Abstract
In response to mobile terminal threats, this work is innovative, and gives practical solutions and prototype systems. The work first analyzes in detail the entire process of the generation, transmission and use of user-sensitive data within the Android system. In order to achieve resource sharing and data transmission between different applications and processes, the Android system provides a mechanism for inter-process communication based on Binder. Sensitive data is transmitted through Binder as a channel in the system. But sensitive data is carried out in the form of clear text during Binder transmission, which allows malware to easily intercept and tamper with sensitive data based on Binder communication, such as SMS content and GPS location information. In response to this problem, based on the above research, this work innovatively proposes and implements an adaptive transparent encryption protection scheme for sensitive data in the Android system from generation to use throughout the life cycle, effectively preventing sensitive data from being. The threat of theft and tampering by malicious third parties guarantees the privacy and integrity of user sensitive data during the internal transmission of the system. In addition, the system provides users with a simple and flexible operating experience, allowing users to independently protect specific types of sensitive data in specified applications, enhancing the ease of use and practicality of the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Choe, C., Chen, C.T., Nagao, S., et al.: Real-time acoustic emission monitoring of wear-out failure in SiC power electronic devices during power cycling tests. IEEE Trans. Power Electron. 36, 4420–4428 (2021). https://doi.org/10.1109/TPEL.2020.3024986
Xu, J., Wei, L.W., Wu, W., et al.: Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system. Future Gener. Comput. Syst. 108, 1287–1296 (2018). https://doi.org/10.1016/j.future.2018.04.018
Xu, J., Wang, A.D., Wu, J., et al.: SPCSS: social network based privacy-preserving criminal suspects sensing. IEEE Trans. Comput. Soc. Syst. 7, 261–274 (2020). https://doi.org/10.1109/TCSS.2019.2960857
Bello, O., Zeadally, S.: Intelligent device-to-device communication in the internet of things. IEEE Syst. J. 10, 1172–1182 (2016). https://doi.org/10.1109/JSYST.2014.2298837
Xu, J., Liu, H., Wu, D.X., et al.: Generating universal adversarial perturbation with ResNet. Inf. Sci. 537, 302–312 (2020). https://doi.org/10.1016/j.ins.2020.05.099
Al-Turjman, F.: Intelligence and security in big 5G-oriented IoNT: an overview. Future Gener. Comput. Syst. 102, 357–368 (2020). https://doi.org/10.1016/j.future.2019.08.009
Rajy, L., Kiram, M.A., Ghazouani, M.E.: New security risk value estimate method for android applications. Comput. J. 63, 593–603 (2020). https://doi.org/10.1093/comjnl/bxz109
Kelec, A., Djuric, Z.: A proposal for addressing security issues related to dynamic code loading on android platform. Comput. Syst. Sci. Eng. 35, 271–282 (2020). https://doi.org/10.32604/csse.2020.35.271
Feng, R.T., Chen, S., Xie, X.F., et al.: A performance-sensitive malware detection system using deep learning on mobile devices. IEEE Trans. Inf. Forens. Secur. 16, 1563–1578 (2021). https://doi.org/10.1109/TIFS.2020.3025436
Qamar, A., Karim, A., Chang, V.: Mobile malware attacks: review, taxonomy & future directions. Future Gener. Comput. Syst. 97, 887–909 (2019). https://doi.org/10.1016/j.future.2019.03.007
Acknowledgement
This research was funded by the Science and Technology Project Funding of State Grid Corporation of China (Research on Key Technologies of Energy Internet Mobile and Internet Security in 2019–2021, Contract no.: 5700-210955463A-0–0-00).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
He, J., Gao, M., Zhang, Z., Ma, L., Ning, Z., Cao, J. (2021). Security Transmission Scheme of Sensitive Data for Mobile Terminal. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-78612-0_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78611-3
Online ISBN: 978-3-030-78612-0
eBook Packages: Computer ScienceComputer Science (R0)