期刊文献+

基于Android的个人云安全存储系统 被引量:7

Android-based Personal Cloud Secure Storage System
下载PDF
导出
摘要 个人云凭借其安全稳定、同步备份和便于分享等优势,将在未来几年逐步取代个人电脑作为数字时代的核心地位。本文进行了基于Android的个人云应用开发,旨在将个人云服务嵌入Android移动终端中,让用户能够随时随地通过终端体验个人云服务。主要完成了个人云同步备份和安全存储系统架构的设计以及Android相关技术选型、密码安全存储的设计以及安全加密算法的选择,并在Eclipse环境中利用Java语言开发,实现了软件登录限制、功能页面展示、管理文件、备份和下载个人信息等功能。 Personal cloud will gradually replace the PC to become the core of the digital era by virtue of its security and stability,synchronous backup and easy sharing and other advantages in the next few years.In order to embed personal cloud services into the Android mobile devices,and allow users to enjoy the services anytime or anywhere through he Android mobile terminals,an Android-based personal cloud application was developed.The design of the personal cloud system architecture and the selection of Android-related technology,the design of the password storage,and the selection of security encryption algorithm are completed mainly.and software in the Eclipse environment by using the Java language is developed.Whose functions include landing restriction,displaying function,files management,backup and download services for personal information etc.
出处 《科学技术与工程》 北大核心 2012年第27期7099-7103,7108,共6页 Science Technology and Engineering
关键词 ANDROID 个人云 SSL 加密算法 安全机制 Android personal cloud SSL encryption algorithm security mechanism
  • 相关文献

参考文献3

二级参考文献9

  • 1Shabtai A, Fledek Y, Kanonov U, et al. Google Android : a comprehen- sive security assessment. IEEE Security & Privacy,2010:35-38. 被引量:1
  • 2Shin W, Kiyomoto S, Fukushima K, et al. A formal model to analyze the permission authorization and enforcement in the android frame- work. International Symposium on Secure Computing (SecureCom- 10) 2010:944-945. 被引量:1
  • 3Enck W, Ongtang M, McDaniel P. Understanding android security. IEEE Security & Privacy, 2009 ;7 (1) :53-54. 被引量:1
  • 4Shin W, Kwak S, Kiyomoto S, et al. A small but non-negligible flaw in the Android permission scheme. IEEE International Symposium on Policies for Distributed Systems and Net-works, 2010:109-110. 被引量:1
  • 5Shabtai A, Wiess Y, Kanonov U, et al. Andromaly : a behavioral mal- ware detection framework for android devices. Intelligent Information Systems, 2011:7-22. 被引量:1
  • 6Shabtai A, Kanonov U, Elovici Y. Detection, alert and responseto ma- licious behavior in mobile devices: knowledge-based approach. RAID, 2009. 被引量:1
  • 7Shabtai A, Kanonov U, Elovici Y. Intrusion Detection on mobile de- vices using the knowledge based temporal-abstraction method. Sys- tems and Software, 2010 ;83 (8) : 1527-1536. 被引量:1
  • 8Shabtai A, Fledel Y, Elovici Y, et al. Using the KBTA method for in- ferring computer and network security alerts from timestamped, raw system metrics. Computer Virology, 2009 ; 8 ( 3 ) : 267-298. 被引量:1
  • 9Shabtai A, Fledel Y, Elovici Y. Securing Android-powered mobile de- vices using SELinux. IEEE Security & Privacy,2010:36-44. 被引量:1

共引文献46

同被引文献28

  • 1杜林锋.手机信息安全不可忽视[J].内蒙古科技与经济,2007(04S):78-78. 被引量:2
  • 2靳岩,姚尚明.Google Android开发入门与实践[M].北京:人民邮电出版社,2009. 被引量:2
  • 3靳岩,姚尚朗.GoogleAndroid开发入门与实践[M].北京:人民邮电出版社,2009:1,3. 被引量:3
  • 4佘志龙,陈昱勋,郑名杰,等.GoogleAndroidSDK开发范例大全[M].2版.北京:人民邮电出版社,2010. 被引量:2
  • 5陈文,郭依正.深入理解Android网络编程:技术详解与最佳实践[M].北京:机械工业出版社,2013. 被引量:3
  • 6BURNETTE E D.Android基础教程[M].田俊静,张波,黄湘情,等译.3版.北京:人民邮电出版社,2010. 被引量:1
  • 7RETO Meier.Android2高级编程[M].王超,泽.2版.北京:清华大学出版社,2010. 被引量:1
  • 8Ed Burnette.Android基础教程[M].3版.田俊静,张波,黄湘情等,译.北京:人民邮电出版社,2010. 被引量:1
  • 9Reto Meier.Android 2高级编程[M].2版.王 超译.北京:清华大学出版社,2010. 被引量:1
  • 10WANG HONG-JIN,YANG SHI,ZHAO DAN. Automatic remind- er system of medical orders based on Bluetooth[C]. Wuhan: WICOM2011,2011:2917-2920. 被引量:1

引证文献7

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部