Mobile Computing and Wireless Networks 2016
DOI: 10.4018/978-1-4666-8751-6.ch092
|View full text |Cite
|
Sign up to set email alerts
|

The State of the Art Forensic Techniques in Mobile Cloud Environment

Abstract: Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements.The popularity of mobile cloud computing is an opportunity for misuse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 42 publications
0
5
0
Order By: Relevance
“…This is a simple, secure, fast way of recovering data with a reduced risk of corruption of those data. We will also look at the feasibility of extending our approach in memory forensics [31] of mobile devices in smart phone investigations [32].…”
Section: Resultsmentioning
confidence: 99%
“…This is a simple, secure, fast way of recovering data with a reduced risk of corruption of those data. We will also look at the feasibility of extending our approach in memory forensics [31] of mobile devices in smart phone investigations [32].…”
Section: Resultsmentioning
confidence: 99%
“…This chapter also provided elaborate and detailed answers relating to the forensically recoverable information for each web browser tested. The results of this research are useful to, and may be referenced by, forensic experts involved in investigations concerning web activity on both desktop and mobile platforms [17,18,19,20]. Each question posed in the problem statement was addressed and the underlying data presented in subsequent sections should help not only investigators looking for a better general understanding of web browser forensics, but also those seeking advanced techniques and methods for recovering, parsing and analysing web browser specific data.…”
Section: Discussionmentioning
confidence: 97%
“…However, to make the most if it, the method metadata is stored within files and data repositories must be understood, tested, and shown to be to be reliable. Accessing and understanding device metadata can assist the investigators in examining digital artefacts from filesystems (Du et al, 2018), mobile apps (Faheem et al, 2015), and Internet of Things devices (Sayakkara et al, 2018). Sampson (2013) documented the necessity of understanding metadata and offered strategies to assist with this type of review.…”
Section: Related Workmentioning
confidence: 99%
“…Examining application generated databases is not only an important task for forensic analysis of the data generation software tools, e.g., desktop applications and web browsers (Buchholz and Spafford, 2004), mobile applications (Faheem et al, 2015), and cloud services (Farina et al, 2015), but has been identified for desktop metadata curators, such as desktop file search utilities. Turnbull and Slay (Turnbull and B.BSlay, 2006) emphasised the importance of conducting research into the databases used by Google Desktop Search technologies in order for tools to be designed to extract the data for digital forensic investigations.…”
Section: Related Workmentioning
confidence: 99%