Abstract
Recently, mobile devices are gradually increasingly used even in companies and governmental institutions and the exchange of company data and military secret data through mobile devices is increased. As a result, the illegitimate leakage and collection of user data related to mobile devices has greatly increased. In this paper, we propose a method of managing the sensitive data of a mobile device using an escrow server. The proposed scheme is advantageous in that it is capable of storing the entrusted sensitive data of a user within the mobile device and verifying the validity of app software installed on the mobile device using an escrow server. Thereby it enhances data protection, minimizes damage resulting from the exposure of data attributable to the loss of a mobile device, and prevents the installation of illegitimate software.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
The Radicati Group, inc. “Mobile App Reputation Services”, Understanding the role of App Reputation Services in delivering “Enterprise Grade” Mobile Security, A Whitepaper by The Radicati Group, Inc
Candea G, Bucur S, Zamfir C (2010) Automated software testing as a service. In: ACM SOCC, 2010
Egele M, Kruegel C, Kirda E, Vigna G (2011) “PiOS: detecting privacy leaks in ios applications”, In: NDSS, 2011
King ST, Chen PM (2003) “Backtracking intrusions”, In: SOSP, 2003
Oberheide J, Cooke E, Jahanian F (2008) “CloudAV: N-version antivirus in the network cloud”, In: USENIX Security, 2008
Yin H, Song D, Egele M, Kruegel C, Kirda E (2007) “Panorama: capturing system-wide information flow for malware detection and analysis”, In: ACM CCS, 2007
Poeplau S, Fratantonio Y, Bianchi A, Kruegel C, Vigna G (2014) Execute this Analyzing unsafe and malicious dynamic code loading in android applications. NDSS 14:23–26
Acknowledgments
This work was supported by the ICT R&D program of MSIP/IITP. [R0101-15-0195(10043959), Development of EAL 4 level military fusion security solution for protecting against unauthorized accesses and ensuring a trusted execution environment in mobile devices.]
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Park, SW., Lee, D.G., Kim, J.N. (2016). A Protection Method of Mobile Sensitive Data and Applications Over Escrow Service. In: Park, J., Yi, G., Jeong, YS., Shen, H. (eds) Advances in Parallel and Distributed Computing and Ubiquitous Services. Lecture Notes in Electrical Engineering, vol 368. Springer, Singapore. https://doi.org/10.1007/978-981-10-0068-3_13
Download citation
DOI: https://doi.org/10.1007/978-981-10-0068-3_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0067-6
Online ISBN: 978-981-10-0068-3
eBook Packages: Computer ScienceComputer Science (R0)