Protecting Stored Data on Android Devices

Authors

  • Raluca Alina Cojocaru The Bucharest University of Economic Studies

Keywords:

permission, sandbox, isolation, cryptography, privacy

Abstract

According to the latest statistics, the Android has become the world’s most popular operating system used for smartphones. Not only its popularity continues to increase, but also the number of malicious hackers who want to compromise mobile applications for their own gain. This paper reviews the protections offered by the Android Platform for storing application data, and provides means to enforce them.

Author Biography

Raluca Alina Cojocaru, The Bucharest University of Economic Studies

IT&C Security Master Program

Department of Economic Informatics and Cybernetics

References

Jeff Six (2012), Application Security for the Android Platform, O’Reilly

Sheran A. Gunasekera (2011), Android Apps Security, Aperss

Don Reisinger, “Android Security: 10 Ways to Protect Your Device From Malware, Theft”, http://www.eweek.com/mobile/android-security-10-ways-to-protect-your-device-from-malware-theft [accessed at 15.03.2013]

Android Official Site for Application Developers, “Intents and Intent Filters”, https://developer.android.com/guide/components/intents-filters.html, [accessed at 16.03.2013]

Android Open Source Project, Security topics, “Android Security Overview”, http://source.android.com/tech/security/index.html#system-and-kernel-level-security, [accessed at 16.03.2013]

Android Official Site for Application Developers, “Security Tips”, http://developer.android.com/training/articles/security-tips.html, [accessed at 16.03.2013]

NIST (2011), Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths

Downloads

Published

2014-03-30

How to Cite

Cojocaru, R. A. (2014). Protecting Stored Data on Android Devices. Journal of Mobile, Embedded and Distributed Systems, 6(1), 17-23. Retrieved from http://jmeds.eu/index.php/jmeds/article/view/Protecting_Stored_Data_on_Android_Devices