Multimedia Tools and Applications

, Volume 71, Issue 1, pp 219–234 | Cite as

Digital evidence discovery of networked multimedia smart devices based on social networking activities

  • Hai-Cheng Chu
  • Szu-Wei Yang
  • Ching-Hsien Hsu
  • Jong Hyuk ParkEmail author


Unquestionably, networked multimedia smart devices are commonly adopted in contemporary ubiquitous wireless computing era with unprecedented evolving pace in terms of mobility, portability, and pervasiveness. Regrettably, those technology-oriented gadgets are phenomenally exploited by cyber criminals or get involved in computer-related incidents unknowingly. Substantively, the detection, prevention, and the related digital forensics of the above scenarios are becoming tremendously urgent both in public and private sectors. Therefore, in this research, we investigate the scenario when state-of-the-art wireless communication technologies are integrated with the networked smart devices where digital evidences may exist and they could be disclosed when appropriate standard operating procedures are suitably applied. Accordingly, in this paper, a PDA with the built-in GPS navigation functionality via the ubiquitous Wi-Fi connection to a popular social networking platform (facebook) is cross examined concerning the related digital evidence collecting and discovering in terms of revealing previous facebook user accounts on the mobile device without shutting off the power. The research provides a generic framework for the digital forensics specialists to contemplate when the networked smart devices are involved in the related criminal investigation cases especially when omnipresent social networking platforms are becoming the new avenue for the escalating, stringent, and heinous cybercrimes.


Digital forensics Mobile social network Location-based social networking Networked smart devices Volatile memory acquisition 



The author would like to acknowledge the funding support of NSC (National Science Council) of Taiwan concerning the grant of Project NSC 101-2221-E-142-009. This research was partially supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology (2012-0008296).


  1. 1.
    Acquisti A, Gross R (2006) Imagined communities: awareness, information sharing and privacy on the facebook. Lect Notes Comput Sci 4258:36–58CrossRefGoogle Scholar
  2. 2.
    Andrew MW (2007) Defining a process model for forensic analysis of digital evidence devices and storage media. In: Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, SADFE 2007Google Scholar
  3. 3.
    Asher C, Aumasson JP, Phan RC-W (2009) Security and privacy preservation in human-involved networks, iNetSec. IFIP AICT 309:139–148Google Scholar
  4. 4.
    Brown R, Pham B, DeVel O (2005) Design of a digital forensics image mining system. KES 2005. Lect Notes Comput Sci 3683:395–404CrossRefGoogle Scholar
  5. 5.
    Chen H, Chung W, Xu J, Wang G, Qin Y, Chau M (2004) Crime data mining: a general framework and some examples. IEEE Comput 37(4):50–56CrossRefGoogle Scholar
  6. 6.
    Counts S, Fisher KE (2008) Mobile social networking: an information grounds perspective. Proceedings of the 41st Hawaii International Conference on System Sciences (HICSS). IEEE Publication, Waikoloa, Big Island, HI, pp 1–10Google Scholar
  7. 7.
    Deng C, Lin Y, Ma L, Cao Y (2011) Towards a practical and scalable trusted software dissemination system. J Converg 2(1):53–60Google Scholar
  8. 8.
    Dominguez-Sal D, Perez-Casany M, Larriba-Pey JL (2010) Cooperative cache analysis for distributed search engines. Int J Inf Technol Commun Converg 1(1):41–65Google Scholar
  9. 9.
    Dwyer C, Hiltz S, Passerini K (2007) Trust and privacy concern within social networking sites: a comparison of Facebook and Myspace. In: Proceedings of the Thirteenth Americas Conference on Information Systems, AMCISGoogle Scholar
  10. 10.
    El-Khatib K, Zhang ZE, Hadibi N, Bochmann GV (2004) Personal and service mobility in ubiquitous computing environments. Wirel Commun Mob Comput 4(6):595–607CrossRefGoogle Scholar
  11. 11.
    Ellison N, Steinfield C, Lampe C (2007) The benefits of facebook “friends:” social capital and college students use of online social network sites. J Comput Mediat Commun 12:1143–1168CrossRefGoogle Scholar
  12. 12.
    Fengyu D, Xuerong G (2009) An Advanced Location Based Service (A-LBS) on Mobile Social Network. Proc. IEEE International Conference on Broadband Network and Multimedia Technology, ICBNMT 09. IEEE Press, pp. 740-743, October 2009Google Scholar
  13. 13.
  14. 14.
    Iqbal MU, Samsung L (2008) Legal and ethical implications of GPS vulnerabilities. J Int Commer Law Technol 3(3):178–187Google Scholar
  15. 15.
    Joore P (2008) Social aspects of location-monitoring systems: the case of Guide Me and of My-SOS. Soc Sci Inf 47:253–274CrossRefGoogle Scholar
  16. 16.
    Keenan T (2008) On the internet, things never go away completely. IFIP Int Fed Inf Process 262:37–50Google Scholar
  17. 17.
    Kryvinska N, Thanh DV, Strauss C (2010) Integrated management platform for seamless services provisioning in converged network. Int J Inf Technol Commun Converg 1(1):77–91Google Scholar
  18. 18.
    Lee S, Kim H, Lee S, Lim J (2005) Digital evidence collection process in integrity and memory information gathering. In: Proceedings of Systematic Approaches to Digital Forensic Engineering. First International Work-shop. Proc. IEEE, pp. 236–247Google Scholar
  19. 19.
    Simon M, Slay J (2010) Recovery of skype application activity data from physical memory. Proceedings of the 5th international conference on availability, reliability and security. IEEE Publication, Krakow, Poland, pp 283–288Google Scholar
  20. 20.
    Nan L, Guanling C (2009) Analysis of a location-based social network. Int Conf Comput Sci Eng 4:263–270, August 2009, Vancouver, CanadaGoogle Scholar
  21. 21.
    Nance K, Hay B, Bishop M (2009) Digital forensics: defining a research agenda. In: Proceedings of the 42nd Hawaii International Conference on System Sciences. IEEE Press, Waikoloa, HI, USA, Jan 2009Google Scholar
  22. 22.
  23. 23.
    Schapsis C (2010) Location based social networks links: a list of location based social networks, [online].
  24. 24.
    Skeels MM, Grudin J (2009) When social networks cross boundaries: a case study of workplace use of facebook and linkedin. In: Proceedings of the ACM 2009 international conference on Supporting group work, Sanibel Island, FloridaGoogle Scholar
  25. 25.
    Sohn H, Ro YM, Plataniotis KN (2009) Content sharing based on personal information in virtually secured space. Lect Notes Comput Sci 5450:388–400CrossRefGoogle Scholar
  26. 26.
    Strawn C (2009) Expanding the potential for GPS evidence acquisition. Small Scale Digit Device Forensic J 3(1):1–12Google Scholar
  27. 27.
    Troshynski E, Lee C, Dourish P (2008) Accountabilities of presence: reframing location-based systems. In: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, Florence, ItalyGoogle Scholar
  28. 28.
    Tsai JY, Kelley P (2009) Who’s viewed you?: the impact of feedback in a mobile location-sharing application. In: Proceedings of the 27th international conference on Human factors in computing systems, Boston, MAGoogle Scholar
  29. 29.
    Walters A, Petroni N (2007) Volatools: integrating volatile memory forensics into the digital investigation process. Blackhat Federal, Washington, DCGoogle Scholar
  30. 30.
    Wang JL, Loui M (2009) Privacy and ethical issues in location-based tracking systems. In: Proceedings of the IEEE Symposium on Technology and Society, Phoenix, ArizonaGoogle Scholar
  31. 31.
    Xiong L, Tan Q (2011) A configurable approach to toleration of soft errors via partial software protection. J Converg 2(1):31–38MathSciNetGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Hai-Cheng Chu
    • 1
  • Szu-Wei Yang
    • 2
  • Ching-Hsien Hsu
    • 3
  • Jong Hyuk Park
    • 4
    Email author
  1. 1.Department of International BusinessNational Taichung University of EducationTaichungRepublic of China
  2. 2.Department of EducationNational Taichung University of EducationTaichungRepublic of China
  3. 3.Department of Computer Science and Information EngineeringChung Hua UniversityHsinchuRepublic of China
  4. 4.Department of Computer Science and EngineeringSeoul National University of Science and TechnologyNowon-guKorea

Personalised recommendations