Android OS does not provide secure storage for the storage of sensitive data that is used in an HCE transaction.
In the case of HCE (Cloud Based SE), the mobile application does not store sensitive data as a Secure Element.
Sensitive PAN data, Symmetric primary key of the card , etc., which are used to create a payment cryptogram protected by the following methods: -
PAN Protection
The Tokenization EMV specification is used to replace a PAN using a Tokenized PAN, where the Tokenized PAN is limited to a specific domain.
Symmetric Key Protection
The symmetric primary key of the card is replaced by a limited symmetric key.
The VISA HCE specification defines a Limited Use Key (LUK), which is limited to a limited time period and transactions.
The MasterCard HCE specification defines a Single Use Key (SUK) to restrict use for a single transaction.
Other HCE specifications follow a similar mechanism.
Thus, cloud data (PAN, Symmetric Key) is stored, and the Mobile application stores a limited version of sensitive data. Thus, this minimizes the risks.
The mobile application uses White Box Cryptography to prevent data theft, as suggested by VISA, MasterCard, and others. The white box of cryptography is hard to break.
By the way, it is called Cloud Based SE , because sensitive data is stored in the cloud instead of the Mobile Application, which differs in the way with a secure element (in SE / Mobile SE sensitive data is stored in SE).