Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution
The Android-based devices are gaining popularity now a day. With the widespread use of smartphones both in private andwork-related areas, securing these devices has become of paramount importance. These devices are prone to varioussecurity issues of malicious attacks and performance problems. Owners...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
European Alliance for Innovation (EAI)
2020-12-01
|
Series: | EAI Endorsed Transactions on Scalable Information Systems |
Subjects: | |
Online Access: | https://eudl.eu/pdf/10.4108/eai.13-7-2018.165281 |
_version_ | 1818728027394146304 |
---|---|
author | Nageen Saleem Areeba Rahman Muhammad Rizwan Shahid Naseem Fahad Ahmad |
author_facet | Nageen Saleem Areeba Rahman Muhammad Rizwan Shahid Naseem Fahad Ahmad |
author_sort | Nageen Saleem |
collection | DOAJ |
description | The Android-based devices are gaining popularity now a day. With the widespread use of smartphones both in private andwork-related areas, securing these devices has become of paramount importance. These devices are prone to varioussecurity issues of malicious attacks and performance problems. Owners use their smartphones to perform tasks rangingfrom everyday communication with friends and family to the management of banking accounts and accessing sensitivework-related data. These factors, combined with limitations in administrative device control through owners and securitycritical applications, make Android-based smartphones a very attractive target for attackers and malware authors of anykind and motivation. Applications keep and manage diverse intrinsic data as well as sensitive private information such asaddress books. Smartphones enable swift and easy data exchange via 3G, 4G, and Wi-Fi. Thus, personal informationstored on smartphones is prone to leakage. Up until recently, the Android Operating System’s security model hassucceeded in preventing any significant attacks by malware. This can be attributed to a lack of attack vectors which couldbe used for self-spreading infections and low sophistication of malicious applications. The research provides a distinctivesolution to the security threats being found in the Android operating system. This paper presents a data security and qualityenhancement method based on amalgamating quantum attributes into the Android operating system that could effectivelysolve the issue raised. The paper provides a proposed architecture of Quantum Key distribution being embedded within theAndroid OS to improve efficiency. However, QKD is a new technology. The research unleashes the possible ways inwhich quantum could be effectively embedded in smartphones to resolve certain data security problems. Quantum keydistribution implements the Android to guard and use in the case of a run-time kernel compromise. That is, even with afully compromised kernel, an attacker cannot read key material stored in Quantum key. |
first_indexed | 2024-12-17T22:23:28Z |
format | Article |
id | doaj.art-907a07e563b74a22bbe353ae29f3ac76 |
institution | Directory Open Access Journal |
issn | 2032-9407 |
language | English |
last_indexed | 2024-12-17T22:23:28Z |
publishDate | 2020-12-01 |
publisher | European Alliance for Innovation (EAI) |
record_format | Article |
series | EAI Endorsed Transactions on Scalable Information Systems |
spelling | doaj.art-907a07e563b74a22bbe353ae29f3ac762022-12-21T21:30:24ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Scalable Information Systems2032-94072020-12-0172810.4108/eai.13-7-2018.165281Enhancing Security of Android Operating System Based Phones using Quantum Key DistributionNageen Saleem0Areeba Rahman1Muhammad Rizwan2Shahid Naseem3Fahad Ahmad4Department of Computer Sciences, Kinnaird College for Women, Lahore, PakistanDepartment of Computer Sciences, Kinnaird College for Women, Lahore, PakistanDepartment of Computer Sciences, Kinnaird College for Women, Lahore, PakistanDepartment of Information Sciences, University of Education, Lahore, PakistanDepartment of Computer Sciences, Kinnaird College for Women, Lahore, PakistanThe Android-based devices are gaining popularity now a day. With the widespread use of smartphones both in private andwork-related areas, securing these devices has become of paramount importance. These devices are prone to varioussecurity issues of malicious attacks and performance problems. Owners use their smartphones to perform tasks rangingfrom everyday communication with friends and family to the management of banking accounts and accessing sensitivework-related data. These factors, combined with limitations in administrative device control through owners and securitycritical applications, make Android-based smartphones a very attractive target for attackers and malware authors of anykind and motivation. Applications keep and manage diverse intrinsic data as well as sensitive private information such asaddress books. Smartphones enable swift and easy data exchange via 3G, 4G, and Wi-Fi. Thus, personal informationstored on smartphones is prone to leakage. Up until recently, the Android Operating System’s security model hassucceeded in preventing any significant attacks by malware. This can be attributed to a lack of attack vectors which couldbe used for self-spreading infections and low sophistication of malicious applications. The research provides a distinctivesolution to the security threats being found in the Android operating system. This paper presents a data security and qualityenhancement method based on amalgamating quantum attributes into the Android operating system that could effectivelysolve the issue raised. The paper provides a proposed architecture of Quantum Key distribution being embedded within theAndroid OS to improve efficiency. However, QKD is a new technology. The research unleashes the possible ways inwhich quantum could be effectively embedded in smartphones to resolve certain data security problems. Quantum keydistribution implements the Android to guard and use in the case of a run-time kernel compromise. That is, even with afully compromised kernel, an attacker cannot read key material stored in Quantum key.https://eudl.eu/pdf/10.4108/eai.13-7-2018.165281quantum key distribution (qkd)bb84 protocolthird-party applicationsencryption |
spellingShingle | Nageen Saleem Areeba Rahman Muhammad Rizwan Shahid Naseem Fahad Ahmad Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution EAI Endorsed Transactions on Scalable Information Systems quantum key distribution (qkd) bb84 protocol third-party applications encryption |
title | Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution |
title_full | Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution |
title_fullStr | Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution |
title_full_unstemmed | Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution |
title_short | Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution |
title_sort | enhancing security of android operating system based phones using quantum key distribution |
topic | quantum key distribution (qkd) bb84 protocol third-party applications encryption |
url | https://eudl.eu/pdf/10.4108/eai.13-7-2018.165281 |
work_keys_str_mv | AT nageensaleem enhancingsecurityofandroidoperatingsystembasedphonesusingquantumkeydistribution AT areebarahman enhancingsecurityofandroidoperatingsystembasedphonesusingquantumkeydistribution AT muhammadrizwan enhancingsecurityofandroidoperatingsystembasedphonesusingquantumkeydistribution AT shahidnaseem enhancingsecurityofandroidoperatingsystembasedphonesusingquantumkeydistribution AT fahadahmad enhancingsecurityofandroidoperatingsystembasedphonesusingquantumkeydistribution |