Personal Privacy Protection Framework Based on Hidden Technology for Smartphones

被引:7
|
作者
Hong, Shuangxi [1 ]
Liu, Chuanchang [1 ]
Ren, Bingfei [1 ]
Huang, Yuze [1 ]
Chen, Junliang [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
来源
IEEE ACCESS | 2017年 / 5卷
关键词
System service; deniable encryption; mobile device; privacy protection;
D O I
10.1109/ACCESS.2017.2695561
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smartphones are increasingly used for storing a large amount of sensitive used data. Users can protect their sensitive data through encryption and locking screen. A pattern lock is one of the ways to lock a screen. This method is used by most users because of its ease of use and memorization. However, a pattern lock with low security level is inadequate to protect the sensitive data of the user when it encounters a brute force or other physical attack (e.g., smudge attack). Furthermore, it bypasses all of the protection measures of mobile device when users are coerced into disclosing their passwords. Steganographic techniques and deniable encryption are designed to protect the sensitive data of the user as well as secure communications and can hide sensitive data on a disk or during communication with other devices. To overcome these deficiencies that mobile devices present, we present a novel, practical safe framework called MobiMimosa that is based on plausible deniable encryption. MobiMimosa enables multiple hidden encryption volumes and dynamic mounting of hidden volumes, which facilitates the transfer of sensitive data from a normal volume to a hidden volume. Simultaneously, to meet the personalized needs of the security of the mobile device, MobiMimosa enables a strategy to be set that can trigger the uninstalling of a sensitive app and the destruction of sensitive data. MobiMimosa also greatly alleviates corruption of the cross-volume boundary that is present in previous smartphone PDE schemes. We implemented a prototype system on the android device.
引用
收藏
页码:6515 / 6526
页数:12
相关论文
共 50 条
  • [1] Privacy Protection for Smartphones: An Ontology-Based Firewall
    Vincent, Johann
    Porquet, Christine
    Borsali, Maroua
    Leboulanger, Harold
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 371 - 380
  • [2] Research on the personal privacy information protection problem based on computer security technology
    Zhong, Shuangxi
    Zhang, Min
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTOMATION, MECHANICAL CONTROL AND COMPUTATIONAL ENGINEERING, 2015, 124 : 917 - 923
  • [3] Privacy Protection for Perceptual Applications on Smartphones
    Zhao, Kao
    Zou, Deqing
    Jin, Hai
    Tian, Zhangbiaoge
    Qiang, Weizhong
    Dai, Weiqi
    [J]. 2015 IEEE THIRD INTERNATIONAL CONFERENCE ON MOBILE SERVICES MS 2015, 2015, : 174 - 181
  • [4] LPPS: Location Privacy Protection for Smartphones
    Zhang, Hongli
    Xu, Zhikai
    Yu, Xiangzhan
    Du, Xiaojiang
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [5] Evaluating the Privacy Valuation of Personal Data on Smartphones
    Fan, Lihua
    Zhang, Shuning
    Kong, Yan
    Yi, Xin
    Wang, Yang
    Xu, Xuhai ''Orson''
    Yu, Chun
    Li, Hewu
    Shi, Yuanchun
    [J]. PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2024, 8 (03):
  • [6] PRIVACY PROTECTION ON DATA OVERFLOW SYSTEM FOR SMARTPHONES
    Sindhusha, P.
    Bharathi, B.
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTATION OF POWER, ENERGY INFORMATION AND COMMUNICATION (ICCPEIC), 2017, : 310 - 315
  • [7] A Framework for Privacy Protection and Usage Control of Personal Data in a Smart City Scenario
    Baldini, Gianmarco
    Kounelis, Ioannis
    Fovino, Igor Nai
    Neisse, Ricardo
    [J]. CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2013, 2013, 8328 : 212 - 217
  • [8] LISA: Location Information ScrAmbler for Privacy Protection on Smartphones
    Chen, Zhigang
    Hu, Xin
    Ju, Xiaoen
    Shin, Kang G.
    [J]. 2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 296 - 304
  • [9] Who Moved My Data? Privacy Protection in Smartphones
    Dai, Wenyun
    Qiu, Meikang
    Qiu, Longfei
    Chen, Longbin
    Wu, Ana
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (01) : 20 - 25
  • [10] A new blockchain-based personal privacy protection scheme
    Gao, Yu-Long
    Chen, Xiu-Bo
    Xu, Gang
    Liu, Wen
    Dong, Mian-Xiong
    Liu, Xin
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (20) : 30677 - 30690