system boot and lock screen. Secondly, an approach on SDKEY-based transparent encryption storage for different kinds of data files is presented, and a more fine-grained encryption scheme for different file types is proposed. Finally, a method of encryption transmission between Android phones is presented, and two kinds of key exchange mechanisms are designed for next encryption and decryption operation in the following. One is a zero-key exchange and another is a public key exchange. In this paper, a prototype system based on the above solution has been developed, and its security and performance are both analyzed and verified from several aspects.
ieeexplore.ieee.org
Showing the best result for this search. See all results