Skip to main content

A Protection Method of Mobile Sensitive Data and Applications Over Escrow Service

  • Conference paper
  • First Online:
Advances in Parallel and Distributed Computing and Ubiquitous Services

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 368))

  • 761 Accesses

Abstract

Recently, mobile devices are gradually increasingly used even in companies and governmental institutions and the exchange of company data and military secret data through mobile devices is increased. As a result, the illegitimate leakage and collection of user data related to mobile devices has greatly increased. In this paper, we propose a method of managing the sensitive data of a mobile device using an escrow server. The proposed scheme is advantageous in that it is capable of storing the entrusted sensitive data of a user within the mobile device and verifying the validity of app software installed on the mobile device using an escrow server. Thereby it enhances data protection, minimizes damage resulting from the exposure of data attributable to the loss of a mobile device, and prevents the installation of illegitimate software.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The Radicati Group, inc. “Mobile App Reputation Services”, Understanding the role of App Reputation Services in delivering “Enterprise Grade” Mobile Security, A Whitepaper by The Radicati Group, Inc

    Google Scholar 

  2. Candea G, Bucur S, Zamfir C (2010) Automated software testing as a service. In: ACM SOCC, 2010

    Google Scholar 

  3. Egele M, Kruegel C, Kirda E, Vigna G (2011) “PiOS: detecting privacy leaks in ios applications”, In: NDSS, 2011

    Google Scholar 

  4. King ST, Chen PM (2003) “Backtracking intrusions”, In: SOSP, 2003

    Google Scholar 

  5. Oberheide J, Cooke E, Jahanian F (2008) “CloudAV: N-version antivirus in the network cloud”, In: USENIX Security, 2008

    Google Scholar 

  6. Yin H, Song D, Egele M, Kruegel C, Kirda E (2007) “Panorama: capturing system-wide information flow for malware detection and analysis”, In: ACM CCS, 2007

    Google Scholar 

  7. Poeplau S, Fratantonio Y, Bianchi A, Kruegel C, Vigna G (2014) Execute this Analyzing unsafe and malicious dynamic code loading in android applications. NDSS 14:23–26

    Google Scholar 

Download references

Acknowledgments

This work was supported by the ICT R&D program of MSIP/IITP. [R0101-15-0195(10043959), Development of EAL 4 level military fusion security solution for protecting against unauthorized accesses and ensuring a trusted execution environment in mobile devices.]

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deok Gyu Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Park, SW., Lee, D.G., Kim, J.N. (2016). A Protection Method of Mobile Sensitive Data and Applications Over Escrow Service. In: Park, J., Yi, G., Jeong, YS., Shen, H. (eds) Advances in Parallel and Distributed Computing and Ubiquitous Services. Lecture Notes in Electrical Engineering, vol 368. Springer, Singapore. https://doi.org/10.1007/978-981-10-0068-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0068-3_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0067-6

  • Online ISBN: 978-981-10-0068-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics