Skip to main content

A Mobile Data Leakage Prevention System Based on Encryption Algorithms

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1796))

Included in the following conference series:

Abstract

Mobile Internet is an emerging field that is developing rapidly. However, the frequent data leakage events caused by the security problems of mobile Internet have brought great impact to enterprises and individuals. Cryptography is promising way for data security and is widely used in the industries such as power systems. How to effectively use data encryption algorithms in the field of mobile Internet to meet the security requirements of data sharing is a problem to be solved. Therefore, this paper proposes a mobile data leakage prevention system that adopts the encryption algorithms SM3 and SM4 that are approved by the State Cryptography Administration of China. The cipher-text retrieval model is proposed for secure data sharing between data owner and data user via cloud servers. The system model that is built based on the studied encryption algorithms and models is describe. Additional functions are also designed for mobile data leakage prevention such as data security management and security data analysis. The proposed system is expected protect the data transmission, storage and sharing between data owner, data user and cloud server, providing an architecture to build a security mechanism to lower the risks from data theft, eavesdropping and tampering.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cheng, X., Fang, L., Yang, L., Cui, S.: Mobile big data: the fuel for data-driven wireless. IEEE Internet Things J. 4(5), 1489–1516 (2017)

    Article  Google Scholar 

  2. Yin, X., He, J., Gao, Y., Li, J.: Multi-source data analysis method of exhibition site based on mobile internet. Int. Wireless Commun. Mobile Comput. (IWCMC) 2021, 41–44 (2021)

    Article  Google Scholar 

  3. Zhang, Q.: An overview and analysis of hybrid encryption: the combination of symmetric encryption and asymmetric encryption. In: 2021 2nd International Conference on Computing and Data Science (CDS), pp. 616–622 (2021)

    Google Scholar 

  4. Zheng, X., Xu, C., Hu, X., Zhang, Y., Xiong, X.: The software/hardware co-design and implementation of SM2/3/4 encryption/decryption and digital signature System. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(10), 2055–2066 (2020)

    Article  Google Scholar 

  5. Atmaja, I.M.A.D.S., Astawa, I.N.G.A., Wisswani, N.W., Nugroho, I.M.R.A., Sunu, P.W., Wiratama, I.K.: Document encryption through asymmetric RSA cryptography. Int. Conf. Appl. Sci. Technol. (iCAST) 2020, 46–49 (2020)

    Google Scholar 

  6. Rajeshwaran, K., Kumar, K.A.: Cellular automata based hashing algorithm (cabha) for strong cryptographic hash function. In: 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–6 (2019)

    Google Scholar 

  7. Li, T., et al.: Energy-efficient and secure communication toward UAV networks. IEEE Internet Things J. 9(12), 10061–10076 (2022)

    Article  MathSciNet  Google Scholar 

  8. Jin, C., Zeng, Z., Miao, W., Bao, Z., Zhang, R.: A nonlinear white-box SM4 implementation applied to edge IoT agents. In: 2021 IEEE 5th Conference on Energy Internet and Energy System Integration (EI2), pp. 3358–3363 (2021)

    Google Scholar 

  9. Liu, D., Wang, R., Zhang, H., Chen, J., Liu, X., Ma, L.: Research on terminal security technology of ubiquitous power internet of things based on PUF and SM3. In: 2019 IEEE 3rd Conference on Energy Internet and Energy System Integration (EI2), pp. 910–915 ( 2019)

    Google Scholar 

  10. Wang, T., et al.: The research of the SM2, SM3 and SM4 Algorithms in WLAN of transformer substation. In: 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE), pp. 276–283 (2019)

    Google Scholar 

  11. Zang, S., et al.: IEEE 5th advanced information technology. Electron. Autom. Control Conf. (IAEAC) 2021, 915–919 (2021)

    Google Scholar 

  12. Liu, Y., Zhao, R., Han, L., Xie, J.: Research and implementation of parallel optimization of SM3 algorithm based on multithread. In: 2022 7th International Conference on Intelligent Computing and Signal Processing (ICSP), pp. 330–33 (2022)

    Google Scholar 

  13. Feng, X., Ma, J., Liu, S., Miao, Y., Liu, X., Choo, K.-K.R.: Transparent ciphertext retrieval system supporting integration of encrypted heterogeneous database in cloud-assisted IoT. IEEE Internet Things J. 9(5), 3784–3798 (2022)

    Article  Google Scholar 

  14. He, H., Chen, R., Liu, C., Feng, K., Zhou, X.: An efficient ciphertext retrieval scheme based on homomorphic encryption for multiple data owners in hybrid cloud. IEEE Access 9, 168547–168557 (2021)

    Article  Google Scholar 

Download references

Acknowledgments

The research in this paper was financially supported by science and technology project of State Grid Corporation of China under Grant No. 5700-202153172A-0-0-00.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen Shen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shen, W., Xiong, H. (2023). A Mobile Data Leakage Prevention System Based on Encryption Algorithms. In: Tian, Y., Ma, T., Jiang, Q., Liu, Q., Khan, M.K. (eds) Big Data and Security. ICBDS 2022. Communications in Computer and Information Science, vol 1796. Springer, Singapore. https://doi.org/10.1007/978-981-99-3300-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-3300-6_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-3299-3

  • Online ISBN: 978-981-99-3300-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics