Secure Storage Implementation for Large Files in iOS Environment

Authors

  • Levon M. Hovsepyan National Polytechnic University of Armenia
  • Aren K. Mayilyan National Polytechnic University of Armenia

DOI:

https://doi.org/10.51408/1963-0025

Keywords:

iOS, Secure storage, Data protection, Encryption

Abstract

Mobile device storage services are not secure by nature as all databases and files are stored on the client side. We cannot ignore that because nowadays mobile devices are made of hardware, which is capable for building and running applications, which cover almost every functionality that computers have. There is an inherent risk of data exposure (confidentiality) and data tampering (integrity). To avoid the risks mentioned above, software engineers use some approaches, which are provided by the iOS SDK for securely storing sensitive data. However, those approaches currently work only for small amount of data (key-value pairs) and the issue still remains for large files.
In this paper, we introduced an approach of securely storing large files in iOS environment.

References

[Online]. Available: https://www.statista.com/statistics/274774/forecast-of-mobile-phone-users-worldwide/

[Online]. Available: https://cocoacasts.com/what-is-application-sandboxing

Apple’s iOS Security Guide, pp 20-22, 2018

Code Signing - The Internet Protocol Journal, Volume 5, Number 1 by Eric Fleischman

E. Mona and M. Ali, “Reverse Engineering iOS Mobile Applications”, Proceedings-Working Conference on Reverse Engineering, WCRE, 10.1109/WCRE.2012.27, pp. 177-186, 2012.

C. Adams, G. Kramer, S. Mister, and R. Zuccherato, “On the security of key derivation functions”, 7th Internation Conference on Information Security, Lecture Notes in Computer Science, vol. 3225, pp. 134-145, 2004.

J. Hastad, R. Impagliazzo, L. Levin and M. Luby, “ A pseudorandom generator from any one-way function”, SIAM Journal on Computing.28. 10.1137/S0097539793244708, vol.-28, no. 4, pp. 1364-1396, 1999.

[Online]. Available: https://github.com/RNCryptor/RNCryptor[10]I. Mironov, O. Pandey, O. Reingold, and G. Segev, “Incremental Deterministic Public-Key Encryption”, Journal of Cryptology. 31. 10.1007/s00145-017-9252, vol.31, no. 1, pp. 134-161, 2017.

Downloads

Published

2021-12-10

How to Cite

Hovsepyan, L. M., & Mayilyan, A. K. (2021). Secure Storage Implementation for Large Files in iOS Environment. Mathematical Problems of Computer Science, 50, 88–95. https://doi.org/10.51408/1963-0025