scholarly journals Urge for Novel and Secure Software Framework for Extraction and Decoding of Mobile Artifacts

YMER Digital ◽  
2021 ◽  
Vol 20 (12) ◽  
pp. 589-598
Author(s):  
Mr. Bhushan M Manjre ◽  
◽  
Dr. Krishan Kumar Goyal ◽  

Mobile Forensics is now days, increasingly becoming more challenging as it is the field of science that is continuously evolving with respect to the rapidly developing technologies and techniques for the extraction of the mobile data and its decoding. Majority of the crimes are getting committed digitally and especially the criminals are preferring mobile handsets than a laptop or desktop machines, leaving the footprints behind which could be evidence against them. The mobile handsets along with their software applications are getting more advanced and sophisticated mainly due to advances in Cloud computing where clouds are used to store data, Anti-forensics where efforts are made to defeat forensic procedures and Encryption which is used to secure the data during transit. But when compared with the pace of development in mobile hardware and software, the forensic tools and techniques are growing very slowly. Hence the contemporary forensic tools and methodologies are becoming increasingly obsolete and hence urges for the advanced forensic tools, methods which could comply with the need of today’s mobile forensics. Hence, this work presents a detailed survey of the contemporary challenges faced by the forensic experts with the current forensic tools and its methodologies and also the need, scope and opportunities associated with the novel and secure software framework that can address the majority of issues occurring while extraction and decoding of mobile artifacts.

Author(s):  
Muhammad Faheem ◽  
Mohand-Tahar Kechadi ◽  
Nhien An Le-Khac

Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.


2015 ◽  
Vol 7 (2) ◽  
pp. 1-19 ◽  
Author(s):  
Muhammad Faheem ◽  
Tahar Kechadi ◽  
Nhien An Le-Khac

Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.


2016 ◽  
pp. 2324-2344
Author(s):  
Muhammad Faheem ◽  
Mohand-Tahar Kechadi ◽  
Nhien An Le-Khac

Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence.


2012 ◽  
Vol 4 (2) ◽  
pp. 28-48 ◽  
Author(s):  
George Grispos ◽  
Tim Storer ◽  
William Bradley Glisson

Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy, and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments, amongst other organizations. Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment, as well as discussing and identifying several new research challenges addressing this changing context.


2016 ◽  
pp. 307-334 ◽  
Author(s):  
Ishan Senarathna ◽  
Matthew Warren ◽  
William Yeoh ◽  
Scott Salzman

Cloud Computing is an increasingly important worldwide development in business service provision. The business benefits of Cloud Computing usage include reduced IT overhead costs, greater flexibility of services, reduced TCO (Total Cost of Ownership), on-demand services, and improved productivity. As a result, Small and Medium-Sized Enterprises (SMEs) are increasingly adopting Cloud Computing technology because of these perceived benefits. The most economical deployment model in Cloud Computing is called the Public Cloud, which is especially suitable for SMEs because it provides almost immediate access to hardware resources and reduces their need to purchase an array of advanced hardware and software applications. The changes experienced in Cloud Computing adoption over the past decade are unprecedented and have raised important issues with regard to privacy, security, trust, and reliability. This chapter presents a conceptual model for Cloud Computing adoption by SMEs in Australia.


2018 ◽  
Vol 17 (2) ◽  
pp. 7335-7349
Author(s):  
Rashid Alakbarov

The article analyzes the advantages of mobile cloud technologies and problems emerging during the use of those. The network infrastructure created based on cloudlets at the second level of mobile cloud computing with hierarchical structure is analyzed. At the same time, the article explores the issues of satisfaction of demand of mobile equipment for computing and memory resources by using these technologies. The article presents one solution for the allocation of mobile user requests in virtual machines created in cloudlets located near base stations of wireless metropolitan area networks (WMAN) in a balanced way by considering the technical capacity of those. Alongside, the article considers the solution of user problem during designated time and the issue of determining virtual machines satisfying other requirements. For this purpose, different characteristics of the stated problem, virtual machines, as well as communication channels between a user and virtual machines are considered. By using possible values determining the importance of cloudlets, conditions for loading software applications of a user to a virtual machine are explored and an appropriate method is proposed.


2012 ◽  
pp. 733-748
Author(s):  
Roland Kübert ◽  
Gregory Katsaros

Even though public cloud providers already exist and offer computing and storage services, cloud computing is still a buzzword for scientists in various fields such as engineering, finance, social sciences, etc. These technologies are currently mature enough to leave the experimental laboratory in order to be used in real-life scenarios. To this end, the authors consider that the prime example use case of cloud computing is a web hosting service. This paper presents the architectural approach as well as the technical solution for applying elastic web hosting onto a private cloud infrastructure using only free software. Through several available software applications and tools, anyone can build their own private cloud on top of a local infrastructure and benefit from the dynamicity and scalability provided by the cloud approach.


Author(s):  
Roland Kübert ◽  
Gregory Katsaros

Even though public cloud providers already exist and offer computing and storage services, cloud computing is still a buzzword for scientists in various fields such as engineering, finance, social sciences, etc. These technologies are currently mature enough to leave the experimental laboratory in order to be used in real-life scenarios. To this end, the authors consider that the prime example use case of cloud computing is a web hosting service. This paper presents the architectural approach as well as the technical solution for applying elastic web hosting onto a private cloud infrastructure using only free software. Through several available software applications and tools, anyone can build their own private cloud on top of a local infrastructure and benefit from the dynamicity and scalability provided by the cloud approach.


Author(s):  
Michael Davis ◽  
Alice Sedsman

Cloud computing has been heralded as a new era in the evolution of information and communications technologies. ICT giants have invested heavily in developing technologies and mega server facilities, which allow end users to access web-based software applications and store their data off-site. Businesses using cloud computing services will benefit from reduced operating costs as they cut back on ICT infrastructure and personnel. Individuals will no longer need to buy and install software and will have universal access to their data through any internet-ready device. Yet, hidden amongst the host of benefits are inherent legal risks. The global nature of cloud computing raises questions about privacy, security, confidentiality and access to data. Current terms of use do not adequately address the multitude of legal issues unique to cloud computing. In the face of this legal uncertainty, end users should be educated about the risks involved in entering the cloud.


Sign in / Sign up

Export Citation Format

Share Document