Skip to main content

Using Graph Database for Evidence Correlation on Android Smartphones

  • Conference paper
  • First Online:
Future Data and Security Engineering (FDSE 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10018))

Included in the following conference series:

  • 1375 Accesses

Abstract

Nowadays, the smartphone has became the popular communication devices in everyday life. It is a main tool to facilitate the communication among people. Besides that, smartphone also save a persons activities which include many privacy information such as address book, sms messages, pictures, video, call logs, location logs, web browsing history, emails, and so much more. These documents represent the information about actions, activities or personal activities, and if there is enough lawful proof that person is guilty, that can be valuable as digital evidence in court. Therefore, mobile phone is also an important channel and analysis tool, investigate about content, data corellation which is saved in the smartphone is a valuable tool for investigator to obtain evidence from them. This paper presents the methods and technologies are used to obtain evidence from Android Smartphones. In addition, we are also point out the difficulties in both legal and technical aspects of the digital evidence obtaining from these kind of smartphones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Angles, R., Gutierrez, C.: Survey of graph database models. ACM Comput. Surv. (CSUR) 40(1), 11–139 (2008)

    Article  Google Scholar 

  2. Barmpatsalou, K., Damopoulos, D., Kambourakis, G., Katos, V.: A critical review of 7 years of mobile device forensics. Digit. Investig. 10(4), 323–349 (2013)

    Article  Google Scholar 

  3. Brunty, J.: Mobile device forensics: threats, challenges, and future trends. In: Sammons, J. (ed.) Digital Forensics, pp. 69–84. Syngress, Burlington (2016). Chapter 5

    Chapter  Google Scholar 

  4. Celko, J.: Graph databases. In: Celko, J. (ed.) Joe Celkos Complete Guide to NoSQL, pp. 27–46. Morgan Kaufmann, Burlington (2014). Chapter 3

    Chapter  Google Scholar 

  5. Harichandran, V.S., Breitinger, F., Baggili, I., Marrington, A.: A cyber forensics needs analysis survey: revisiting the domain’s needs a decade later. Comput. Secur. 57, 1–13 (2016)

    Article  Google Scholar 

  6. Hoog, A.: Android Forensics: Investigation, Analysis and Mobile Security for Google Android, 1st edn. Syngress Publishing, Burlington (2011)

    Google Scholar 

  7. Hoog, A., Strzempka, K.: iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices, 1st edn. Syngress Publishing, Burlington (2011)

    Google Scholar 

  8. Mutawa, N.A., Baggili, I., Marrington, A.: Forensic analysis of social networking applications on mobile devices. Digit. Investig. 9(Suppl.), S24–S33 (2012). The Proceedings of the Twelfth Annual DFRWS Conference and 12th Annual Digital Forensics Research Conference

    Article  Google Scholar 

  9. Schiebeck, S., Latzenhofer, M., Palensky, B., Schauer, S., Quirchmayr, G., Benesch,T., Göllner, J., Meurers, C., Mayr, I.: Implementation of a generic ICT risk model using graph databases. In: Proceedings of the Ninth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) 2015, pp. 146–153, August 2015

    Google Scholar 

  10. Thing, V.L.L., Ng, K.Y., Chang, E.C.: Live memory forensics of mobile phones. Digit. Investig. 7, S74–S82 (2010)

    Article  Google Scholar 

  11. Xu, N., Jia, W., Luo, Y., Zhang, F., Xuan, D., Teng, J.: An opened eye on you. IEEE Veh. Technol. Mag. 6(4), 49–59 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tuan A. Nguyen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Dang, MT., Nguyen, T.A. (2016). Using Graph Database for Evidence Correlation on Android Smartphones. In: Dang, T., Wagner, R., KĂĽng, J., Thoai, N., Takizawa, M., Neuhold, E. (eds) Future Data and Security Engineering. FDSE 2016. Lecture Notes in Computer Science(), vol 10018. Springer, Cham. https://doi.org/10.1007/978-3-319-48057-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48057-2_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48056-5

  • Online ISBN: 978-3-319-48057-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics