Skip to main content
Log in

Android platform-based individual privacy information protection system

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

With the popularity of mobile phones with Android platform, Android platform-based individual privacy information protection has been paid more attention to. In consideration of individual privacy information problem after mobile phones are lost, this paper tried to use SMS for remote control of mobile phones and providing comprehensive individual information protection method for users and completed a mobile terminal system with self-protection characteristics. This system is free from the support of the server and it can provide individual information protection for users by the most basic SMS function, which is an innovation of the system. Moreover, the protection mechanism of the redundancy process, trusted number mechanism and SIM card detection mechanism are the innovations of this system. Through functional tests and performance tests, the system could satisfy user functional and non-functional requirements, with stable operation and high task execution efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Wei T-E, Jeng AB, Lee H-M, Chen C-H, Tien C-W (2012) Android privacy. In: 2012 international conference on machine learning and cybernetics (ICMLC), vol 5. IEEE, pp 1830–1837

  2. Vincent Messina (2012) Android4.0: lock screen 101. http://www.cultofandroid.com/10247/android-4-0-lock-screen-101/.2012-5-7

  3. Enck W, Ongtang M, McDaniel P (2009) Understanding android security. IEEE Secur Priv 1:50–57

    Article  Google Scholar 

  4. Chiang H-S, Tsaur W-J (2010) Mobile malware behavioral analysis and preventive strategy using ontology. In: 2010 IEEE second international conference on social computing (SocialCom). IEEE, pp 1080–1085

  5. Alazab M, Moonsamy V, Batten L, Lantz P, Tian R (2012) Analysis of malicious and benign android applications. In 2012 32nd international conference on distributed computing systems workshops (ICDCSW). IEEE, pp 608–616

  6. Zhou Y, Jiang X (2012) Dissecting android malware: characterization and evolution. In: 2012 IEEE symposium on security and privacy (SP). IEEE, pp 95–109

  7. Adeel M, Tokarchuk LN (2011) Analysis of mobile p2p malware detection framework through cabir & commwarrior families. In: 2011 IEEE third international conference on privacy, security, risk and trust (PASSAT) and 2011 IEEE third international conference on social computing (SocialCom). IEEE, pp 1335–1343

  8. Schmidt AD, Bye R, Schmidt H-G, Clausen J, Kiraz O, Yüksel KA, Camtepe SA, Albayrak S (2009) Static analysis of executables for collaborative malware detection on android. In: IEEE international conference on communications, 2009. ICC’09. IEEE, pp 1–5

  9. Bläsing T, Batyuk L, Schmidt A-D, Camtepe SA, Albayrak S (2010) An android application sandbox system for suspicious software detection. In: 2010 5th international conference on Malicious and unwanted software (MALWARE). IEEE, pp 55–62

  10. Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices. ACM, pp 15–26

  11. Shabtai A, Kanonov U, Elovici Y, Glezer C, Weiss Y (2012) “Andromaly”: a behavioral malware detection framework for android devices. J Intell Inf Syst 38(1):161–190

    Article  Google Scholar 

  12. Di Cerbo F, Girardello A, Michahelles F, Voronkova S (2010) Detection of malicious applications on android os. In: Computational forensics. Springer, Berlin, pp 138–149

  13. Shakya N (2012) Privacy issues of antivirus apps for smartphones. In: The 12th winona computer science undergraduate research symposium, p 17

  14. Liu J, Yu J (2011) Research on development of android applications. In: 2011 fourth international conference on intelligent networks and intelligent systems. IEEE, pp 69–72

  15. Zhang D, Zhang D, Xiong H, Hsu C-H, Vasilakos AV (2014) BASA: building mobile ad-hoc social networks on top of android. IEEE Netw 28(1):4–9

    Article  Google Scholar 

  16. Wang Y, Vasilakos AV, Jin Q, Ma J (2014) Survey on mobile social networking in proximity (MSNP): approaches, challenges and architecture. Wirel Netw 20(6):1295–1311

    Article  Google Scholar 

  17. Zhou J, Cao Z, Dong X, Lin X, Vasilakos AV (2013) Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel Commun 20(4):12–21

    Article  Google Scholar 

  18. Xia F, Liu L, Li J, Ma J, Vasilakos AV (2015) Socially aware networking: a survey. IEEE Syst J 9(3):904–921

    Article  Google Scholar 

  19. Zhou J, Cao Z, Dong X, Xiong N, Vasilakos AV (2015) 4S: a secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Inf Sci 314:255–276

    Article  Google Scholar 

  20. Xia F, Hsu C-H, Liu X, Liu H, Ding F, Zhang W (2015) The power of smartphones. Multimed Syst 21(1):87–101

    Article  Google Scholar 

  21. Zhang W, Zhang Y, Kim T-H (2014) Detecting bad information in mobile wireless networks based on the wireless application protocol. Computing 96(9):855–874

    Article  Google Scholar 

  22. Zhang W, He H, Zhang Q, Kim T (2014) PhoneProtector: protecting user privacy on the android-based mobile platform. Int J Distrib Sensor Netw 2014:10, Art ID 282417. doi:10.1155/2014/282417

Download references

Acknowledgments

This work is supported by the National Key Research and Development Program of China under grant No. 2016YFB0800801, the National Science Foundation of China (NSFC) under grant No. 61672186, 61472108, and the Specialized Research Fund for the Doctoral Program of Higher Education under grant No. 20132302110037.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weizhe Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, W., Li, X., Xiong, N. et al. Android platform-based individual privacy information protection system. Pers Ubiquit Comput 20, 875–884 (2016). https://doi.org/10.1007/s00779-016-0966-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-016-0966-0

Keywords

Navigation