浏览全部资源
扫码关注微信
1. 南京理工大学计算机科学与工程学院,江苏 南京 210094
2. 中国船舶工业综合技术经济研究院,北京 100081
3. 河北科技大学信息科学与工程学院,河北 石家庄 050000
[ "黄振涛(1991-),男,江苏淮安人,南京理工大学硕士生,主要研究方向为信息安全、移动互联网安全等。" ]
[ "何暖(1982-),男,江苏扬州人,中国船舶工业综合技术经济研究院高级工程师,主要研究方向为电子对抗、人因工程、信息安全等。" ]
[ "付安民(1981-),男,湖北通城人,博士,南京理工大学副教授,主要研究方向为无线网络安全、云计算/大数据安全、移动互联网安全等。" ]
[ "况博裕(1994-),男,四川绵阳人,南京理工大学硕士生,主要研究方向为信息安全、移动互联网安全等。" ]
[ "张光华(1979-),男,河北深州人,博士,河北科技大学副教授,主要研究方向为网络与信息安全。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
黄振涛, 何暖, 付安民, 等. 基于透明加密的移动终端数据防泄露系统[J]. 通信学报, 2016,37(Z1):189-196.
Zhen-tao HUANG, Nuan HE, An-min FU, et al. Data leakage prevention system based on transparent encryption for mobile terminal equipment[J]. Journal on communications, 2016, 37(Z1): 189-196.
黄振涛, 何暖, 付安民, 等. 基于透明加密的移动终端数据防泄露系统[J]. 通信学报, 2016,37(Z1):189-196. DOI: 10.11959/j.issn.1000-436x.2016266.
Zhen-tao HUANG, Nuan HE, An-min FU, et al. Data leakage prevention system based on transparent encryption for mobile terminal equipment[J]. Journal on communications, 2016, 37(Z1): 189-196. DOI: 10.11959/j.issn.1000-436x.2016266.
企业关键数据向移动终端设备延伸,使移动终端数据泄露成为企业面临的一个新的问题。针对移动终端数据泄露问题,提出了基于预解密的透明加密技术,有效解决移动终端传统透明加密技术只能保证应用层安全的缺陷,并提升了透明加密性能。同时,利用瘦客户端与移动终端数据防泄露相融合的思想,进一步设计面向移动终端的虚拟远程桌面技术,彻底屏蔽数据流传输的弊端,保证了移动终端数据的安全传输。在此基础上,设计与实现了一套面向移动智能终端的数据防泄露系统。
With the trend that enterprise key data moves to mobile terminal
data leakage prevention has become an im-portant issue on mobile terminal.To solve the problem
a pre-decryption transparent encryption technology was set up which solved the problem that traditional transparent encryption technology only can ensure application layer security
in addition
performance on mobile was improved.At the same time
taking advantage of the idea of combining thin client and mobile terminal to prevent leakage of data
a virtual remote desktop technology on mobile was proposed
which completely shield the shortcomings of data transmission and ensure the safe transmission of mobile terminal data.Finally
a data leakage pre-vention system for mobile terminal was set up
which makes the mobile terminal fully and effectively protected.
GARTNER . Mobile opplications & enterprise mobility manage-ment [EB/OL ] . http://www.gartner.com/technology/topics/mobile.jsp http://www.gartner.com/technology/topics/mobile.jsp .
张玉清 , 王凯 , 杨欢 , 等 . Android 安全综述 [J ] . 计算机研究与发展 , 2014 , 51 ( 7 ): 1385 - 1396 .
ZHANG Y Q , WANG K , YANG H , et al . Survey of Android OS security [J ] . Journal of Computer Research and Development , 2014 , 51 ( 7 ): 1385 - 1396 .
PISTOIA M W , TRIPP O , CENTONZE P , et al . Labyrinth:visually configur-able data-leakage detection in mobile applications[C]//2015 16th IEEE In-ternational Conference on Mobile Data Management . 2015 , 1 : 279 - 286 .
CHOW R , JAKOBSSON M , MASUOKA R , et al . Authentication in the clouds:a framework and its application to mobile users[C]// Pro-ceedings of The 2010 ACM Workshop on Cloud Computing Security Workshop . 2010 : 1 - 6 .
XIE Y , DING W , WANG Y . A more extensible transparent encrypt file system based on filter driver [J ] . Journal of Communications , 2016 , 11 ( 4 ): 383 - 387 .
韩心慧 , 丁怡婧 , 王东祺 , 等 . Android恶意广告威胁分析与检测技术 [J ] . 清华大学学报(自然科学版) , 2016 , 65 ( 5 ): 468 - 477 .
HAN X H , DING Y J , WANG D Q , et al . Android malicious AD threat analysis and detection techniques [J ] . Journal of Tsinghua University (Science and Technology) , 2016 , 65 ( 5 ): 468 - 477 .
LI Y , FANG J , LIU C , et al . Study on the application of Dalvik injec-tion technique for the detection of malicious programs in Android[C]//2015 5th International Conference on Electronics Information and Emergency Communication (ICEIEC) . 2015 : 309 - 312 .
YANG T , CUI H , NIU S , et al . An analysis on sensitive data passive leakage in Android applications[C]//2015 IEEE 16th International Conference on Communication Technology (ICCT) . 2015 : 125 - 131 .
MCDANIEL P , JAEGER T , LA PORTA T F , et al . Security and sci-ence of agility[C]//The First ACM Workshop on Moving Target De-fense . 2014 : 1 - 6 .
ASNAR Y , HENDRADJAYA B . Confidentiality and privacy informa-tion security risk assessment for Android-based mobile de-vices[C]//2015 International Conference on Data and Software Engi-neering (ICoDSE) . 2015 : 1 - 6 .
SUJITHRA M , VAN HAU P , NGUYEN T . Android security analysis based on inter-application relationships[C]//Information Science and Appli-cations (ICISA) 2016 . 2016 : 689 - 700 .
JIA P , HE X , LIU L , et al . A framework for privacy information pro-tection on Android[C]// 2015 International Conference on Computing,Networking and Communications (ICNC) . 2015 : 1127 - 1131 .
KATZ G , ELOVICI Y , SHAPIRA B. . CoBAn:A context based model for data leakage prevention [J ] . Information Sciences , 2014 , 262 : 137 - 158 .
GAJRANI J , SARSWAT J , TRIPATHI M , et al . A robust dynamic analysis system preventing SandBox detection by Android mal-ware[C]//8th International Conference on Security of Information and Networks . 2015 : 290 - 295 .
SALMAN A , ELHAJJ I H , CHEHAB A , et al . Mobile malware ex-posed[C]//2014 IEEE/ACS 11th International Conference on Com-puter Systems and Applications (AICCSA) . 2014 : 253 - 258 .
HUANG Z , JIANG H , ZHOU K . An improved decoding algorithm for generalized RDP codes [J ] . EEE Communications Letters , 2016 , 20 ( 4 ): 632 - 635 .
文伟平 , 梅瑞 , 宁戈 , 等 . Android 恶意软件检测技术分析和应用研究 [J ] . 通信学报 , 2014 , 35 ( 8 ): 78 - 85 .
WEN W P , MEI R , NING G , et al . Malware detection technology analysis and applied research of Android platform [J ] . Journal on Communicationsh , 2014 , 35 ( 8 ): 78 - 85 .
MENG Y X , DONG J Y , YIN Y H , et al . Transparent encryption tech-nique for Word documents based on USB Key in manufacturing sys-tem[C]//Applied Mechanics and Materials . 2013 : 323 - 326 .
PARK J H , KIM D , PARK J S , et al . An enhanced security framework for reliable Android operating system [J ] . Security and Communication Networks , 2013 , 9 ( 6 ): 528 - 534 .
JOVESKI B , MITREA M , GANJI R R . MPEG-4 solutions for virtual-izing RDP-based applications[C]//IS&T/SPIE Electronic Imaging,In-ternational Society for Optics and Photonics . Security and Communication Networks , 2014 .
刘洋 , 邵旭东 , 潘程达 , 等 . 立体安全防御系统 TDSD—Droid 的实现 [J ] . 计算机科学 , 2013 , 40 ( 11A ): 228 - 234 .
LIU Y , SHAO X D , PAN C D , et al . Implementation of three-dimensional security defense system [J ] . Computer Science , 2013 , 40 ( 11A ): 228 - 234 .
XIAO H Y , YU B S , FEI C . Android's sensitive data leakage detection based on API monitoring[C]// International Conference on Cyberspace Technology (CCT 2014) . 2014 : 1 - 4 .
0
浏览量
1110
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构