2016 Sixth International Conference on Innovative Computing Technology (INTECH) 2016
DOI: 10.1109/intech.2016.7845142
|View full text |Cite
|
Sign up to set email alerts
|

Toward a new mobile cloud forensic framework

Abstract: Abstract-Smartphones have created a significant impact on the day-to-day activities of every individual. Now-a-days a wide range of Smartphone applications are available and it necessitates high computing resources in order to build these applications. Cloud computing offers enormous resources and extends services to resource-constrained mobile devices. Mobile Cloud Computing (MCC) is emerging as a key technology to utilize virtually unlimited resources over the Internet using Smartphones. Offloading data and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 19 publications
(16 reference statements)
0
9
0
Order By: Relevance
“…This chapter also provided elaborate and detailed answers relating to the forensically recoverable information for each web browser tested. The results of this research are useful to, and may be referenced by, forensic experts involved in investigations concerning web activity on both desktop and mobile platforms [17,18,19,20]. Each question posed in the problem statement was addressed and the underlying data presented in subsequent sections should help not only investigators looking for a better general understanding of web browser forensics, but also those seeking advanced techniques and methods for recovering, parsing and analysing web browser specific data.…”
Section: Discussionmentioning
confidence: 97%
“…This chapter also provided elaborate and detailed answers relating to the forensically recoverable information for each web browser tested. The results of this research are useful to, and may be referenced by, forensic experts involved in investigations concerning web activity on both desktop and mobile platforms [17,18,19,20]. Each question posed in the problem statement was addressed and the underlying data presented in subsequent sections should help not only investigators looking for a better general understanding of web browser forensics, but also those seeking advanced techniques and methods for recovering, parsing and analysing web browser specific data.…”
Section: Discussionmentioning
confidence: 97%
“…For Padmanabhan et al (2016), this field is fairly recent one, and represents an area that is emerging throughout time within the field of digital forensics. Likewise, according to Faheem et al (2016), the Mobile Forensics science represents one that is part of the digital forensics, as it can be represented as the process of collecting digital evidence using forensic techniques and methods with the help of tools that can make it a more precise and accurate process.…”
Section: The Mobile Device Forensics Sciencementioning
confidence: 99%
“…Lastly, but not least, the third procedure that can be pursued is to place the mobile device into a shielded box, which will block network and radio communications from outsiders. (Ayers et al, 2014;Faheem et al, 2016;Barmpatsalou et al, 2018).…”
Section: The Mobile Device Forensics Sciencementioning
confidence: 99%
See 1 more Smart Citation
“…Cloud storage is one of the remote data storage techniques that are interconnected with personal computers when connected to the internet [2]. Storing data online using cloud storage service media is one solution for storing data [3], [4]. Storage media applications offered by smartphones such as practicing bring and are supported by physical and cloud storage media [5].…”
Section: Introductionmentioning
confidence: 99%