A Unified Forensic Framework for Data Identification and Collection in Mobile Cloud Social Network Applications
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
Mobile Cloud Computing (MCC) is the emerging and well accepted concept that significantly removes the constraints of mobile devices in terms of storage and computing capabilities and improves productivity, enhances performance, saves energy, and elevates user experience. The consolidation of cloud computing, wireless communication infrastructure, portable computing devices, location- based services, and mobile web has led to the inauguration of novel computing model. The Mobile social networks and cloud computing technology have gained rapid and intensive attention in recent years because of its numerous available benefits. Despite being an advanced technology to communicate and socialize with friends, the diverse and anonymous nature of mobile cloud social networking applications makes them very vulnerable to crimes and illegal activities. On considering the point of mobile cloud computing benefits, the forensic assistance based mobile cloud computing could offer a solution to the problem of social networking applications. Therefore, this work proposes a Mobile Cloud Forensic Framework (MCFF) to facilitate forensic investigation in social networking applications. The MCFF comprises of two components such as the forensic logging module and the forensic investigation process. The forensic logging module is a readiness component that is installed both the device and on the cloud. The ClouDroid Inspector (CDI) tool uses of the record traced by forensic logging module and conduct the investigation in both the mobile and the cloud. The MCFF identifies and collects the automated synchronized copies of data on both the mobile and cloud environment to prove and establish the use of cloud service via Smartphones.
Authors and Affiliations
Muhammad Faheem, Dr Tahar Kechadi, Dr An Khac
A Mobile Robot Teleoperation System with a Wireless Communication Infrastructure using a Leaky Coaxial Cable based on TCP/IP
In this study, we propose and develop a wireless teleoperation system for mobile robots using a leaky coaxial cable (LCX) with a wireless communication infrastructure. In closed spaces resulting from disasters, some prob...
Communication in Veil: Enhanced Paradigm for ASCII Text Files
Digitization has a persuasive impact on information and communication technology (ICT) field which can be realized from the fact that today one seldom think to stand in long awaiting queue just to deposit utility bills,...
Time-Dependence in Multi-Agent MDP Applied to Gate Assignment Problem
Many disturbances can impact gate assignments in daily operations of an airport. Gate Assignment Problem (GAP) is the main task of an airport to ensure smooth flight-to-Gate assignment managing all disturbances. Or, flig...
Semantic E-Learn Services and Intelligent Systems using Web Ontology
Present vision for the web is the semantic web in which information is given explicit meaning, making it easier for machines to automatically process and integrate information available on the web. It provides the inform...
Biometrics Recognition based on Image Local Features Ordinal Encoding
In the present informational era, with the continue extension of embedded computing systems, the demand of faster and robust image descriptors is an important issue. However, image representation and recognition is an op...