Android平台中数据保护系统的设计与实现
发布时间:2018-05-10 21:20
本文选题:Android + 移动数据 ; 参考:《东华大学》2014年硕士论文
【摘要】:现阶段3G(第三代移动通讯技术)和Wi-Fi无线网络技术已经发展到普及的程度,4G(第四代移动通讯技术)也开始进入人们生活,人们使用智能手机甚至超过了使用个人PC;智能手机已经成为个人、家庭、企业的必不可少工具,这使得智能手机承载的数据涉及到了生活、教育、医疗、交通、商业等众多领域,关系到了人们的隐私和安全。以Android系统为平台的手机已经占据了国内市场主导地位,所以研究针对Android平台的数据保护问题具有普遍的实用价值和一定的理论意义。 本文旨在设计和实现一个基于云计算平台的Android智能手机数据保护的应用,提高数据的安全系数,防止数据丢失和敏感数据泄密。 针对现阶段Android智能手机的数据安全状况,在研究了Android平台及其开发关键技术、移动平台信息安全技术、备份策略、加密解密技术、云计算技术的基础上,采用面向对象的思想和技术进行了系统的可行性分析、需求分析、概要设计、详细设计和实现。系统结合云计算和移动计算两大热门技术,针对手机丢失或被盗对敏感数据的威胁这一情况,提出了一套基于云计算平台的数据保护安全方案,客户端将数据采用高效的最新加密标准算法AES加密后备份到云端,获取云端数据后解密恢复,被保护的数据是用户私有数据如通讯录、短信息录、图片、文本等;当手机处于危险状态时如丢失、被盗,及时改变手机状态并发送数据删除指令,实现远程删除手机被保护数据的功能,达到保护个人数据的可用性、完整性、保密性的目的。最后介绍了系统测试的硬件、软件环境和测试用例,并进行了真机测试,并针对测试结果的分析提出了改进方向。实验证明该系统满足了提出的需求,一定程度上解决了移动数据的安全威胁问题,对以后移动平台数据安全方面的研究也具有指导意义。
[Abstract]:At this stage, 3G (third generation mobile communication technology) and Wi-Fi wireless network technology have developed to the extent of popularization. 4G (fourth generation mobile communication technology) has also begun to enter people's lives. People use smartphones more than personal PCs; smartphones have become essential tools for individuals, families, and businesses, so that smartphones carry data about life, education, health care, transportation, Business and many other fields, related to people's privacy and security. The mobile phone with Android system as the platform has already occupied the dominant position in the domestic market, so it is of universal practical value and certain theoretical significance to study the data protection problem of the Android platform. The purpose of this paper is to design and implement an application of Android smart phone data protection based on cloud computing platform, to improve the safety factor of data, and to prevent data loss and sensitive data leakage. In view of the current data security of Android smart phone, this paper studies the key technologies of Android platform and its development, mobile platform information security technology, backup strategy, encryption and decryption technology, cloud computing technology. The feasibility analysis, requirement analysis, outline design, detailed design and implementation of the system are carried out by using object-oriented thought and technology. Combining two popular technologies of cloud computing and mobile computing, the system proposes a data protection security scheme based on cloud computing platform in view of the threat to sensitive data caused by the loss or theft of mobile phones. The client uses the new encryption standard algorithm AES to backup the data to the cloud and decrypts and recovers the data. The protected data is private data such as address book, short message book, picture, text and so on. When the mobile phone is in a dangerous state, if it is lost or stolen, it can change the status of the mobile phone and send the data deletion instruction in time, so as to realize the function of remotely deleting the protected data of the mobile phone, and achieve the purpose of protecting the availability, integrity and confidentiality of personal data. Finally, the hardware, software environment and test cases of the system test are introduced, and the real computer test is carried out, and the improvement direction is put forward for the analysis of the test results. Experiments show that the system can meet the requirements and solve the security threat of mobile data to a certain extent. It also has a guiding significance for the future research on data security of mobile platform.
【学位授予单位】:东华大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP311.52;TN929.53
【参考文献】
相关期刊论文 前9条
1 秦志光;密码算法的现状和发展研究[J];计算机应用;2004年02期
2 柳毅;张凌;;一个安全的移动代理数据保护方案[J];计算机应用;2006年09期
3 张浩;陈盛云;;基于Android平台手机防盗追踪功能的实现[J];江西科学;2011年05期
4 王超群;黄勇平;;数据加密常用技术及其发展趋势[J];科技广场;2008年01期
5 蔡罗成;;Android后台监听实现机制浅析[J];信息安全与通信保密;2010年06期
6 宋杰;党李成;郭振朝;赵萌;;Android OS手机平台的安全机制分析和应用研究[J];计算机技术与发展;2010年06期
7 张建成;宋丽华;鹿全礼;郭锐;刘永泉;;云计算方案分析研究[J];计算机技术与发展;2012年01期
8 朱毅凡;钟涵军;徐铸;;基于BAE云实现Android应用数据的远程存取[J];科技创新导报;2013年19期
9 杨炳保;;基于Android的移动云计算技术的研究[J];计算机技术与发展;2013年08期
,本文编号:1870951
本文链接:https://www.wllwen.com/kejilunwen/wltx/1870951.html