基于Android系统的手机隐私数据的加密研究
发布时间:2018-12-08 20:02
【摘要】:Android智能手机中的应用程序越来越多样化,使得用户把更多的隐私数据存储在该手机上。由于隐私数据以明文的方式存储,且该手机缺少完善的数据保护机制,致使隐私数据极易泄露。因此,论文致力于Android系统的隐私数据加密研究。论文在分析Android系统及其隐私数据存储的基础上,找出SQLite数据库和SD卡为隐私数据存储的集中单元,并从加密算法、方式、模式等方面深入研究加解密技术的优缺点,由此设计出适用于Android手机的加解密方案。论文使用加密的方式对SQLite数据库进行隐私保护。首先实现系统底层加解密接口函数,然后在SQLiteDatabase类的构造函数中调用该接口函数,从而实现数据加解密功能。另一方面,论文也使用加密方式对SD卡中的隐私数据进行保护,该方式编写一个数据加解密函数,对应用程序开放,并为用户提供加密按钮,若需要加密则调用加密函数。论文在数据加密保护的基础上,设计了密钥保护和SD卡的未加密数据保护方案,具体内容如下:1.论文将3-DES加密算法与密码输入错误罚时机制相结合,设计了一个防止爆力破译的密钥保护方案。2.论文针对恶意软件任意操作SD卡中未加密数据这一现象,设计了一个密语认证方案,用户对SD卡数据加密之前,系统需要核实密语是否匹配,匹配则实现加密;该密语存储在SQLite数据库中,使得安全性薄弱的SD卡与高性能的SQLite数据库相互关联,SD卡中隐私数据更加安全。通过测试,论文提出的SQLite数据库和SD卡加密的方案均已实现。对存储在SQLite数据库和SD卡中的隐私数据保护十分有效,但SD卡的性能则降低50%,后期将对SD卡加密进行更加深入的研究。
[Abstract]:Applications in Android smartphones are becoming more diverse, allowing users to store more privacy data on the phone. Because privacy data is stored in clear text and the mobile phone lacks perfect data protection mechanism, privacy data is easy to be leaked. Therefore, the thesis is devoted to the research of privacy data encryption in Android system. Based on the analysis of Android system and its private data storage, this paper finds out that SQLite database and SD card are the centralized unit of privacy data storage, and deeply studies the advantages and disadvantages of encryption and decryption technology from the aspects of encryption algorithm, mode, mode and so on. The encryption and decryption scheme suitable for Android mobile phone is designed. This paper uses encryption to protect the privacy of SQLite database. The interface function is implemented at the bottom of the system, and then the interface function is called in the constructor of the SQLiteDatabase class to realize the function of data encryption and decryption. On the other hand, the paper also uses encryption to protect the privacy data in the SD card. In this way, a data encryption and decryption function is written, which is open to the application program, and provides the encryption button for the user. If encryption is needed, the encryption function is called. Based on the data encryption protection, this paper designs the key protection and the unencrypted data protection scheme of SD card. The main contents are as follows: 1. In this paper, we combine the 3-DES encryption algorithm with the cipher input error penalty mechanism, and design a key protection scheme to prevent explosive force deciphering. 2. Aiming at the phenomenon that malware operates unencrypted data in SD card arbitrarily, a cryptographic authentication scheme is designed. Before the user encrypts the data of SD card, the system needs to verify whether the cipher language matches or not, and then encrypt the data matching. The cipher is stored in the SQLite database, which makes the weak SD card and the high performance SQLite database correlate with each other, and the privacy data in the SD card is more secure. Through the test, the scheme of SQLite database and SD card encryption has been realized. The privacy data stored in SQLite database and SD card is very effective, but the performance of SD card is reduced by 50%. The encryption of SD card will be studied more deeply in the later period.
【学位授予单位】:安徽理工大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP309
本文编号:2368924
[Abstract]:Applications in Android smartphones are becoming more diverse, allowing users to store more privacy data on the phone. Because privacy data is stored in clear text and the mobile phone lacks perfect data protection mechanism, privacy data is easy to be leaked. Therefore, the thesis is devoted to the research of privacy data encryption in Android system. Based on the analysis of Android system and its private data storage, this paper finds out that SQLite database and SD card are the centralized unit of privacy data storage, and deeply studies the advantages and disadvantages of encryption and decryption technology from the aspects of encryption algorithm, mode, mode and so on. The encryption and decryption scheme suitable for Android mobile phone is designed. This paper uses encryption to protect the privacy of SQLite database. The interface function is implemented at the bottom of the system, and then the interface function is called in the constructor of the SQLiteDatabase class to realize the function of data encryption and decryption. On the other hand, the paper also uses encryption to protect the privacy data in the SD card. In this way, a data encryption and decryption function is written, which is open to the application program, and provides the encryption button for the user. If encryption is needed, the encryption function is called. Based on the data encryption protection, this paper designs the key protection and the unencrypted data protection scheme of SD card. The main contents are as follows: 1. In this paper, we combine the 3-DES encryption algorithm with the cipher input error penalty mechanism, and design a key protection scheme to prevent explosive force deciphering. 2. Aiming at the phenomenon that malware operates unencrypted data in SD card arbitrarily, a cryptographic authentication scheme is designed. Before the user encrypts the data of SD card, the system needs to verify whether the cipher language matches or not, and then encrypt the data matching. The cipher is stored in the SQLite database, which makes the weak SD card and the high performance SQLite database correlate with each other, and the privacy data in the SD card is more secure. Through the test, the scheme of SQLite database and SD card encryption has been realized. The privacy data stored in SQLite database and SD card is very effective, but the performance of SD card is reduced by 50%. The encryption of SD card will be studied more deeply in the later period.
【学位授予单位】:安徽理工大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TP309
【参考文献】
相关期刊论文 前5条
1 戴威;郑滔;;基于Android权限机制的动态隐私保护模型[J];计算机应用研究;2012年09期
2 彭艳;杨欧;;Android平台的数据存储技术[J];计算机系统应用;2012年05期
3 刘海燕;杨健康;蔡红柳;王东杨;;嵌入式数据库SQLite的安全机制分析与设计[J];装甲兵工程学院学报;2009年05期
4 廖顺和;;嵌入式数据库SQLite加密方法分析与研究[J];计算机应用与软件;2008年11期
5 刘小春;柴育梅;张彦丽;;SQLite嵌入式数据库的应用研究[J];情报学报;2006年S1期
,本文编号:2368924
本文链接:https://www.wllwen.com/kejilunwen/ruanjiangongchenglunwen/2368924.html