Mobile Device Forensics: Extracting Data from Unallocated Space

Authors

  • Goka Madhuri  M.Tech Second Year, Department of IT & Telecommunication, Raksha Shakti University, Ahmedabad, Gujarat, India
  • Dr. Ravi K Sheth  Asst. Professor, Department of IT & Telecommunication, Raksha Shakti University, Ahmedabad, Gujarat, India

Keywords:

Android Mobiles, Extracting Data, Unallocated Space, Autopsy, Santoku.

Abstract

The number of smartphone users are increasing day by day and majority of people rely on it for communication and business related matters With ease of smartphones and internet, which creates opportunity for the cyber criminals to commit such cybercrimes by utilizing smartphones. Therefore, The mobility and flexibility of smartphones leverages accessibility of user to store their personal and confidential information. However, investigators may face problems in extracting crucial information and the vital data stored in the smartphone. The aim of this work is to explain how to extract the data from an unallocated space in android mobiles using tools like autopsy,santoku , Encase.

References

  1. Normaziah A. Aziz, Fakhrulrazi Mokti, Mohd Nadhar M. Nozri Extracting and Analysing
  2. Data from an Android-based Smartphone, 2015 Fourth International Conference on Cyber Security, Cyber Warfare and Digital Forensic.
  3. Chen Haiping, Luo Delin, Gao Qinquan, IE Internet Information Forensics Technology in Unallocated Disk Space, in IEEE conference in 2010
  4. Mubarak Al-Hadadi and Ali Al-Shidhani, Smartphone Forensics Analysis: A case study, International Journal of Computer and Electrical Engineering, Vol. 5, No. 6, December 2013.
  5. Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou and Dimitris Gritzalis, "Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition.", a chapter in Information Security and Privacy Research, Vol 376, pp 249-260, Springer Berlin Heidelberg, 2012.
  6. Jeff Lessard, Gary C. Kessler, "Android Forensics: Simplifying Cell Phone Examinations", Scale Digital Evidence Forensics Journal Vol.4, September 2010
  7. Muhammad Faheem, N-A. Le-Khac, Tahar Kechadi, "Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool", Journal of Information Security, 2014.
  8. The Sleuth Kit, Retrieved on 5 March 2015 from http://www.sleuthkit.org/sleuthkit/
  9. The Statistics Portal Website, Retrieve on 4 May 2015 from http://www.statista.com
  10. Jackson, W., Can digital forensics keep up with Smartphone Tech Retrieved on 2 April from http://gcn.com/Articles/2014/06/16/forensics-technologyrace.aspx?Page=2
  11. Networkworld.com, 2015 "Getting Forensics data off Smartphones and Tablets can be Tough" http://www.networkworld.com/article/2160656/smartphones/gettingforensics-data-off-smartphones--tablets-can-be-tough--experts-say.html Retrieve 12 March 2015
  12. https://www.sleuthkit.org/autopsy/v2/https://digital-forensics.sans.org/blog/2009/05/11/a-step-by-step-introduction-to-using-the-autopsy-forensic-browser

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Goka Madhuri, Dr. Ravi K Sheth, " Mobile Device Forensics: Extracting Data from Unallocated Space, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1046-1049, November-December-2017.