Mobile Cloud Computing: implications to smartphone forensic procedures and methodologies

The Smartphone is a powerful miniature computer that has phone capabilities and has been sold globally to billions of people, because of its flexibility for work and entertainment. Third party applications are the reason why the Smartphone is so popular, and Cloud computing is the driving force for the growth of these applications. The combination of Smartphone and Cloud computing technology has also led to many predictions. The forecast of Allied Business Intelligence (ABI) is that by 2014 mobile Cloud computing will become the leading mobile application development and deployment strategy (ABI, 2009). Gartner (2010) predicts that 90% of companies will support corporate applications on personal mobile devices by 2014. Gartner (2010) also predicts a huge increase in both mobile and Cloud computing, with an expected US$6.2 billion to be spent on mobile applications and US$68.3 billion on Cloud Computing services. However, it must also be remembered that, “the more popular the technology, the more opportunity exists for its misuse” (Turnbull & Slay, 2008, p.1355). Motivated by potential financial gain, Smartphone viruses have already been implemented through the utilization of Cloud computing technology to cause huge global economic damage. There is a growing understanding of how to conduct digital forensic analysis on mobile devices. However, there is little understanding of how to apply digital forensic methodologies in Cloud computing, and even less understanding in how to apply forensic methodologies in mobile Cloud investigation. The aim of this thesis is to identify the impact of Cloud computing on Smartphone forensics and to test current mobile forensic tools, methodologies and procedures in different mobile Cloud forensic scenarios. Furthermore, the aim of this thesis is to provide recommendations in conducting forensic investigation in mobile Cloud computing. Future research direction within this research topic area will also be identified.

[1]  Qian Wang,et al.  SOA's Last Mile-Connecting Smartphones to the Service Cloud , 2009, 2009 IEEE International Conference on Cloud Computing.

[2]  Wayne Jansen,et al.  Guidelines on Cell Phone Forensics , 2007 .

[3]  Anna Lysyanskaya,et al.  Pay as you go , 1980, Nature.

[4]  Xie Jian,et al.  An Optimized Solution for Mobile Environment Using Mobile Cloud Computing , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[5]  Brenda M. Williamson,et al.  Forensics analysis of the contents of Nokia mobile phones , 2006 .

[6]  Denis Reilly,et al.  Cloud Computing: Pros and Cons for Computer Forensic Investigations , 2011 .

[7]  Andrea Gregg,et al.  Learning From Doing: Lessons Learned From Designing and Developing an Educational Software Within a Heterogeneous Group , 2021, Int. J. Web Based Learn. Teach. Technol..

[8]  Rodney McKemmish,et al.  What is forensic computing , 1999 .

[9]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[10]  Stephen Kemmis,et al.  Action Research in Retrospect and Prospect. , 1980 .

[11]  Maurizio Rossi,et al.  Internal forensic acquisition for mobile equipments , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[12]  Upkar Varshney,et al.  Issues in Emerging 4G Wireless Networks , 2001, Computer.

[13]  Gary C. Kessler,et al.  Android forensics: Simplifying cell phone examinations , 2010 .

[14]  Daryl Johnson,et al.  Third Party Application Forensics on Apple Mobile Devices , 2011, 2011 44th Hawaii International Conference on System Sciences.

[15]  Gustavo Alonso,et al.  Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications , 2009, Middleware.

[16]  Hans D. Schotten,et al.  Access Schemes for Mobile Cloud Computing , 2010, 2010 Eleventh International Conference on Mobile Data Management.

[17]  Jill Slay,et al.  Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[18]  Xinwen Zhang,et al.  Securing elastic applications on mobile devices for cloud computing , 2009, CCSW '09.

[19]  Amjad Zareen,et al.  Notice of Violation of IEEE Publication PrinciplesMobile Phone Forensics: Challenges, Analysis and Tools Classification , 2010, 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[20]  David Kember Action learning and action research , 2000 .

[21]  Marios D. Dikaiakos,et al.  Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.

[22]  Bernd Grobauer,et al.  Towards incident handling in the cloud: challenges and approaches , 2010, CCSW '10.

[23]  Roy H. Campbell,et al.  Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware , 2007 .

[24]  Stephen D. Wolthusen,et al.  Overcast: Forensic Discovery in Cloud Environments , 2009, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics.

[25]  Bruria Haberman,et al.  Research methods in computing: what are they, and how should we teach them? , 2006, ACM SIGCSE Bull..

[26]  Ray Hunt,et al.  Forensic information acquisition in mobile networks , 2009, 2009 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.

[27]  Marjie T. Britz Computer Forensics and Cyber Crime: An Introduction , 2003 .

[28]  Ashish Kumar Saxena,et al.  Mobile forensics: Guidelines and challenges in data preservation and acquisition , 2009, 2009 IEEE Student Conference on Research and Development (SCOReD).

[29]  Stephen Biggs,et al.  Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[30]  N. Sandlin PAY AS YOU GO , 1989 .

[31]  Sean Morrissey,et al.  iOS Forensic Analysis: for iPhone, iPad, and iPod touch , 2010 .

[32]  P. Sasikala,et al.  Architectural Strategies for Green Cloud Computing: Environments, Infrastructure and Resources , 2011, Int. J. Cloud Appl. Comput..

[33]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[34]  Verna J. Willis Action Learning and Action Research , 2010 .

[35]  Ludwig Slusky,et al.  Cloud computing and computer forensics for business applications , 2009 .

[36]  J. Creswell Qualitative inquiry and research design: choosing among five traditions. , 1998 .

[37]  R. O'Brien An Overview of the Methodological Approach of Action Research , 2008 .