Abstract
As time progresses, smart-phone features and wireless availability highlight the inner-mobile security issue. By detailed process of inner-mobile acquisition, analyzed result and reporting will be regarded as significant proof on the court. In this paper, researcher forensics implements system of Android smart-phone and delivers the acquisition data through cloud computing to get the forensic analysis and reporting. According to the forensic procedure of National Institute of Standards and Technology (NIST), forensics examiner acquires the inner-data when mobile turns on and then instantly sends it through the clouds. Results will be displayed immediately.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Android developers (2011), http://developer.android.com/guide/basics/what-is-android.html
Authentication and Authorization for Google APIs (2011), http://code.google.com/apis/accounts/docs/AuthForInstalledApps.html
Biggs, S., Vidalis, S.: Cloud Computing Storms. International Journal of Intelligent Computing Research, IJICR (2010)
Biggs, S., Vidalis, S.: Cloud computing: The impact on digital forensic investigations. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009, pp. 1–6. IEEE, Los Alamitos (2009)
Foreseeing Innovative New Digiservices (2010), http://www.find.org.tw/find/home.aspx?page=many&id=275
Google Docs Help (2011), http://docs.google.com/support/
Google security and product safety (2011), http://www.google.com/corporate/security.html
Jansen, W., Ayers, R.: Guidelines on Cell Phone Forensics. NIST, SP, 800–101 (2007)
Law & Regulations Database of The Republic of China (2011), http://law.moj.gov.tw/index.aspx
Mell, P., Grance, P.: The NIST Definition of Cloud Computing. NIST (2009)
MOBILedit! Forensic (2011), http://www.mobiledit.com/forensic/
Molnar, D., Stuart, S.: Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud. In: Workshop on the Economics of Information Security (2010)
Oxygen Forensic Suite (2011), http://www.oxygen-forensic.com/us/
The NPD Group: Android Extends its Smartphone Market Share in the Third Quarter of 2010 (2010), http://www.npd.com/press/releases/press_101101.html
Thing, V.L.L., Ng, K.-Y., Chang, E.-C.: Live memory forensics of mobile phones. Digital Investigation, S74–S82 (2010)
Wang, P.: Walked into cloud computing, pp. P1-17–P1-20. Top Team Information Co.,Ltd., Taipei (2009)
Wolthusen, S.D.: Overcast: Forensic Discovery in Cloud Environments. In: Conference Proceedings 5th International Conference on IT Security Incident Management and IT Forensics, IMF (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lai, Y., Yang, C., Lin, C., Ahn, T. (2011). Design and Implementation of Mobile Forensic Tool for Android Smart Phone through Cloud Computing. In: Lee, G., Howard, D., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2011. Communications in Computer and Information Science, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24106-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-24106-2_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24105-5
Online ISBN: 978-3-642-24106-2
eBook Packages: Computer ScienceComputer Science (R0)