A Unified Forensic Framework for Data Identification and Collection in Mobile Cloud Social Network Applications
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 1
Abstract
Mobile Cloud Computing (MCC) is the emerging and well accepted concept that significantly removes the constraints of mobile devices in terms of storage and computing capabilities and improves productivity, enhances performance, saves energy, and elevates user experience. The consolidation of cloud computing, wireless communication infrastructure, portable computing devices, location- based services, and mobile web has led to the inauguration of novel computing model. The Mobile social networks and cloud computing technology have gained rapid and intensive attention in recent years because of its numerous available benefits. Despite being an advanced technology to communicate and socialize with friends, the diverse and anonymous nature of mobile cloud social networking applications makes them very vulnerable to crimes and illegal activities. On considering the point of mobile cloud computing benefits, the forensic assistance based mobile cloud computing could offer a solution to the problem of social networking applications. Therefore, this work proposes a Mobile Cloud Forensic Framework (MCFF) to facilitate forensic investigation in social networking applications. The MCFF comprises of two components such as the forensic logging module and the forensic investigation process. The forensic logging module is a readiness component that is installed both the device and on the cloud. The ClouDroid Inspector (CDI) tool uses of the record traced by forensic logging module and conduct the investigation in both the mobile and the cloud. The MCFF identifies and collects the automated synchronized copies of data on both the mobile and cloud environment to prove and establish the use of cloud service via Smartphones.
Authors and Affiliations
Muhammad Faheem, Dr Tahar Kechadi, Dr An Khac
A Framework for Hoax News Detection and Analyzer used Rule-based Methods
Currently, the era where social media can present various facilities can answer the needs of the community for information and utilization for socio-economic interests. But the other impact of the presence of social medi...
Efficient Node Monitoring Mechanism in WSN using Contikimac Protocol
Wireless Sensor Network is monitored with ContikiMAC Cooja flavor to diagnose the energy utilization ratio by nodes and the fault detection process in distributed approach; adopted the Low power Listening (LPL) mechanism...
HOG-AdaBoost Implementation for Human Detection Employing FPGA ALTERA DE2-115
Human detection system using Histogram of Oriented Gradients (HOG) feature and AdaBoost classifier (HOG-AdaBoost) in FPGA ALTERA DE2-115 are presented in this paper. This work is expanded version from our previous study....
A Novel Hybrid Quicksort Algorithm Vectorized using AVX-512 on Intel Skylake
The modern CPU’s design, which is composed of hierarchical memory and SIMD/vectorization capability, governs the potential for algorithms to be transformed into efficient implementations. The release of the AVX-512 chang...
Comparative Study from Several Business Cases and Methodologies for ICT Project Evaluation
Achieving high competitive advantage through Information and Communication Technologies (ICT) has never been easy without proper management and appropriate utilization of ICT resources. Therefore, the statistics suggeste...