IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 2, February 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Comprehensive Analysis Of The Data Storage And Filesystem Of Android Mobile Device For Forensic Examination

[Full Text]

 

AUTHOR(S)

V BalajiChandrasekhar M, Dr.G.Srinivas, Dr.T.Srinivasa Rao

 

KEYWORDS

Smart Phones; Mobile Devices; Forensic Analysis; File System; Operating System

 

ABSTRACT

Mobile forensics is the digital forensics part that is progressively developing in today's digital era. Android mobile forensics manages to extract, recover, and analyze data on an Android device via many devices. Nevertheless, it is predominant to understand the platform and other fundamentals before starting of forensic examination. Within mobile devices, Smartphones are incredibly considerable. Enhanced computing power and data processing of these devices allow a range of activities to be undertaken. Mobile devices also hold a variety of user data and are a source of sensitive personal information. The data on a device is often more valuable than the device itself. It is incredibly predominant for a forensic examiner to take an informal conclusion where to search for data and contrivances that can be utilized to obtain the information. In this research paper, We are proposing a clear description for What, Where, and in what way the data saved in Android mobile devices, and We also describe Android filesystem properties and structure with experimental results. It would be helpful for the forensic investigator to obtain the information from the mobile phone during the forensic analysis of the mobile phone.

 

REFERENCES

] The Mobile Economy 2018 https://www.gsma.com/mobileeconomy/wp-content/uploads/2018/05/The-Mobile-Economy-2018.pdf
[2] V BalajiChandrasekhar M, Dr. T.Srininivasa Rao, et al., “AN IMPROVISED METHODOLOGY TO UNBAR ANDROID MOBILE PHONE FOR FORENSIC EXAMINATION,” International Journal of Electrical and Computer Engineering., Vol 8, No 4, 2018. DOI: 10.11591/ijece.v8i4.pp2239-2246
[3] Android Studio http://developer.android.com/sdk/index.html.
[4] iRoot Software, androidmtk.com Web site. Retrieved September 27, 2017, from https://androidmtk.com/download-iroot-application-all-versions.
[5] Banuri, H., Alam, M., Khan, S., Manzoor, J., Ali, B., Khan, Y., Yaseen, M., Tahir, M., Ali, T., Alam, Q., Zhang, X. (2012). An Android runtime security policy enforcement framework. Personal and Ubiquitous Computing, 16(6), 631-641.
[6] Baryamureeba, V., & Tushabe, F. (2004). The enhanced digital investigation process model. Proceedings of the Fourth Digital Forensic Research Workshop (pp. 1-9). Citeseer: DFRW.
[7] Becher, M., Freiling, F. C., Hoffmann, J., Holz, T., Uellenbeck, S., & Wolf, C. (2011). Mobile Security Catching Up? Revealing the Nuts and Bolts of theSecurity of Mobile Devices. Proceedings of the 2011 IEEE Symposium on Security and Privacy (SP) (pp.96-111). CA: IEEE.
[8] Benjamin Tomhave (2015), Information SecurityTechnologies. Future Information Technology, Application, and Service, 435-446.
[9] Casey, E. (2011). Foundations of digital forensic, Digital evidence and computer crime: Forensic science, computers, and the internet (3rd ed.). (pp. 1-34). MA: Academic.
[10] Casey, E., & Turnbull, B. (2011). Digital evidence on mobile devices. Eoghan Casey, Digital Evidence and Computer Crime. Third Edition. Forensic Science, Computers, and the Internet, Academic Pres.
[11] Det A. Murphy (2016). Developing Process for Mobile Device Forensics. International Conference on Cyber Security, 88-97.
[12] Cynthia (2016). Mobile Device Forensics. International Conference on Cyber Security, 56-65
[13] Firdous Kausar (2014). New Research Directions in the Area of Smart Phine Forensic Analysis. International Journal of Computer Networks & Communications, 6(4), 99-106.
[14] Hankins Achi, R., Uehara, T., & Jigang, L. (2009). A Comparative Study of Forensic Science and Computer Forensics. Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009. SSIRI 2009 (pp. 230-239). Shanghai: IEEE.
[15] Heriyanto, A.P. Procedures and tools for acquisition and analysis of volatile memory on Android smartphones. Australian Digital Forensics Conference, 2015.
[16] Jansen, W., & Ayers, R. (2006). Forensic software tools for cell phone subscriber identity modules. Proceedings of the International Conference on Digital Forensics, Security, and Law (ADFSL) (pp. 101-113). Pennsylvania: CiteSeer.
[17] Joe Sylve, Andrew Case & Lodovico Marziale (2013). Acquisition and analysis of volatile memory from android devices. Digital Investigation, 8, 175-184.
[18] Konstantia Barmpatsalou, Dimitrios Damopoulos & Georgios Kambourakis (2013). A critical review of 7 years of Mobile Device Forensics. Digital Investigation, 10, 323-349
[19] Kyle D. Lutes, Richard P. Mislan (2016). Challenges in Mobile Phone Forensics. Computer & Information Technology,Purdue University.
[20] Lin, I. L., Han-Chieh, C., & Shih-Hao, P. (2011). Research of Digital Evidence Forensics Standard Operating Procedure with Comparison and Analysis Based on Smart Phone. Proceedings of the 2011 International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) (pp.386-391). Barcelona: IEEE.