Personal and Ubiquitous Computing

, Volume 20, Issue 6, pp 875–884 | Cite as

Android platform-based individual privacy information protection system

  • Weizhe Zhang
  • Xiong Li
  • Naixue Xiong
  • Athanasios V. Vasilakos
Original Article

Abstract

With the popularity of mobile phones with Android platform, Android platform-based individual privacy information protection has been paid more attention to. In consideration of individual privacy information problem after mobile phones are lost, this paper tried to use SMS for remote control of mobile phones and providing comprehensive individual information protection method for users and completed a mobile terminal system with self-protection characteristics. This system is free from the support of the server and it can provide individual information protection for users by the most basic SMS function, which is an innovation of the system. Moreover, the protection mechanism of the redundancy process, trusted number mechanism and SIM card detection mechanism are the innovations of this system. Through functional tests and performance tests, the system could satisfy user functional and non-functional requirements, with stable operation and high task execution efficiency.

Keywords

Android Information security Mobile device Remote control SMS message 

References

  1. 1.
    Wei T-E, Jeng AB, Lee H-M, Chen C-H, Tien C-W (2012) Android privacy. In: 2012 international conference on machine learning and cybernetics (ICMLC), vol 5. IEEE, pp 1830–1837Google Scholar
  2. 2.
    Vincent Messina (2012) Android4.0: lock screen 101. http://www.cultofandroid.com/10247/android-4-0-lock-screen-101/.2012-5-7
  3. 3.
    Enck W, Ongtang M, McDaniel P (2009) Understanding android security. IEEE Secur Priv 1:50–57CrossRefGoogle Scholar
  4. 4.
    Chiang H-S, Tsaur W-J (2010) Mobile malware behavioral analysis and preventive strategy using ontology. In: 2010 IEEE second international conference on social computing (SocialCom). IEEE, pp 1080–1085Google Scholar
  5. 5.
    Alazab M, Moonsamy V, Batten L, Lantz P, Tian R (2012) Analysis of malicious and benign android applications. In 2012 32nd international conference on distributed computing systems workshops (ICDCSW). IEEE, pp 608–616Google Scholar
  6. 6.
    Zhou Y, Jiang X (2012) Dissecting android malware: characterization and evolution. In: 2012 IEEE symposium on security and privacy (SP). IEEE, pp 95–109Google Scholar
  7. 7.
    Adeel M, Tokarchuk LN (2011) Analysis of mobile p2p malware detection framework through cabir & commwarrior families. In: 2011 IEEE third international conference on privacy, security, risk and trust (PASSAT) and 2011 IEEE third international conference on social computing (SocialCom). IEEE, pp 1335–1343Google Scholar
  8. 8.
    Schmidt AD, Bye R, Schmidt H-G, Clausen J, Kiraz O, Yüksel KA, Camtepe SA, Albayrak S (2009) Static analysis of executables for collaborative malware detection on android. In: IEEE international conference on communications, 2009. ICC’09. IEEE, pp 1–5Google Scholar
  9. 9.
    Bläsing T, Batyuk L, Schmidt A-D, Camtepe SA, Albayrak S (2010) An android application sandbox system for suspicious software detection. In: 2010 5th international conference on Malicious and unwanted software (MALWARE). IEEE, pp 55–62Google Scholar
  10. 10.
    Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices. ACM, pp 15–26Google Scholar
  11. 11.
    Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) “Andromaly”: a behavioral malware detection framework for android devices. J Intell Inf Syst 38(1):161–190CrossRefGoogle Scholar
  12. 12.
    Di Cerbo F, Girardello A, Michahelles F, Voronkova S (2010) Detection of malicious applications on android os. In: Computational forensics. Springer, Berlin, pp 138–149Google Scholar
  13. 13.
    Shakya N (2012) Privacy issues of antivirus apps for smartphones. In: The 12th winona computer science undergraduate research symposium, p 17Google Scholar
  14. 14.
    Liu J, Yu J (2011) Research on development of android applications. In: 2011 fourth international conference on intelligent networks and intelligent systems. IEEE, pp 69–72Google Scholar
  15. 15.
    Zhang D, Zhang D, Xiong H, Hsu C-H, Vasilakos AV (2014) BASA: building mobile ad-hoc social networks on top of android. IEEE Netw 28(1):4–9CrossRefGoogle Scholar
  16. 16.
    Wang Y, Vasilakos AV, Jin Q, Ma J (2014) Survey on mobile social networking in proximity (MSNP): approaches, challenges and architecture. Wirel Netw 20(6):1295–1311CrossRefGoogle Scholar
  17. 17.
    Zhou J, Cao Z, Dong X, Lin X, Vasilakos AV (2013) Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel Commun 20(4):12–21CrossRefGoogle Scholar
  18. 18.
    Xia F, Liu L, Li J, Ma J, Vasilakos AV (2015) Socially aware networking: a survey. IEEE Syst J 9(3):904–921CrossRefGoogle Scholar
  19. 19.
    Zhou J, Cao Z, Dong X, Xiong N, Vasilakos AV (2015) 4S: a secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf Sci 314:255–276CrossRefGoogle Scholar
  20. 20.
    Xia F, Hsu C-H, Liu X, Liu H, Ding F, Zhang W (2015) The power of smartphones. Multimed Syst 21(1):87–101CrossRefGoogle Scholar
  21. 21.
    Zhang W, Zhang Y, Kim T-H (2014) Detecting bad information in mobile wireless networks based on the wireless application protocol. Computing 96(9):855–874CrossRefGoogle Scholar
  22. 22.
    Zhang W, He H, Zhang Q, Kim T (2014) PhoneProtector: protecting user privacy on the android-based mobile platform. Int J Distrib Sensor Netw 2014:10, Art ID 282417. doi:10.1155/2014/282417

Copyright information

© Springer-Verlag London 2016

Authors and Affiliations

  • Weizhe Zhang
    • 1
  • Xiong Li
    • 1
  • Naixue Xiong
    • 2
  • Athanasios V. Vasilakos
    • 3
  1. 1.School of Computer Science and TechnologyHarbin Institute of TechnologyHarbinChina
  2. 2.Department of Business and Computer ScienceSouthwestern Oklahoma State UniversityOklahomaUSA
  3. 3.Lulea University of TechnologyLuleåSweden

Personalised recommendations