A Unified Forensic Framework for Data Identification and Collection in Mobile Cloud Social Network Applications
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
Mobile Cloud Computing (MCC) is the emerging and well accepted concept that significantly removes the constraints of mobile devices in terms of storage and computing capabilities and improves productivity, enhances performance, saves energy, and elevates user experience. The consolidation of cloud computing, wireless communication infrastructure, portable computing devices, location- based services, and mobile web has led to the inauguration of novel computing model. The Mobile social networks and cloud computing technology have gained rapid and intensive attention in recent years because of its numerous available benefits. Despite being an advanced technology to communicate and socialize with friends, the diverse and anonymous nature of mobile cloud social networking applications makes them very vulnerable to crimes and illegal activities. On considering the point of mobile cloud computing benefits, the forensic assistance based mobile cloud computing could offer a solution to the problem of social networking applications. Therefore, this work proposes a Mobile Cloud Forensic Framework (MCFF) to facilitate forensic investigation in social networking applications. The MCFF comprises of two components such as the forensic logging module and the forensic investigation process. The forensic logging module is a readiness component that is installed both the device and on the cloud. The ClouDroid Inspector (CDI) tool uses of the record traced by forensic logging module and conduct the investigation in both the mobile and the cloud. The MCFF identifies and collects the automated synchronized copies of data on both the mobile and cloud environment to prove and establish the use of cloud service via Smartphones.
Authors and Affiliations
Muhammad Faheem, Dr Tahar Kechadi, Dr An Khac
Towards Securing Medical Documents from Insider Attacks
Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the...
Gamified Incentives: A Badge Recommendation Model to Improve User Engagement in Social Networking Websites
The online social communities employ several techniques to attract more users to their services. One of the essential demand of these communities is to find efficient ways to attract more users and improve their engageme...
Image Processing based Task Allocation for Autonomous Multi Rotor Unmanned Aerial Vehicles
Nowadays studies based on unmanned aerial vehicles draws attention. Especially image processing based tasks are quite important. In this study, several tasks were performed based on the autonomous flight, image processin...
Hyperspectral Image Classification using Support Vector Machine with Guided Image Filter
Hyperspectral images are used to identify and detect the objects on the earth’s surface. Classifying of these hyperspectral images is becoming a difficult task, due to more number of spectral bands. These high dimensiona...
Experimental Analysis of Color Image Scrambling in the Spatial Domain and Transform Domain
This paper proposes two image-scrambling algorithms based on self-generated keys. First color image scrambling method works in the spatial domain, and second, works in the transform domain. The proposed methods cull the...