Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution

The Android-based devices are gaining popularity now a day. With the widespread use of smartphones both in private andwork-related areas, securing these devices has become of paramount importance. These devices are prone to varioussecurity issues of malicious attacks and performance problems. Owners...

Full description

Bibliographic Details
Main Authors: Nageen Saleem, Areeba Rahman, Muhammad Rizwan, Shahid Naseem, Fahad Ahmad
Format: Article
Language:English
Published: European Alliance for Innovation (EAI) 2020-12-01
Series:EAI Endorsed Transactions on Scalable Information Systems
Subjects:
Online Access:https://eudl.eu/pdf/10.4108/eai.13-7-2018.165281
_version_ 1818728027394146304
author Nageen Saleem
Areeba Rahman
Muhammad Rizwan
Shahid Naseem
Fahad Ahmad
author_facet Nageen Saleem
Areeba Rahman
Muhammad Rizwan
Shahid Naseem
Fahad Ahmad
author_sort Nageen Saleem
collection DOAJ
description The Android-based devices are gaining popularity now a day. With the widespread use of smartphones both in private andwork-related areas, securing these devices has become of paramount importance. These devices are prone to varioussecurity issues of malicious attacks and performance problems. Owners use their smartphones to perform tasks rangingfrom everyday communication with friends and family to the management of banking accounts and accessing sensitivework-related data. These factors, combined with limitations in administrative device control through owners and securitycritical applications, make Android-based smartphones a very attractive target for attackers and malware authors of anykind and motivation. Applications keep and manage diverse intrinsic data as well as sensitive private information such asaddress books. Smartphones enable swift and easy data exchange via 3G, 4G, and Wi-Fi. Thus, personal informationstored on smartphones is prone to leakage. Up until recently, the Android Operating System’s security model hassucceeded in preventing any significant attacks by malware. This can be attributed to a lack of attack vectors which couldbe used for self-spreading infections and low sophistication of malicious applications. The research provides a distinctivesolution to the security threats being found in the Android operating system. This paper presents a data security and qualityenhancement method based on amalgamating quantum attributes into the Android operating system that could effectivelysolve the issue raised. The paper provides a proposed architecture of Quantum Key distribution being embedded within theAndroid OS to improve efficiency. However, QKD is a new technology. The research unleashes the possible ways inwhich quantum could be effectively embedded in smartphones to resolve certain data security problems. Quantum keydistribution implements the Android to guard and use in the case of a run-time kernel compromise. That is, even with afully compromised kernel, an attacker cannot read key material stored in Quantum key.
first_indexed 2024-12-17T22:23:28Z
format Article
id doaj.art-907a07e563b74a22bbe353ae29f3ac76
institution Directory Open Access Journal
issn 2032-9407
language English
last_indexed 2024-12-17T22:23:28Z
publishDate 2020-12-01
publisher European Alliance for Innovation (EAI)
record_format Article
series EAI Endorsed Transactions on Scalable Information Systems
spelling doaj.art-907a07e563b74a22bbe353ae29f3ac762022-12-21T21:30:24ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Scalable Information Systems2032-94072020-12-0172810.4108/eai.13-7-2018.165281Enhancing Security of Android Operating System Based Phones using Quantum Key DistributionNageen Saleem0Areeba Rahman1Muhammad Rizwan2Shahid Naseem3Fahad Ahmad4Department of Computer Sciences, Kinnaird College for Women, Lahore, PakistanDepartment of Computer Sciences, Kinnaird College for Women, Lahore, PakistanDepartment of Computer Sciences, Kinnaird College for Women, Lahore, PakistanDepartment of Information Sciences, University of Education, Lahore, PakistanDepartment of Computer Sciences, Kinnaird College for Women, Lahore, PakistanThe Android-based devices are gaining popularity now a day. With the widespread use of smartphones both in private andwork-related areas, securing these devices has become of paramount importance. These devices are prone to varioussecurity issues of malicious attacks and performance problems. Owners use their smartphones to perform tasks rangingfrom everyday communication with friends and family to the management of banking accounts and accessing sensitivework-related data. These factors, combined with limitations in administrative device control through owners and securitycritical applications, make Android-based smartphones a very attractive target for attackers and malware authors of anykind and motivation. Applications keep and manage diverse intrinsic data as well as sensitive private information such asaddress books. Smartphones enable swift and easy data exchange via 3G, 4G, and Wi-Fi. Thus, personal informationstored on smartphones is prone to leakage. Up until recently, the Android Operating System’s security model hassucceeded in preventing any significant attacks by malware. This can be attributed to a lack of attack vectors which couldbe used for self-spreading infections and low sophistication of malicious applications. The research provides a distinctivesolution to the security threats being found in the Android operating system. This paper presents a data security and qualityenhancement method based on amalgamating quantum attributes into the Android operating system that could effectivelysolve the issue raised. The paper provides a proposed architecture of Quantum Key distribution being embedded within theAndroid OS to improve efficiency. However, QKD is a new technology. The research unleashes the possible ways inwhich quantum could be effectively embedded in smartphones to resolve certain data security problems. Quantum keydistribution implements the Android to guard and use in the case of a run-time kernel compromise. That is, even with afully compromised kernel, an attacker cannot read key material stored in Quantum key.https://eudl.eu/pdf/10.4108/eai.13-7-2018.165281quantum key distribution (qkd)bb84 protocolthird-party applicationsencryption
spellingShingle Nageen Saleem
Areeba Rahman
Muhammad Rizwan
Shahid Naseem
Fahad Ahmad
Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution
EAI Endorsed Transactions on Scalable Information Systems
quantum key distribution (qkd)
bb84 protocol
third-party applications
encryption
title Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution
title_full Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution
title_fullStr Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution
title_full_unstemmed Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution
title_short Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution
title_sort enhancing security of android operating system based phones using quantum key distribution
topic quantum key distribution (qkd)
bb84 protocol
third-party applications
encryption
url https://eudl.eu/pdf/10.4108/eai.13-7-2018.165281
work_keys_str_mv AT nageensaleem enhancingsecurityofandroidoperatingsystembasedphonesusingquantumkeydistribution
AT areebarahman enhancingsecurityofandroidoperatingsystembasedphonesusingquantumkeydistribution
AT muhammadrizwan enhancingsecurityofandroidoperatingsystembasedphonesusingquantumkeydistribution
AT shahidnaseem enhancingsecurityofandroidoperatingsystembasedphonesusingquantumkeydistribution
AT fahadahmad enhancingsecurityofandroidoperatingsystembasedphonesusingquantumkeydistribution