DOI QR코드

DOI QR Code

Application Study applied to the Encryption at Virtualization Launcher

가상화 런처에서 암호화를 적용한 어플리케이션 연구

  • 임승철 (우송대학교 컴퓨터정보학과)
  • Received : 2014.02.11
  • Accepted : 2014.04.11
  • Published : 2014.04.28

Abstract

Smartphones, as well as providing a number of convenience features such as an individual's personality to express the range is gradually increasing. Changed when we met another person, such as a change of outward change in the smartphone became responsive individuals. Each other, it is common to observe smartphones smartphones. Smartphone now due to the common use of information leakage has become a serious problem. In this paper, when sharing smart phone, smartphones to separate the user's area, and the constraints of privacy and the need to apply encryption to prevent information leakage or add application-specific information is encrypted and stored in other similar applications it is not accessible to protect the personal information was through this smartphone to share your private information even improved.

스마트폰은 여러 가지 편의기능 제공뿐 아니라 개인의 개성까지 표현하는 등 그 범위가 점차 증가되고 있다. 사람이 서로 만났을 때 바뀌게 되는 외향의 변화와 같이 스마트폰의 변화에도 개인들이 즉각적으로 반응하게 되었다. 서로의 스마트폰을 관찰하는 것이 보편화된 지금 스마트폰 공유로 인한 정보의 유출이 심각한 문제가 되고 있다. 따라서 본 논문에서는 스마트폰을 공유할 때 스마트폰에서 사용자의 영역을 구분하며, 개인정보의 제약과 암호화를 적용함으로써 필요이상의 정보의 유출을 막고 특정 어플리케이션으로 추가된 정보는 암호화되어 저장되어 다른 유사 어플리케이션에서는 접근이 불가능하게 하여 개인정보를 보호할 수 있었다. 이를 통하여 스마트폰을 공유할 때에도 개인정보 유출을 개선하였다.

Keywords

References

  1. Sun-Hyang Jang., Su-ji Hwang, Young-Hyun Chang, Min-jeong Koo "Study on the Enhancement of the Credibility of Android OS based Applications", Journal of IWIT, Vol.11, No.3, pp.382-384, fall 2012.
  2. Nelson Ruest, Danielle Ruest "Virtualization, A Beginner's Guide", McGraw-Hill 2009
  3. Se-jung Lim, Gwang-jun Kim, Tae-geun Kang "Application Program Virtualization based on Desktop Virtualization", The korea institute of electronic communication sciences, Vol.5, No.6, 2010
  4. SILBERSCHATZ "Operating System Principles 7/E", Wiley 2005
  5. VMware, Inc. "Understanding Full Virtu-alization, Paravirtualization, and Hardware Assist", White Paper, Nov. 2007
  6. Mark Murphy "Beginning Android3", Apress 2012
  7. Barret Rhoden, Kevin Klus, David Zhu, Eric Brewer "Improving Per-Node Efficiency in the Datacenter with New OS Abstractions", ACM 2011
  8. B Weinberg, L Pundit "Designing and Deploying with Mobile Virtualization", Whitepaper. Linux Pundit 2009
  9. Mohammad Nauman, Sohail Khan "Design and implementation of a fine-grained resource usage model for the android platform", The International Arab Journal of Information Technology 2011
  10. Eun-Sook Cho, Chul-Jin Kim, and Sook-Hee Lee, "A Modeling Technique for Development of Mobile App. based on Android", Journal of the Korea Academia-Industrial cooperation Society, vol. 14 No. 8, pp.3999-4005, Auguest 2013. https://doi.org/10.5762/KAIS.2013.14.8.3999
  11. Google, Inc. "Android 4.2 API: Multiple Users", http://developer.android.com/about/versions/android-4.2.html 2012
  12. S.J. OH, "Design of a Middleware for Android-based Smart Phone Applications", Journal of Korean Institute of Information Technology, vol. 12, issue 2, pp. 111-117, Apr 2012. https://doi.org/10.7236/JIWIT.2012.12.2.111
  13. Jae-Man You, In-Kyoo Park "Android Storage Access Control for Personal Information Security", Journal of The Institute of Internet, Broadcasting and Communication, vol. 13 No. 6, pp.123-129, December 2013. https://doi.org/10.7236/JIIBC.2013.13.6.123