Protecting Stored Data on Android Devices

Raluca Alina Cojocaru

Abstract


According to the latest statistics, the Android has become the world’s most popular operating system used for smartphones. Not only its popularity continues to increase, but also the number of malicious hackers who want to compromise mobile applications for their own gain. This paper reviews the protections offered by the Android Platform for storing application data, and provides means to enforce them.

Keywords


permission, sandbox, isolation, cryptography, privacy

Full Text:

PDF

References


Jeff Six (2012), Application Security for the Android Platform, O’Reilly

Sheran A. Gunasekera (2011), Android Apps Security, Aperss

Don Reisinger, “Android Security: 10 Ways to Protect Your Device From Malware, Theft”, http://www.eweek.com/mobile/android-security-10-ways-to-protect-your-device-from-malware-theft [accessed at 15.03.2013]

Android Official Site for Application Developers, “Intents and Intent Filters”, https://developer.android.com/guide/components/intents-filters.html, [accessed at 16.03.2013]

Android Open Source Project, Security topics, “Android Security Overview”, http://source.android.com/tech/security/index.html#system-and-kernel-level-security, [accessed at 16.03.2013]

Android Official Site for Application Developers, “Security Tips”, http://developer.android.com/training/articles/security-tips.html, [accessed at 16.03.2013]

NIST (2011), Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths


Refbacks

  • There are currently no refbacks.


Journal of Mobile, Embedded and Distributed Systems (JMEDS) ISSN: 2067 – 4074 (online)