skip to main content
10.1145/2987386.2987418acmconferencesArticle/Chapter ViewAbstractPublication PagesracsConference Proceedingsconference-collections
research-article

Efficient Storage Encryption for Android Mobile Devices

Published: 11 October 2016 Publication History

Abstract

In recent years, electronic products constant innovation, the phone hardware specifications of the device will be getting better and better. More and more important services and user data will be executed on smartphones. It is an emerging issue how to protect the user's privacy and security archives.
In this paper, we proposed a framework of secure storage for embedded systems. The proposed framework can integrate encryption and hash schemes to provide a secure and efficient data storage. We implement the proposed framework in Android based Samsung S4 smartphone. We also implement the framework with AES, BCrypt, PBKDF2, MD5 for personal and application data protections. A set of experiments for efficient analyses were also provided.

References

[1]
Steven Bauer and Nissanka Bodhi Priyantha. Secure data deletion for linux file systems. In Usenix Security Symposium, volume 174, 2001.
[2]
Joan Daemen and Vincent Rijmen. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, 2013.
[3]
Sarah M. Diesburg and An-I Andy Wang. A survey of confidential data storage and deletion methods. ACM Comput. Surv., 43(1):2:1--2:37, December 2010.
[4]
Peter Gutmann. Secure deletion of data from magnetic and solid-state memory. In Proceedings of the Sixth USENIX Security Symposium, San Jose, CA, volume 14, 1996.
[5]
Shijie Jia, Luning Xia, Bo Chen, and Peng Liu. Nfps: Adding undetectable secure deletion to ash translation layer. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS '16, pages 305--315, New York, NY, USA, 2016. ACM.
[6]
Nikolai Joukov, Harry Papaxenopoulos, and Erez Zadok. Secure deletion myths, issues, and solutions. In Proceedings of the second ACM workshop on Storage security and survivability, pages 61--66. ACM, 2006.
[7]
Burt Kaliski. Pkcs# 5: Password-based cryptography specification version 2.0. 2000.
[8]
Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong, and Sung Y. Shin. Secure deletion for nand ash file system. In Proceedings of the 2008 ACM Symposium on Applied Computing, SAC '08, pages 1710--1714, New York, NY, USA, 2008. ACM.
[9]
Kisung Lee and Youjip Won. Smart layers and dumb result: Io characterization of an android-based smartphone. In Proceedings of the Tenth ACM International Conference on Embedded Software, EMSOFT '12, pages 23--32, New York, NY, USA, 2012. ACM.
[10]
Manar Mohamed, Babins Shrestha, and Nitesh Saxena. Smashed: Sniffing and manipulating android sensor data. In Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy, CODASPY '16, pages 152--159, New York, NY, USA, 2016. ACM.
[11]
Niels Provos and David Mazieres. Bcrypt algorithm. USENIX, 1999.
[12]
Joel Reardon, David Basin, and Srdjan Capkun. Sok: Secure data deletion. In Security and Privacy (SP), 2013 IEEE Symposium on, pages 301--315. IEEE, 2013.
[13]
Ronald Rivest. The md5 message-digest algorithm. 1992.
[14]
Adam Skillen, David Barrera, and Paul C van Oorschot. Deadbolt: locking down android disk encryption. In Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices, pages 3--14. ACM, 2013.
[15]
Yang Tang, Patrick PC Lee, John CS Lui, and Radia Perlman. Secure overlay cloud storage with access control and assured deletion. IEEE Transactions on dependable and secure computing, 9(6):903--916, 2012.
[16]
Zhaohui Wang, Ryan Johnson, Rahul Murmuria, and Angelos Stavrou. Exposing security risks for commercial mobile devices. In International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, pages 3--21. Springer, 2012.
[17]
Zhaohui Wang, Rahul Murmuria, and Angelos Stavrou. Implementing and optimizing an encryption filesystem on android. In 2012 IEEE 13th International Conference on Mobile Data Management, pages 52--62. IEEE, 2012.
[18]
Fan Zhou, Yitao Yang, Zhaokun Ding, and Guozi Sun. Dump and analysis of android volatile memory on wechat. In 2015 IEEE International Conference on Communications (ICC), pages 7151--7156. IEEE, 2015.

Cited By

View all
  1. Efficient Storage Encryption for Android Mobile Devices

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    RACS '16: Proceedings of the International Conference on Research in Adaptive and Convergent Systems
    October 2016
    266 pages
    ISBN:9781450344555
    DOI:10.1145/2987386
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 October 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Embedded devices
    2. Encryption
    3. Security
    4. Storage

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    RACS '16
    Sponsor:

    Acceptance Rates

    RACS '16 Paper Acceptance Rate 40 of 161 submissions, 25%;
    Overall Acceptance Rate 393 of 1,581 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 06 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)A SVM-Based Malware Detection Mechanism for Android Devices2018 International Conference on System Science and Engineering (ICSSE)10.1109/ICSSE.2018.8520241(1-6)Online publication date: Jun-2018
    • (2017)Cost-Aware Software-Defined Hybrid Object-Based Storage System2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)10.1109/PDCAT.2017.00081(477-482)Online publication date: Dec-2017
    • (2017)A High Efficiency Encryption Scheme of Dual Data Partitions for Android Devices22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)10.1109/CSE-EUC.2017.164(823-828)Online publication date: Jul-2017
    • (2017)Design and Development of Backend Application for Public Complaint Systems Using Microservice Spring BootProcedia Computer Science10.1016/j.procs.2017.12.212124(736-743)Online publication date: 2017

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media