30Mar 2017

DATA SECURITY IN SMARTPHONES USING BIT-LOCKER TECHNOLOGY.

  • Student, Department of Computer Science, Christ University, 560029, India.
  • Associate Professor, Department of Computer Science, Christ University, 560029, India.
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

Objectives: Securing portable devices with the help of existing technology of Bit-Locker drive encryption, with more security of reset operations, if you lost your portable devices like memory cards, pen drive etc. The main objective is to make Data more secured and unauthorized access is denied when they try to access the personal information that are present in SD card after the User lost his/her Mobile/SD card. Methods: a performance difference between Bit-Locker enabled device and Bit-Locker not enabled device with varying of read/write operation is more in non-enabled Bit-Locker device, so we will suggest to encrypt SD card using Existing Method Bit-Locker and also we suggest an Idea that User can Encrypt once in Windows Platform and Decrypt in Other Platform ( Ex: Ubuntu) better way of protecting the SD card. Findings: The issues of Bit-Locker device that is we enabled Bit-Locker drive encryption, even the drive is locked but the user can be able to format the entire drive without any interruption.so we have given better solution for these type of problem and also if you lost your portable device without encrypting the unknown user can easily misuse the data present in portable device, so we provided a solution if any unknown user wants to access your data it will ask for password, if unknown user enters 5 times wrong password the portable device will be locked and all the data is format the unknown user cannot perform any read/write operation on portable device. And also if we enabled bit-locker drive encrypted it will have decrypted in windows operating system so we introduced a concept of encrypt once and decrypt in any operating system [EODAOS]. Improvements: The privacy data is more secured compared to Bit-Locker technology, with reset operation if unknown user enters five times wrong password the portable device will be format and lock the portable device with read/write operations. Performance is more improved.


  1. P Gasti and Y Chen, "Breaking and fixing the self encryption scheme for data security in mobile devices," in 18th Euromicro Conference on Parallel, Distributed and Network-Based Processing, PDP 2010, February 17, 2010 - February 19, 2010, Pisa, Italy, 2010, pp. 624-630.
  2. Y Chen and WS Ku, "Self-Encryption Scheme for Data Security in Mobile Devices," 2009 6th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, 2009, pp. 1-5.
  3. F Shao, Z Chang and Y Zhang, "AES Encryption Algorithm Based on the High Performance Computing of GPU," 2010 Second International Conference on Communication Software and Networks, Singapore, 2010, pp. 588-590.
  4. M Mathur and A Kesarwani, ?Comparison between Des, 3des, Rc2, Rc6, Blowfish And Aes?. In Proceedings of National Conference on New Horizons in IT-NCNHIT,2013.
  5. T Nie and T Zhang, "A study of DES and Blowfish encryption algorithm," TENCON 2009 - 2009 IEEE Region 10 Conference, Singapore, 2009, pp. 1-4.
  6. KN Manjesh and RK Karunavathi. ?Secured High throughput implementation of AES Algorithm?. International Journal, volume 3,Issue 5,May 2013.
  7. Gang Hu, "Study of file encryption and decryption system using security key," 2010 2nd International Conference on Computer Engineering and Technology, Chengdu, 2010, pp. V7-121-V7-124.
  8. N Agwankar,Dr.S Surve,Prof.S Prabhu,R Nayak, " Security For Portable Data Storage media."?in IJARCCE International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 1, April 2013
  9. Y Wang and Y Alshboul, "Mobile security testing approaches and challenges," 2015 First Conference on Mobile and Secure Services (MOBISECSERV), Gainesville, FL, 2015, pp. 1-5.
  10. L Aron and P Hanacek, "Overview of security on mobile devices," 2015 2nd World Symposium on Web Applications and Networking (WSWAN), Sousse, 2015, pp. 1-11.
  11. OP Verma, R Agarwal, D Dafouti and S Tyagi, "Peformance analysis of data encryption algorithms," 2011 3rd International Conference on Electronics Computer Technology, Kanyakumari, 2011, pp. 399-403.
  12. TN Shankar, G Sahoo and S Niranjan, "Image Encryption for mobile devices," 2010 International Conference On Communication Control And Computing Technologies, Ramanathapuram, 2010, pp. 612-616.
  13. L Yu, Z Wang and W Wang, "The Application of Hybrid Encryption Algorithm in Software Security," 2012 Fourth International Conference on Computational Intelligence and Communication Networks, Mathura, 2012, pp. 762-765.
  14. WX Zhang, SY Xiao and Y Zhang, "Research on Image-Text Encryption Techniques in Mobile Communications," 2010 Second WRI Global Congress on Intelligent Systems, Wuhan, 2010, pp. 115-118.
  15. V Shokeen and N Yadav,?Encryption and Decryption Technique for Message Communication? IJECT Vol 2,Issue 2,June 2011.
  16. BV Sandeep, NG Cholli, and S Bandi, ?Securing Applications in Windows Phone.? In International Journal Of Electronics And Computer Science Engineering,2012.
  17. P Srinivasarao, PV Lakshmipriya, PCS Azad, T Alekhya, K.Raghavendrarao, and K.Kishore, ?A Technique for Data Encryption and Decryption.? International Journal of Future Generation Communication and Networking, 2014, pp.117-126.
  18. J Yi-ming and L Sheng-li, "The Analysis of Security Weakness in BitLocker Technology," 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, Hubei, 2010, pp. 494-497.
  19. H Rui,JZ Gang and WB Liang.,?Application research and Analysis based on Bitlocker-Data protection & Secure Start-up of Windows 7.", 2014 Journal of Chemical and Pharmaceutical Research,2014, pp.491-497.
  20. S Turpe,A Poller and J Steffan.,? Attacking the BitLocker boot process.? In International Conference on Trusted Computing,April 2009, pp.183-196.
  21. Article http://www.in.techspot.com/downloads/benchmarking/as-ssd-benchmark-1-8-5636/articleshow/47590422.cms. Date accessed: 09/08/2016.

[Dilip V and Shoney Sebastian. (2017); DATA SECURITY IN SMARTPHONES USING BIT-LOCKER TECHNOLOGY. Int. J. of Adv. Res. 5 (Mar). 1825-1832] (ISSN 2320-5407). www.journalijar.com


Dilip


DOI:


Article DOI: 10.21474/IJAR01/3698      
DOI URL: https://dx.doi.org/10.21474/IJAR01/3698