{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:48:59Z","timestamp":1743090539433,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811590306"},{"type":"electronic","value":"9789811590313"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9031-3_20","type":"book-chapter","created":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T07:04:29Z","timestamp":1601017469000},"page":"224-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Keeping Privacy Data Secure Under Factory Recovery"],"prefix":"10.1007","author":[{"given":"Wang","family":"Lianfang","sequence":"first","affiliation":[]},{"given":"Wang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Gang","sequence":"additional","affiliation":[]},{"given":"Liu","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Kuang","family":"Xiaohui","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,22]]},"reference":[{"key":"20_CR1","unstructured":"Faruki, P., et al.: Android security: a survey of issues, malware penetration, and defenses"},{"key":"20_CR2","unstructured":"Statista. \nhttps:\/\/www.statista.com\/statistics\/262176\/market-share-held-by-mobile-operating-systems-in-china\/\n\n. Accessed 27 Nov 2019"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Kim, J., Jung, I.Y.: Private data protection of android application (2018)","DOI":"10.1007\/978-981-10-7605-3_234"},{"key":"20_CR4","unstructured":"https:\/\/zt.360.cn\/1101061855.php?dtid=1101061451&did=210942656\n\n. Accessed 10 Nov 2019"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Li, Z., Yang, J., Cui, B.: Study on sensitive data protection based on SEAndroid. In: 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA) (2018)","DOI":"10.1109\/WAINA.2018.00135"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Shahriar, H., et al.: Data protection labware for mobile security (2019)","DOI":"10.1007\/978-3-030-24907-6_15"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Nguyen, N.H., et al.: No-key protocol for deniable encryption (2018)","DOI":"10.1007\/978-981-10-7512-4_10"},{"issue":"13","key":"20_CR8","doi-asserted-by":"publisher","first-page":"4445","DOI":"10.1007\/s00500-017-2651-2","volume":"22","author":"Y Xue","year":"2017","unstructured":"Xue, Y., Tan, Y., Liang, C., Zhang, C.Y., Zheng, J.: An optimized data hiding scheme for Deflate codes. Soft. Comput. 22(13), 4445\u20134455 (2017). \nhttps:\/\/doi.org\/10.1007\/s00500-017-2651-2","journal-title":"Soft. Comput."},{"key":"20_CR9","first-page":"1","volume":"10","author":"X Yu","year":"2018","unstructured":"Yu, X.: A fault-tolerant and energy-efficient continuous data protection system. J. Amb. Intell. Hum. Comput. 10, 1\u201310 (2018)","journal-title":"J. Amb. Intell. Hum. Comput."},{"issue":"4","key":"20_CR10","doi-asserted-by":"publisher","first-page":"4563","DOI":"10.1007\/s11042-017-4540-1","volume":"77","author":"Yu Xiao","year":"2017","unstructured":"Xiao, Yu., Changyou, Z., Yuan, X., Hongfei, Z., Yuanzhang, L., Yu-An, T.: An extra-parity energy saving data layout for video surveillance. Multimedia Tools Appl. 77(4), 4563\u20134583 (2017). \nhttps:\/\/doi.org\/10.1007\/s11042-017-4540-1","journal-title":"Multimedia Tools Appl."},{"issue":"1","key":"20_CR11","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1049\/cje.2017.10.008","volume":"27","author":"X Yu","year":"2018","unstructured":"Yu, X., et al.: A high-performance hierarchical snapshot scheme for hybrid storage systems. Chin. J. Electr. 27(1), 76\u201385 (2018)","journal-title":"Chin. J. Electr."},{"issue":"9","key":"20_CR12","doi-asserted-by":"publisher","first-page":"11137","DOI":"10.1007\/s11042-017-5363-9","volume":"77","author":"X Zhang","year":"2017","unstructured":"Zhang, X., Tan, Y., Zhang, C., Xue, Y., Li, Y., Zheng, J.: A code protection scheme by process memory relocation for android devices. Multimedia Tools Appl. 77(9), 11137\u201311157 (2017). \nhttps:\/\/doi.org\/10.1007\/s11042-017-5363-9","journal-title":"Multimedia Tools Appl."},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Schwamm, R.: Effectiveness of the Factory Reset on a Mobile Device (2014)","DOI":"10.15394\/jdfsl.2014.1182"},{"key":"20_CR14","unstructured":"Zhu, D., Fan, Z., Na, P.: A dynamic credible factory reset mechanism of personal data in android device"},{"key":"20_CR15","unstructured":"Dong, H.K., Eom, Y.I.: iDiscard: enhanced Discard() scheme for flash storage devices. In: 2018 IEEE International Conference on Big Data and Smart Computing (BigComp) (2018)"},{"key":"20_CR16","unstructured":"Xue, Y., et al.: Isolating host environment by booting android from OTG devices. Chin. J. Electr 27(03), 617\u2013624 (2018)"},{"key":"20_CR17","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-319-49568-2_23","volume-title":"Recent Developments in Intelligent Systems and Interactive Applications","author":"H Zhu","year":"2017","unstructured":"Zhu, H., Zhang, Q., Liu, L., Aourra, K., Tan, Y.: Research of optimizing the system partition in android system. In: Xhafa, F., Patnaik, S., Yu, Z. (eds.) IISA 2016. AISC, vol. 541, pp. 168\u2013173. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-49568-2_23"},{"key":"20_CR18","unstructured":"Wang, H.S.O.C., et al.: An Analysis of the File System for Linux., Korea, p. 5 (2012)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Yudha, F., Prayudi, Y.: Block and inode based analysis on EXT4 File System 24(1), 652\u2013655 (2018)","DOI":"10.1166\/asl.2018.11780"},{"key":"20_CR20","unstructured":"Fang, D.R., et al.: Research on recovery method of deleted data for android system. 40(10), 275\u2013280 (2014)"},{"key":"20_CR21","unstructured":"Bovet, D., Cesati, M., Oram, A.: Understanding the Linux Kernel, 2n edn. (2002)"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Yuan, P., et al.: Device-specific Linux kernel optimization for android smartphones (2018)","DOI":"10.1109\/MobileCloud.2018.00018"},{"key":"20_CR23","unstructured":"Park, J.H., et al.: An enhanced security framework for reliable Android operating system. Secur. Commun. Networks p. n\/a-n\/a"},{"key":"20_CR24","unstructured":"Talley, A.V.: Content analysis tools in android memory forensics (2014)"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Liu, Z.L., Pun, C.M.: Reversible data-hiding in encrypted images by redundant space transfer. s 433\u2013434, 188\u2013203 (2018)","DOI":"10.1016\/j.ins.2017.12.044"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Abdel-Nabi, H., Al-Haj, A.: Efficient joint encryption and data hiding algorithm for medical images security. In: 2017 8th International Conference on Information and Communication Systems (ICICS) (2017)","DOI":"10.1109\/IACS.2017.7921962"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Jiang, R., et al.: A high-capacity reversible data hiding method in encrypted images based on block shifting. In: 2017 2nd International Conference on Multimedia and Image Processing (ICMIP) (2017)","DOI":"10.1109\/ICMIP.2017.10"},{"key":"20_CR28","unstructured":"Abdulaziz, N.K.: Digital watermarking and data hiding in multimedia (2017)"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Sharma, A., Sharma, N., Kumar, A.: A new algorithm to secure image steganographic file. In: 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence (Confluence) (2017)","DOI":"10.1109\/CONFLUENCE.2017.7943215"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Social Networks and Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9031-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T07:12:57Z","timestamp":1601017977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-9031-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811590306","9789811590313"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9031-3_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SocialSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security and Privacy in Social Networks and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socialsec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/socialsec2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"111","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}