| Android is a Linux-based open source operating system. Its development language is Java. Thanks to its excellent performance and open source property, Android is popular in ordinary user and developers. It brings great convenience for work and study. Meanwhile, because of its intrinsic security weakness, there are many viruses and malicious attacks specifically for it, which greately threats the data security and poses a great challenge for data security protection. Although along with the version update, Android itself enforces the security protection mechanisms, and these corse-grain mechanisms still have many loopholes, especially for moveable devices with limited resource. Current architecure still does not meet high-performance and low-cost demands. To fit for data security protection of Android system, this paper works mainly on deniable transparent design of deniable and transparent encryption System on Android, two-party authenticated key agreement protocl, group key agreement protocol.(1) Design a deniable and transparent encryption System on AndroidBecause current data encryption mechanisms can not effectively resist malicious attacks and intimidation maid attack problems, we propose a denaible transparent encryption data security system, which is based on the hidden volume and encrypts hidden encryption key by hidding encryption volumes on the mobile device volume and filling random noise. Gives the prototype design of key technologies, security analysis and performance test results show the prototype system can effectively protect data security.(2) Design a two-party pairing-free certificateless key agreement protocolSecure and efficient key agreement protocol is foundation of data communication security. To fit for the data security demands and moveable devices of Android system, we propose an implicit authenticated pairing-free certificateless key agreement protocol, and prove the scurity in random oracle model. By compararing with other protocols, we can conclude that our protocol is efficient and secure. We implement a demonstration application in Android emulator, which shows the correctness and applicability of our protocol. To enforce the security of protocol, we propose a protocol with key-confirmation based on our implicit authenticated key agreement protocl.(3) Designs an explicit pairing-free certificateless group key agreement protocolTo provide security for group communication, we design an explicit pairing-free certificateless group key agreement protocol, which is based on elliptic curve point operation and is a BD-type protocol. We analyse the security property by heuristical way. We implement a demonstration application in Android emulator, which shows the correctness and applicability of our protocol. To enforce the security of protocol, we propose a protocol with key-confirmation based on our implicit authenticated key agreement protocl. |