Skip to main content

Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing

  • Conference paper
Convergence and Hybrid Information Technology (ICHIT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 206))

Included in the following conference series:

Abstract

As time progresses, smart-phone features and wireless availability highlight the inner-mobile security issue. By detailed process of inner-mobile acquisition, analyzed result and reporting will be regarded as significant proof on the court. In this paper, researcher forensics implements system of Android smart-phone and delivers the acquisition data through cloud computing to get the forensic analysis and reporting. According to the forensic procedure of National Institute of Standards and Technology (NIST), forensics examiner acquires the inner-data when mobile turns on and then instantly sends it through the clouds. Results will be displayed immediately.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Android developers (2011), http://developer.android.com/guide/basics/what-is-android.html

  2. Authentication and Authorization for Google APIs (2011), http://code.google.com/apis/accounts/docs/AuthForInstalledApps.html

  3. Biggs, S., Vidalis, S.: Cloud Computing Storms. International Journal of Intelligent Computing Research, IJICR (2010)

    Google Scholar 

  4. Biggs, S., Vidalis, S.: Cloud computing: The impact on digital forensic investigations. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009, pp. 1–6. IEEE, Los Alamitos (2009)

    Chapter  Google Scholar 

  5. Foreseeing Innovative New Digiservices (2010), http://www.find.org.tw/find/home.aspx?page=many&id=275

  6. Google Docs Help (2011), http://docs.google.com/support/

  7. Google security and product safety (2011), http://www.google.com/corporate/security.html

  8. Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics. NIST, SP, 800–101 (2007)

    Google Scholar 

  9. Law & Regulations Database of The Republic of China (2011), http://law.moj.gov.tw/index.aspx

  10. Mell, P., Grance, P.: The NIST Definition of Cloud Computing. NIST (2009)

    Google Scholar 

  11. MOBILedit! Forensic (2011), http://www.mobiledit.com/forensic/

  12. Molnar, D., Stuart, S.: Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud. In: Workshop on the Economics of Information Security (2010)

    Google Scholar 

  13. Oxygen Forensic Suite (2011), http://www.oxygen-forensic.com/us/

  14. The NPD Group: Android Extends its Smartphone Market Share in the Third Quarter of 2010 (2010), http://www.npd.com/press/releases/press_101101.html

  15. Thing, V.L.L., Ng, K.-Y., Chang, E.-C.: Live memory forensics of mobile phones. Digital Investigation, S74–S82 (2010)

    Google Scholar 

  16. Wang, P.: Walked into cloud computing, pp. P1-17–P1-20. Top Team Information Co.,Ltd., Taipei (2009)

    Google Scholar 

  17. Wolthusen, S.D.: Overcast: Forensic Discovery in Cloud Environments. In: Conference Proceedings 5th International Conference on IT Security Incident Management and IT Forensics, IMF (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lai, Y., Yang, C., Lin, C., Ahn, T. (2011). Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing. In: Lee, G., Howard, D., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2011. Communications in Computer and Information Science, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24106-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24106-2_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24105-5

  • Online ISBN: 978-3-642-24106-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics