Abstract
Nowadays, the smartphone has became the popular communication devices in everyday life. It is a main tool to facilitate the communication among people. Besides that, smartphone also save a persons activities which include many privacy information such as address book, sms messages, pictures, video, call logs, location logs, web browsing history, emails, and so much more. These documents represent the information about actions, activities or personal activities, and if there is enough lawful proof that person is guilty, that can be valuable as digital evidence in court. Therefore, mobile phone is also an important channel and analysis tool, investigate about content, data corellation which is saved in the smartphone is a valuable tool for investigator to obtain evidence from them. This paper presents the methods and technologies are used to obtain evidence from Android Smartphones. In addition, we are also point out the difficulties in both legal and technical aspects of the digital evidence obtaining from these kind of smartphones.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Angles, R., Gutierrez, C.: Survey of graph database models. ACM Comput. Surv. (CSUR) 40(1), 11–139 (2008)
Barmpatsalou, K., Damopoulos, D., Kambourakis, G., Katos, V.: A critical review of 7 years of mobile device forensics. Digit. Investig. 10(4), 323–349 (2013)
Brunty, J.: Mobile device forensics: threats, challenges, and future trends. In: Sammons, J. (ed.) Digital Forensics, pp. 69–84. Syngress, Burlington (2016). Chapter 5
Celko, J.: Graph databases. In: Celko, J. (ed.) Joe Celkos Complete Guide to NoSQL, pp. 27–46. Morgan Kaufmann, Burlington (2014). Chapter 3
Harichandran, V.S., Breitinger, F., Baggili, I., Marrington, A.: A cyber forensics needs analysis survey: revisiting the domain’s needs a decade later. Comput. Secur. 57, 1–13 (2016)
Hoog, A.: Android Forensics: Investigation, Analysis and Mobile Security for Google Android, 1st edn. Syngress Publishing, Burlington (2011)
Hoog, A., Strzempka, K.: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices, 1st edn. Syngress Publishing, Burlington (2011)
Mutawa, N.A., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digit. Investig. 9(Suppl.), S24–S33 (2012). The Proceedings of the Twelfth Annual DFRWS Conference and 12th Annual Digital Forensics Research Conference
Schiebeck, S., Latzenhofer, M., Palensky, B., Schauer, S., Quirchmayr, G., Benesch,T., Göllner, J., Meurers, C., Mayr, I.: Implementation of a generic ICT risk model using graph databases. In: Proceedings of the Ninth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2015, pp. 146–153, August 2015
Thing, V.L.L., Ng, K.Y., Chang, E.C.: Live memory forensics of mobile phones. Digit. Investig. 7, S74–S82 (2010)
Xu, N., Jia, W., Luo, Y., Zhang, F., Xuan, D., Teng, J.: An opened eye on you. IEEE Veh. Technol. Mag. 6(4), 49–59 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Dang, MT., Nguyen, T.A. (2016). Using Graph Database for Evidence Correlation on Android Smartphones. In: Dang, T., Wagner, R., Küng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds) Future Data and Security Engineering. FDSE 2016. Lecture Notes in Computer Science(), vol 10018. Springer, Cham. https://doi.org/10.1007/978-3-319-48057-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-48057-2_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-48056-5
Online ISBN: 978-3-319-48057-2
eBook Packages: Computer ScienceComputer Science (R0)