Android平臺(tái)隱私保護(hù)方法研究
[Abstract]:With the popularity of smart phones and the continuous improvement of computing power, smart phones have become a necessary tool for people to entertain and communicate. Smart phones have also saved a lot of personal privacy, such as photos and video, while it is convenient for users to use. In particular, the rapid development of mobile Internet and cloud computing makes online shopping and moving. In addition, in order to improve the efficiency of the employees, in order to improve the efficiency of the employees, the big companies have launched their own mobile office APP., which have provided the users with great convenience, but also lead to the smart phone carrying more personal privacy and business secrets. Therefore, the smart phone is safe already. In all smart phone operating systems, the Android system has become the main target of malicious program attack because of its open characteristics and maximum market share. In order to protect the privacy of users, the Android system provides some basic protection measures, such as lock screen and full disk encryption. In order to prevent malicious program attacks, the Android system also uses some other protective measures, such as access control strategy based on authority, application digital signature, etc. Although these measures protect the user's personal privacy and system security to a certain extent, there are still many security vulnerabilities, and in some cases, these The measures are almost ineffective. Therefore, from the actual situation, this paper analyzes the shortcomings of the Android system, and puts forward three kinds of system strengthening security mechanisms to prevent privacy disclosure, that is, the privacy protection mechanism based on deniable encryption, a trusted running environment architecture based on dual system space and a memory based storage (simulation storage). With the help of the research on the architecture of Android system and the related security mechanism, the prototype system is designed and implemented to prevent privacy leaks from the actual existing problems. The experiment shows that the prototype system proposed in this paper can make up for the privacy protection intensity of the Android system. In addition, the additional overhead caused by the prototype system is fully acceptable to the user. Secondly, the prototype system in this paper can be deployed on real devices. The contribution of this paper mainly includes the following three points: 1) the user's smart phone and the lock screen password are attacked After the acquisition, the privacy data in the mobile phone will be all leaked. The related research uses data hiding methods to achieve the protection of privacy data. But these methods have serious cross boundary pollution problems (privacy data are covered by other data), and the operation procedure is tedious, causing the privacy data can not be hidden in a timely manner. In this paper, based on repudiation and device mapping technology, this paper proposes a more perfect and reliable privacy protection mechanism, and designs and implements two prototype systems MobiMimosa and Refugedroid.MobiMimosa prototype to greatly alleviate the problem of cross border pollution, and to a certain extent, improve the utilization of space. On the basis of MobiMimosa, The Refugedroid prototype can completely overcome the problem of transboundary pollution and ensure the integrity of privacy data. Two prototype systems support multiple hidden encrypted volumes in the smartphone, that is, multilevel identifiability. In order to simplify the storage process of privacy data, the two prototype systems separately add a system service to the Android system respectively. The service can not only provide a series of operating hidden volumes for the upper application, but also monitor the state of the system in real time. While simplifying the operation steps, it can also realize the dynamic protection of the privacy data. This can reduce the risk of privacy disclosure in a sudden situation. Therefore, the prototype system of this paper is compared with the related research. There is better interaction and reliability. In addition, performance test results show that the two prototype systems implemented in this paper do not reduce the performance of the original system, and are fully acceptable to the user for.2) the application environment in the Android system is increasingly complex, and the sensitive applications (such as the payment class APP) often suffer from the attack of malicious programs. Attack, resulting in property loss and privacy disclosure. Providing a secure and reliable running environment for sensitive applications can inhibit this attack. Although the related research uses system virtualization technology to solve the above problems, it needs to take up a large amount of system resources, which is not feasible on a resource constrained mobile device. Therefore, in view of the characteristics of the Android system running, this paper proposes a trusted running architecture based on dual system space. This framework can implement two running spaces without taking up any additional system resources and can be deployed on real mobile devices. Therefore, this paper designs and implements two prototype systems, MobiGemini and V. IrtualMobi. two prototype systems have two operating modes: normal operating space mode and safe operation space mode. Through two operating spaces, the untrusted third party APP and trusted third party APP are isolated from time and space, thus avoiding the impact and attack of malicious programs on sensitive applications. In order to quickly switch over the two operating spaces through the UI interface and the corresponding password, and no shutdown to restart.MobiGemini and VirtualMobi also provides an additional advantage - the repudiation of the safe running space. On the basis of MobiGemini, VirtualMobi uses memory virtual techniques to improve storage space utilization and also make it possible The safe operation space has better concealment and repudiation. In addition, this paper also designs a new key storage method to enhance the security of secure operating space encryption key. Experimental results show that the proposed design scheme is feasible, and can effectively isolate the APP, and almost do not affect the performance of the original system. 3) APP is able to read and write all the data files stored in it (including the user's privacy data) if the APP has applied for the read and write memory (emulation memory) permissions at the time of installation. A variety of fine-grained file access control methods are proposed for the coarse grained memory storage protection strategy of the Android system. The method greatly affects the I/O performance of the system. Therefore, a fine grained file access control mechanism based on DAC (Discretionary Access Control) is proposed in this paper. This mechanism does not significantly reduce the I/O performance of the system while realizing fine grained file access control. This paper also designs and implements the system. A framework prototype SdGuard. the prototype system mainly contains two parts: the modified fuse daemon and an application Sdguards. modified fuse daemon implement a fine-grained file access control strategy similar to the Ext4 file system, and generate a text access log.Sdguards application that can pass through The analysis log identifies the privacy leaks and encrypted types of extortion software caused by the application. Compared with the related research, the prototype system can provide more efficient fine-grained file access control, and has an additional advantage of privacy disclosure and extortion software detection. The results show that the prototype system proposed in this paper can be used. Fine grained file access control and privacy leak detection.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:博士
【學(xué)位授予年份】:2017
【分類號(hào)】:TP309;TP316
【相似文獻(xiàn)】
相關(guān)期刊論文 前10條
1 ;守住你的秘密——隱私保護(hù)神[J];計(jì)算機(jī)與網(wǎng)絡(luò);2002年05期
2 李學(xué)聚;;新時(shí)期讀者隱私保護(hù)探析[J];科技情報(bào)開發(fā)與經(jīng)濟(jì);2006年13期
3 管重;;誰偷窺了你的隱私[J];數(shù)字通信;2007年15期
4 孔為民;;大學(xué)圖書館與隱私保護(hù)[J];科技情報(bào)開發(fā)與經(jīng)濟(jì);2007年26期
5 尹凱華;熊璋;吳晶;;個(gè)性化服務(wù)中隱私保護(hù)技術(shù)綜述[J];計(jì)算機(jī)應(yīng)用研究;2008年07期
6 高楓;張峰;周偉;;網(wǎng)絡(luò)環(huán)境中的隱私保護(hù)標(biāo)準(zhǔn)化研究[J];電信科學(xué);2013年04期
7 高密;薛寶賞;;我的電腦信息 隱私保護(hù)很強(qiáng)大[J];網(wǎng)友世界;2010年11期
8 ;為自己的電子商務(wù)設(shè)計(jì)隱私保護(hù)[J];個(gè)人電腦;2000年07期
9 ;隱私保護(hù)的10個(gè)準(zhǔn)則[J];個(gè)人電腦;2000年07期
10 岑婷婷;韓建民;王基一;李細(xì)雨;;隱私保護(hù)中K-匿名模型的綜述[J];計(jì)算機(jī)工程與應(yīng)用;2008年04期
相關(guān)會(huì)議論文 前10條
1 鄭思琳;陳紅;葉運(yùn)莉;;實(shí)習(xí)護(hù)士病人隱私保護(hù)意識(shí)和行為調(diào)查分析[A];中華護(hù)理學(xué)會(huì)第8屆全國(guó)造口、傷口、失禁護(hù)理學(xué)術(shù)交流會(huì)議、全國(guó)外科護(hù)理學(xué)術(shù)交流會(huì)議、全國(guó)神經(jīng)內(nèi)、外科護(hù)理學(xué)術(shù)交流會(huì)議論文匯編[C];2011年
2 孫通源;;基于局部聚類和雜度增益的數(shù)據(jù)信息隱私保護(hù)方法探討[A];中國(guó)水利學(xué)會(huì)2013學(xué)術(shù)年會(huì)論文集——S4水利信息化建設(shè)與管理[C];2013年
3 張亞維;朱智武;葉曉俊;;數(shù)據(jù)空間隱私保護(hù)平臺(tái)的設(shè)計(jì)[A];第二十五屆中國(guó)數(shù)據(jù)庫(kù)學(xué)術(shù)會(huì)議論文集(一)[C];2008年
4 公偉;隗玉凱;王慶升;胡鑫磊;李換雙;;美國(guó)隱私保護(hù)標(biāo)準(zhǔn)及隱私保護(hù)控制思路研究[A];2013年度標(biāo)準(zhǔn)化學(xué)術(shù)研究論文集[C];2013年
5 張鵬;于波;童云海;唐世渭;;基于隨機(jī)響應(yīng)的隱私保護(hù)關(guān)聯(lián)規(guī)則挖掘[A];第二十一屆中國(guó)數(shù)據(jù)庫(kù)學(xué)術(shù)會(huì)議論文集(技術(shù)報(bào)告篇)[C];2004年
6 桂瓊;程小輝;;一種隱私保護(hù)的分布式關(guān)聯(lián)規(guī)則挖掘方法[A];2009年全國(guó)開放式分布與并行計(jì)算機(jī)學(xué)術(shù)會(huì)議論文集(下冊(cè))[C];2009年
7 俞笛;徐向陽(yáng);解慶春;劉寅;;基于保序加密的隱私保護(hù)挖掘算法[A];第八屆全國(guó)信息隱藏與多媒體安全學(xué)術(shù)大會(huì)湖南省計(jì)算機(jī)學(xué)會(huì)第十一屆學(xué)術(shù)年會(huì)論文集[C];2009年
8 李貝貝;樂嘉錦;;分布式環(huán)境下的隱私保護(hù)關(guān)聯(lián)規(guī)則挖掘[A];第二十二屆中國(guó)數(shù)據(jù)庫(kù)學(xué)術(shù)會(huì)議論文集(研究報(bào)告篇)[C];2005年
9 徐振龍;郭崇慧;;隱私保護(hù)數(shù)據(jù)挖掘研究的簡(jiǎn)要綜述[A];第七屆(2012)中國(guó)管理學(xué)年會(huì)商務(wù)智能分會(huì)場(chǎng)論文集(選編)[C];2012年
10 潘曉;郝興;孟小峰;;基于位置服務(wù)中的連續(xù)查詢隱私保護(hù)研究[A];第26屆中國(guó)數(shù)據(jù)庫(kù)學(xué)術(shù)會(huì)議論文集(A輯)[C];2009年
相關(guān)重要報(bào)紙文章 前10條
1 記者 李舒瑜;更關(guān)注隱私保護(hù)和人格尊重[N];深圳特區(qū)報(bào);2011年
2 荷蘭鹿特丹醫(yī)學(xué)中心博士 吳舟橋;荷蘭人的隱私[N];東方早報(bào);2012年
3 本報(bào)記者 周靜;私密社交應(yīng)用風(fēng)潮來襲 聚焦小眾隱私保護(hù)是關(guān)鍵[N];通信信息報(bào);2013年
4 獨(dú)立分析師 陳志剛;隱私管理應(yīng)歸個(gè)人[N];通信產(chǎn)業(yè)報(bào);2013年
5 本報(bào)記者 朱寧寧;商業(yè)利益與隱私保護(hù)需立法平衡[N];法制日?qǐng)?bào);2014年
6 袁元;手機(jī)隱私保護(hù)萌發(fā)商機(jī)[N];證券日?qǐng)?bào);2014年
7 王爾山;跟隱私說再見[N];21世紀(jì)經(jīng)濟(jì)報(bào)道;2008年
8 記者 武曉黎;360安全瀏覽器推“隱私瀏覽”模式[N];中國(guó)消費(fèi)者報(bào);2008年
9 早報(bào)記者 是冬冬;“美國(guó)隱私保護(hù)法律已過時(shí)”[N];東方早報(bào);2012年
10 張曉明;隱私的兩難[N];電腦報(bào);2013年
相關(guān)博士學(xué)位論文 前10條
1 洪雙喜;Android平臺(tái)隱私保護(hù)方法研究[D];北京郵電大學(xué);2017年
2 孟祥旭;基于位置的移動(dòng)信息服務(wù)技術(shù)與應(yīng)用研究[D];國(guó)防科學(xué)技術(shù)大學(xué);2013年
3 蘭麗輝;基于向量模型的加權(quán)社會(huì)網(wǎng)絡(luò)發(fā)布隱私保護(hù)方法研究[D];江蘇大學(xué);2015年
4 柯昌博;云服務(wù)組合隱私分析與保護(hù)方法研究[D];南京航空航天大學(xué);2014年
5 李敏;基于位置服務(wù)的隱私保護(hù)研究[D];電子科技大學(xué);2014年
6 陳東;信息物理融合系統(tǒng)安全與隱私保護(hù)關(guān)鍵技術(shù)研究[D];東北大學(xué);2014年
7 張柯麗;信譽(yù)系統(tǒng)安全和隱私保護(hù)機(jī)制的研究[D];北京郵電大學(xué);2015年
8 Kamenyi Domenic Mutiria;[D];電子科技大學(xué);2014年
9 孫崇敬;面向?qū)傩耘c關(guān)系的隱私保護(hù)數(shù)據(jù)挖掘理論研究[D];電子科技大學(xué);2014年
10 劉向宇;面向社會(huì)網(wǎng)絡(luò)的隱私保護(hù)關(guān)鍵技術(shù)研究[D];東北大學(xué);2014年
相關(guān)碩士學(xué)位論文 前10條
1 鄒朝斌;SNS用戶隱私感知與自我表露行為的關(guān)系研究[D];西南大學(xué);2015年
2 李汶龍;大數(shù)據(jù)時(shí)代的隱私保護(hù)與被遺忘權(quán)[D];中國(guó)政法大學(xué);2015年
3 孫琪;基于位置服務(wù)的連續(xù)查詢隱私保護(hù)研究[D];湖南工業(yè)大學(xué);2015年
4 尹惠;無線傳感器網(wǎng)絡(luò)數(shù)據(jù)融合隱私保護(hù)技術(shù)研究[D];西南交通大學(xué);2015年
5 王鵬飛;位置服務(wù)中的隱私保護(hù)技術(shù)研究[D];南京理工大學(xué);2015年
6 顧鋮;基于關(guān)聯(lián)規(guī)則的隱私保護(hù)算法研究[D];南京理工大學(xué);2015年
7 崔堯;基于匿名方案的位置隱私保護(hù)技術(shù)研究[D];西安工業(yè)大學(xué);2015年
8 畢開圓;社會(huì)網(wǎng)絡(luò)中用戶身份隱私保護(hù)模型的研究[D];大連海事大學(xué);2015年
9 黃奚芳;基于差分隱私保護(hù)的集值型數(shù)據(jù)發(fā)布技術(shù)研究[D];江西理工大學(xué);2015年
10 高超;具有隱私保護(hù)意識(shí)的大樣本雙盲隨機(jī)對(duì)照試驗(yàn)數(shù)據(jù)管理系統(tǒng)的設(shè)計(jì)與實(shí)現(xiàn)[D];山東大學(xué);2015年
,本文編號(hào):2161484
本文鏈接:http://sikaile.net/kejilunwen/ruanjiangongchenglunwen/2161484.html