Premium
Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case study
Author(s) -
Cahyani Niken Dwi Wahyu,
Martini Ben,
Choo KimKwang Raymond,
AlAzhar AKBP Muhammad Nuh
Publication year - 2016
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.3855
Subject(s) - data acquisition , cloud computing , reset (finance) , computer science , mobile device , phone , mobile phone , process (computing) , computer security , lock (firearm) , event (particle physics) , world wide web , engineering , telecommunications , operating system , mechanical engineering , linguistics , philosophy , physics , quantum mechanics , financial economics , economics
Summary The continued amalgamation of cloud technologies into all aspects of our daily lives and the technologies we use (i.e. cloud‐of‐things) creates business opportunities, security and privacy risks, and investigative challenges (in the event of a cybersecurity incident). This study examines the extent to which data acquisition from Windows phone, a common cloud‐of‐thing device, is supported by three popular mobile forensics tools. The effect of device settings modification (i.e. enabling screen lock and device reset operations) and alternative acquisition processes (i.e. individual and combined acquisition) on the extraction results are also examined. Our results show that current mobile forensic tool support for Windows Phone 8 remains limited. The results also showed that logical acquisition support was more complete in comparison to physical acquisition support. In one example, the tool was able to complete a physical acquisition of a Nokia Lumia 625, but its deleted contacts and SMSs could not be recovered/extracted. In addition we found that separate acquisition is needed for device removable media to maximize acquisition results, particularly when trying to recover deleted data. Furthermore, enabling flight‐mode and disabling location services are highly recommended to eliminate the potential for data alteration during the acquisition process. These results should provide practitioners with an overview of the current capability of mobile forensic tools and the challenges in successfully extracting evidence from the Windows phone platform. Copyright © 2016 John Wiley & Sons, Ltd.