Font Size: a A A

Design And Implementation Of Android Mobile Privacy Protection System

Posted on:2017-05-01Degree:MasterType:Thesis
Country:ChinaCandidate:S ZhangFull Text:PDF
GTID:2308330509457491Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of mobile Internet technology, smart phones carry a large number of life applications. There are more and more mobile security risks. Some malicious applications illegal uploading data to mobile terminals privacy secret server, in order to commit fraud or indirect use of these data privacy fraud, leading to personal and others’ irreparable loss. What is more, it will disclose the company or state secrets and has a high security risk. Therefore, the mobile terminal privacy data leakage problem is need be solved, and it is essential to design a high security mobile terminal privacy data protection system.This paper designs and implements the Android mobile terminal data privacy protection systems, it promotes the security of privacy through strengthening the security policy. Moreover, considering the failure of the policy to strengthen the security, it comprehensives the privacy leak detection strategies to achieve privacy data interception, thus ensuring privavy frome all aspects of multi-level.Firstly, this paper introduces the theory based on the Android platform, including Android system architecture, data storage, APK files, application components.Secondly, this paper designs and implements the Android mobile terminal privacy protection system. Through the analysis of the privacy data, the definition of the mobile terminal privacy is given which is the protection object.What is more, it defines the system requirements by analysing privacy leakage pathways, and combing the privacy definition. On the basis of this, the paper puts forward the privacy protection strategy and realizes the system function structure division. The system mainly includes four modules: access control, file protection, malicious behavior monitoring and privacy data leakage interception. The access control module includes a custom lock screen and an application lock. Custom lock screen achieves the overall mobile devices access control and application lock achieves the access control of application stored information through setting permission levels for different levels of users; File Protection module uses AES-GCM algorithm to encrypt the system photos, videos, and other files; Behavior Monitoring module uses the native layer hook technology and AOP Proxy mechanisms to change system execution process so as to achieve the nonroot malicious behavior monitoring; For the case of privacy has been stolen, privacy leakage interception module uses Vpn Service framework architecture VPN to contarol the exports which mobile devices communicate withe the outside. And then, it uses Aho-corasick algorithm match sensitive string to achieve the real-time interception of privacy leakage. Using the above functional modules about the privacy data security and privacy data leakage interception, it will provide a comprehensive privacy data security for the Android mobile devices.Finally, this paper tests the Android mobile terminal privacy data protection system from two aspects of function and performance.To sum up, this paper completed the Android mobile terminal privacy data protection system. The system test results show that the system meets the design objectives.
Keywords/Search Tags:privacy protection, security reinforcement, leakage prevention, Vpn Service
PDF Full Text Request
Related items