Advertisement

Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing

  • Yenting Lai
  • Chunghuang Yang
  • Chihhung Lin
  • TaeNam Ahn
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 206)

Abstract

As time progresses, smart-phone features and wireless availability highlight the inner-mobile security issue. By detailed process of inner-mobile acquisition, analyzed result and reporting will be regarded as significant proof on the court. In this paper, researcher forensics implements system of Android smart-phone and delivers the acquisition data through cloud computing to get the forensic analysis and reporting. According to the forensic procedure of National Institute of Standards and Technology (NIST), forensics examiner acquires the inner-data when mobile turns on and then instantly sends it through the clouds. Results will be displayed immediately.

Keywords

Smart-Phone Mobile Forensic Android Cloud Computing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Authentication and Authorization for Google APIs (2011), http://code.google.com/apis/accounts/docs/AuthForInstalledApps.html
  3. 3.
    Biggs, S., Vidalis, S.: Cloud Computing Storms. International Journal of Intelligent Computing Research, IJICR (2010)Google Scholar
  4. 4.
    Biggs, S., Vidalis, S.: Cloud computing: The impact on digital forensic investigations. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009, pp. 1–6. IEEE, Los Alamitos (2009)CrossRefGoogle Scholar
  5. 5.
    Foreseeing Innovative New Digiservices (2010), http://www.find.org.tw/find/home.aspx?page=many&id=275
  6. 6.
    Google Docs Help (2011), http://docs.google.com/support/
  7. 7.
    Google security and product safety (2011), http://www.google.com/corporate/security.html
  8. 8.
    Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics. NIST, SP, 800–101 (2007)Google Scholar
  9. 9.
    Law & Regulations Database of The Republic of China (2011), http://law.moj.gov.tw/index.aspx
  10. 10.
    Mell, P., Grance, P.: The NIST Definition of Cloud Computing. NIST (2009)Google Scholar
  11. 11.
    MOBILedit! Forensic (2011), http://www.mobiledit.com/forensic/
  12. 12.
    Molnar, D., Stuart, S.: Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud. In: Workshop on the Economics of Information Security (2010)Google Scholar
  13. 13.
    Oxygen Forensic Suite (2011), http://www.oxygen-forensic.com/us/
  14. 14.
    The NPD Group: Android Extends its Smartphone Market Share in the Third Quarter of 2010 (2010), http://www.npd.com/press/releases/press_101101.html
  15. 15.
    Thing, V.L.L., Ng, K.-Y., Chang, E.-C.: Live memory forensics of mobile phones. Digital Investigation, S74–S82 (2010)Google Scholar
  16. 16.
    Wang, P.: Walked into cloud computing, pp. P1-17–P1-20. Top Team Information Co.,Ltd., Taipei (2009)Google Scholar
  17. 17.
    Wolthusen, S.D.: Overcast: Forensic Discovery in Cloud Environments. In: Conference Proceedings 5th International Conference on IT Security Incident Management and IT Forensics, IMF (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Yenting Lai
    • 1
  • Chunghuang Yang
    • 1
  • Chihhung Lin
    • 2
  • TaeNam Ahn
    • 3
  1. 1.Graduate Institute of Information and computer EducationNational Kaohsiung Normal UniversityTaiwan
  2. 2.Network and Multimedia InstituteInstitute for Information IndustryTaiwan
  3. 3.Security Engineering Research CenterHannam UniversityKorea

Personalised recommendations