Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.3.369

Analysis of Encryption and Decryption Processes of Realm Database and Its Application  

Youn, Byungchul (Kookmin University)
Park, Myungseo (Kookmin University)
Kim, Jongsung (Kookmin University)
Abstract
Due to the widespread use of mobile devices, smartphone penetration and usage rate continue to increase and there is also an increasing amount of data that need to be stored and managed in applications. Therefore, recent applications use mobile databases to store and manage user data. Realm database, developed in 2014, is attracting more attention from developers because of advantages of continuous updating, high speed, low memory usage, simplicity and readability of the code. It also supports an encryption to provide confidentiality and integrity of personal information stored in the database. However, since the encryption can be used as an anti-forensic technique, it is necessary to analyze the encryption and decryption processes provided by Realm Database. In this paper, we analyze the structure of Realm Database and its encryption and decryption process in detail, and analyze an application that supports an encryption to propose the use cases of the Realm Database.
Keywords
Realm Database; Mobile Database; Digital Forensics;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 "Realm blog", https://academy.realm.io/kr/posts/gdg-seoul-realm-introduce/
2 "Realm blog", https://academy.realm.io/kr/posts/realm-object-centric-present-day-database-mobile-applications/
3 "DB-Engine", https://db-engines.com/en/ranking
4 Junki Kim, Jechyeok Han and Jong-Hyun Choi, "The Method of Recovery for Deleted Record of Realm Database," Jonornal of The Korea Institute of information Security & Cryptology, 28(3), pp. 625-633, Jun. 2018
5 "Github", https://github.com/realm/realm-core
6 J. Pu, Z. Song, and E. Tilevich, "Understanding the energy, performance, and programming effort trade-offs of Android persistence frameworks," 2016 IEEE 24th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), pp. 433-438, Sep. 2016
7 Zhang, Lijun, and F. Yu. "The forensic analysis of WeChat message," 2016 IEE 6th International Conference on Instrumentation & Measurement, Com puter, Communication and Control (IMCCC), pp. 500-503, Jul. 2016