DocumentCode :
2927032
Title :
A security analysis of smartphone data flow and feasible solutions for lawful interception
Author :
Paul, Mithun ; Chauhan, Nitin Singh ; Saxena, Ashutosh
Author_Institution :
Security & Privacy Group, Infosys Ltd., Hyderabad, India
fYear :
2011
fDate :
5-8 Dec. 2011
Firstpage :
19
Lastpage :
24
Abstract :
Smartphones providing proprietary encryption schemes, albeit offering a novel paradigm to privacy, are becoming a bone of contention for certain sovereignties. These sovereignties have raised concerns about their security agencies not having any control on the encrypted data leaving their jurisdiction and the ensuing possibility of it being misused by people with malicious intents. Such smartphones have typically two types of customers, independent users who use it to access public mail servers and corporates/enterprises whose employees use it to access corporate emails in an encrypted form. The threat issues raised by security agencies concern mainly the enterprise servers where the encrypted data leaves the jurisdiction of the respective sovereignty while on its way to the global smartphone router. In this paper, we have analyzed such email message transfer mechanisms in smartphones and proposed some feasible solutions, which, if accepted and implemented by entities involved, can lead to a possible win-win situation for both the parties, viz., the smartphone provider who does not want to lose the customers and these sovereignties who can avoid the worry of encrypted data leaving their jurisdiction.
Keywords :
cryptography; data flow analysis; electronic mail; law; smart phones; email message transfer mechanism; encrypted corporate email; encrypted data; jurisdiction; lawful interception; proprietary encryption scheme; public mail server; security agency; security analysis; smartphone data flow; sovereignty; Electronic mail; Encryption; Government; Protocols; Servers; Encryption; Escrow; PKI; Security; Smartphone;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security (IAS), 2011 7th International Conference on
Conference_Location :
Melaka
Print_ISBN :
978-1-4577-2154-0
Type :
conf
DOI :
10.1109/ISIAS.2011.6122788
Filename :
6122788
Link To Document :
بازگشت