TY - GEN
T1 - Keeping privacy data secure under factory recovery
AU - Lianfang, Wang
AU - Ye, Wang
AU - Gang, Zhao
AU - Lu, Liu
AU - Xiaohui, Kuang
N1 - Publisher Copyright:
© Springer Nature Singapore Pte Ltd 2020.
PY - 2020
Y1 - 2020
N2 - Nowadays, mobile devices are widely used. Mobile smartphones are not only a carrier for users to record, store, or transfer sensitive data in social network, but also a covert forensic tool for some security departments. In some extreme cases like war correspondent being about to be captured, the operation records of shooting and communication on the mobile phone will bring them disadvantages. Immediately performing a factory recovery is the smartest option. However, this operation will clear all user data, including those important case scene evidence. This paper proposes a flexible and reliable factory recovery mechanism to protect sensitive data under factory recovery. By analyzing the factory recovery process and mastering the Linux kernel execution process, to ensure that when users perform factory recovery operations, applications and data can be cleared normally, and the private data that users want to keep is protected. We evaluated the safety and usability of the method.
AB - Nowadays, mobile devices are widely used. Mobile smartphones are not only a carrier for users to record, store, or transfer sensitive data in social network, but also a covert forensic tool for some security departments. In some extreme cases like war correspondent being about to be captured, the operation records of shooting and communication on the mobile phone will bring them disadvantages. Immediately performing a factory recovery is the smartest option. However, this operation will clear all user data, including those important case scene evidence. This paper proposes a flexible and reliable factory recovery mechanism to protect sensitive data under factory recovery. By analyzing the factory recovery process and mastering the Linux kernel execution process, to ensure that when users perform factory recovery operations, applications and data can be cleared normally, and the private data that users want to keep is protected. We evaluated the safety and usability of the method.
KW - Android device
KW - Data protection
KW - Factory recovery
KW - File system
UR - http://www.scopus.com/inward/record.url?scp=85092136264&partnerID=8YFLogxK
U2 - 10.1007/978-981-15-9031-3_20
DO - 10.1007/978-981-15-9031-3_20
M3 - Conference contribution
AN - SCOPUS:85092136264
SN - 9789811590306
T3 - Communications in Computer and Information Science
SP - 224
EP - 233
BT - Security and Privacy in Social Networks and Big Data - 6th International Symposium, SocialSec 2020, Proceedings
A2 - Xiang, Yang
A2 - Liu, Zheli
A2 - Li, Jin
PB - Springer Science and Business Media Deutschland GmbH
T2 - 6th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2020
Y2 - 26 September 2020 through 27 September 2020
ER -