Skip to main content

Security Transmission Scheme of Sensitive Data for Mobile Terminal

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12737))

Included in the following conference series:

  • 1374 Accesses

Abstract

In response to mobile terminal threats, this work is innovative, and gives practical solutions and prototype systems. The work first analyzes in detail the entire process of the generation, transmission and use of user-sensitive data within the Android system. In order to achieve resource sharing and data transmission between different applications and processes, the Android system provides a mechanism for inter-process communication based on Binder. Sensitive data is transmitted through Binder as a channel in the system. But sensitive data is carried out in the form of clear text during Binder transmission, which allows malware to easily intercept and tamper with sensitive data based on Binder communication, such as SMS content and GPS location information. In response to this problem, based on the above research, this work innovatively proposes and implements an adaptive transparent encryption protection scheme for sensitive data in the Android system from generation to use throughout the life cycle, effectively preventing sensitive data from being. The threat of theft and tampering by malicious third parties guarantees the privacy and integrity of user sensitive data during the internal transmission of the system. In addition, the system provides users with a simple and flexible operating experience, allowing users to independently protect specific types of sensitive data in specified applications, enhancing the ease of use and practicality of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Choe, C., Chen, C.T., Nagao, S., et al.: Real-time acoustic emission monitoring of wear-out failure in SiC power electronic devices during power cycling tests. IEEE Trans. Power Electron. 36, 4420–4428 (2021). https://doi.org/10.1109/TPEL.2020.3024986

  2. Xu, J., Wei, L.W., Wu, W., et al.: Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system. Future Gener. Comput. Syst. 108, 1287–1296 (2018). https://doi.org/10.1016/j.future.2018.04.018

    Article  Google Scholar 

  3. Xu, J., Wang, A.D., Wu, J., et al.: SPCSS: social network based privacy-preserving criminal suspects sensing. IEEE Trans. Comput. Soc. Syst. 7, 261–274 (2020). https://doi.org/10.1109/TCSS.2019.2960857

    Article  Google Scholar 

  4. Bello, O., Zeadally, S.: Intelligent device-to-device communication in the internet of things. IEEE Syst. J. 10, 1172–1182 (2016). https://doi.org/10.1109/JSYST.2014.2298837

  5. Xu, J., Liu, H., Wu, D.X., et al.: Generating universal adversarial perturbation with ResNet. Inf. Sci. 537, 302–312 (2020). https://doi.org/10.1016/j.ins.2020.05.099

    Article  MathSciNet  Google Scholar 

  6. Al-Turjman, F.: Intelligence and security in big 5G-oriented IoNT: an overview. Future Gener. Comput. Syst. 102, 357–368 (2020). https://doi.org/10.1016/j.future.2019.08.009

    Article  Google Scholar 

  7. Rajy, L., Kiram, M.A., Ghazouani, M.E.: New security risk value estimate method for android applications. Comput. J. 63, 593–603 (2020). https://doi.org/10.1093/comjnl/bxz109

    Article  Google Scholar 

  8. Kelec, A., Djuric, Z.: A proposal for addressing security issues related to dynamic code loading on android platform. Comput. Syst. Sci. Eng. 35, 271–282 (2020). https://doi.org/10.32604/csse.2020.35.271

  9. Feng, R.T., Chen, S., Xie, X.F., et al.: A performance-sensitive malware detection system using deep learning on mobile devices. IEEE Trans. Inf. Forens. Secur. 16, 1563–1578 (2021). https://doi.org/10.1109/TIFS.2020.3025436

    Article  Google Scholar 

  10. Qamar, A., Karim, A., Chang, V.: Mobile malware attacks: review, taxonomy & future directions. Future Gener. Comput. Syst. 97, 887–909 (2019). https://doi.org/10.1016/j.future.2019.03.007

Download references

Acknowledgement

This research was funded by the Science and Technology Project Funding of State Grid Corporation of China (Research on Key Technologies of Energy Internet Mobile and Internet Security in 2019–2021, Contract no.: 5700-210955463A-0–0-00).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, J., Gao, M., Zhang, Z., Ma, L., Ning, Z., Cao, J. (2021). Security Transmission Scheme of Sensitive Data for Mobile Terminal. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78612-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78611-3

  • Online ISBN: 978-3-030-78612-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics