{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T02:52:12Z","timestamp":1761706332233},"reference-count":32,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2015,2,1]],"date-time":"2015-02-01T00:00:00Z","timestamp":1422748800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"ICT R&D program of MSIP\/IITP","award":["2014(10043959)"],"award-info":[{"award-number":["2014(10043959)"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,2,1]]},"abstract":"<jats:p> Recently, the development of smart phones has been reported the number of security vulnerabilities. Although these smart phones have a concept of Sandbox for the security, sensitive personal information has been still exposed by internal data exchange or root privilege acquisition. In this paper, we propose a system framework for secure storage of sensitive data in smartphone. The system is divided into general domain (GD) and secure domain (SD) in mobile device utilizing domain separation technique of virtualization, and SD provides a secure execution environment to protect sensitive data and secure services. In addition, our system introduces the secure functions such as authentication\/access control, and encryption\/key management and secures filesystem to be run in SD and addresses a detailed secure filesystem as a key function for secure storage. Lastly, the experiments are conducted to measure the performance overhead imposed by security features in SD and by overall system with interdomain communication from GD to SD. These experiment results show suitability of our system and suggest applicability of various secure functions which can be applied in our secure storage system. <\/jats:p>","DOI":"10.1155\/2015\/929380","type":"journal-article","created":{"date-parts":[[2015,2,28]],"date-time":"2015-02-28T21:01:05Z","timestamp":1425157265000},"page":"929380","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":7,"title":["A Secure Storage System for Sensitive Data Protection Based on Mobile Virtualization"],"prefix":"10.1177","volume":"11","author":[{"given":"Su-Wan","family":"Park","sequence":"first","affiliation":[{"name":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea"}]},{"given":"JaeDeok","family":"Lim","sequence":"additional","affiliation":[{"name":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea"}]},{"given":"Jeong Nyeo","family":"Kim","sequence":"additional","affiliation":[{"name":"Cyber Security Research Division, Electronics and Telecommunications Research Institute, Daejeon, Republic of Korea"}]}],"member":"179","published-online":{"date-parts":[[2015,2,28]]},"reference":[{"key":"B1-2015-929380","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-014-0007-9"},{"key":"B2-2015-929380","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-013-0251-1"},{"key":"B3-2015-929380","doi-asserted-by":"publisher","DOI":"10.3745\/jips.2014.10.1.132"},{"key":"B4-2015-929380","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.2013.9.2.189"},{"key":"B5-2015-929380","volume-title":"Bring Your Own Device (BYOD): Current Status, Issues, and Future Directions","author":"Shim J. P.","year":"2013"},{"issue":"2","key":"B6-2015-929380","first-page":"353","volume":"6","author":"Rhee K.","year":"2012","journal-title":"International Journal of Security and its Applications"},{"key":"B7-2015-929380","first-page":"28","author":"Garfinkel T.","year":"2007","journal-title":"The USENIX Magazine"},{"key":"B8-2015-929380","doi-asserted-by":"publisher","DOI":"10.1145\/1435458.1435461"},{"key":"B9-2015-929380","doi-asserted-by":"publisher","DOI":"10.1109\/rsp.2010.5656430"},{"key":"B10-2015-929380","doi-asserted-by":"publisher","DOI":"10.3745\/jips.2013.9.3.379"},{"key":"B11-2015-929380","volume-title":"Modern Operating Systems","author":"Tanenbaum A. S.","year":"2007"},{"key":"B12-2015-929380","doi-asserted-by":"publisher","DOI":"10.1145\/1016998.1017000"},{"key":"B13-2015-929380","first-page":"193","volume-title":"Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP '03)","volume":"37","author":"Garfinkel T."},{"key":"B15-2015-929380","volume-title":"Proceedings of the 15th Conference on USENIX Security Symposium","volume":"15","author":"Berger S."},{"issue":"3","key":"B16-2015-929380","first-page":"26","volume":"5","author":"Moein S.","year":"2014","journal-title":"Journal of Convergence"},{"issue":"2","key":"B17-2015-929380","first-page":"1","volume":"5","author":"Hwang K.","year":"2014","journal-title":"Journal of Convergence"},{"key":"B18-2015-929380","first-page":"367","volume-title":"Proceedings of the USENIX Security Symposium","author":"Borders K."},{"key":"B19-2015-929380","first-page":"22","volume-title":"Proceedings of the 13th USENIX Conference on Hot Topics in Operating Systems","author":"Maniatis P."},{"key":"B20-2015-929380","doi-asserted-by":"publisher","DOI":"10.1145\/2365864.2151050"},{"key":"B21-2015-929380","first-page":"1","volume-title":"Proceedings of the 23rd Conference on Large Installation System Administration","author":"Catuogno L."},{"key":"B22-2015-929380","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.05.006"},{"key":"B23-2015-929380","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2014.06.003"},{"key":"B24-2015-929380","first-page":"1","volume-title":"Proceedings of the 1st International Conference on Trusted Systems","author":"Catuogno L."},{"key":"B25-2015-929380","doi-asserted-by":"publisher","DOI":"10.1145\/2295136.2295140"},{"key":"B26-2015-929380","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043574"},{"key":"B27-2015-929380","volume-title":"\u03bcC\/OS the Real-Time Kernel","author":"Labrosse J.","year":"1992"},{"key":"B28-2015-929380","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11599-3_5"},{"key":"B29-2015-929380","doi-asserted-by":"publisher","DOI":"10.1145\/1824795.1824797"},{"issue":"4","key":"B30-2015-929380","first-page":"30","volume":"4","author":"Qin Y.","year":"2013","journal-title":"Journal of Convergence"},{"issue":"2","key":"B31-2015-929380","first-page":"1","volume":"3","author":"Truong T.","year":"2012","journal-title":"Journal of Convergence"},{"key":"B32-2015-929380","doi-asserted-by":"publisher","DOI":"10.1186\/2192-1962-3-16"},{"key":"B33-2015-929380","doi-asserted-by":"publisher","DOI":"10.1186\/2192-1962-3-22"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/929380","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/929380","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/929380","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T23:37:32Z","timestamp":1620171452000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/929380"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,1]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,2,1]]}},"alternative-id":["10.1155\/2015\/929380"],"URL":"https:\/\/doi.org\/10.1155\/2015\/929380","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,1]]}}}