Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

An Overview of Cloud Base Application Forensics Tools for Mobile Devices

Muhammad Faheem, Tahar Kechadi, Nhien An Le Khac Published in Security

International Journal of Applied Information Systems
Year of Publication: 2014
© 2013 by IJAIS Journal
Download full text
  1. Muhammad Faheem, Tahar Kechadi and Nhien An Le Khac. Article: An Overview of Cloud Base Application Forensics Tools for Mobile Devices. International Journal of Applied Information Systems 7(10):7-10, October 2014. BibTeX

    	author = "Muhammad Faheem and Tahar Kechadi and Nhien An Le Khac",
    	title = "Article: An Overview of Cloud Base Application Forensics Tools for Mobile Devices",
    	journal = "International Journal of Applied Information Systems",
    	year = 2014,
    	volume = 7,
    	number = 10,
    	pages = "7-10",
    	month = "October",
    	note = "Published by Foundation of Computer Science, New York, USA"


With the increased use of mobile devices, the respective data is stored and maintained over the remote clouds. In case of any data crimes at the cloud, the existing forensic tools are not capable of data recovery and thus lot of research was being proposed at this level. A detailed review of the existing forensic tools used for the digital and mobile analysis will be reviewed and the respective literature gaps with respective to cloud forensic will be evaluated. Literature gaps with respective current digital and mobile forensics tools against required data acquisition, investigation, preservation, examination and analysis are identified. With the increased usage of mobile apps like Facebook, Google plus and Viber, data of the users is stored across the remote clouds. The main challenge for the mobile forensics tools in this context is that to acquire the remotely located data of mobile locations. Based on the research gaps identified the actual methodology of the research is proposed, where a new approach will be proposed against the mobile forensics which can integrate with the existing tools, that can acquire and analyse the remote data storage from the clouds.


  1. Vidalis, S. , 2009. Cloud Computing: The Impact on Digital Forensic Investigations. International Conference for Internet Technology and Secured Transactions, 3(1), pp. 16–23.
  2. Crosbie, M. , 2011. Cloud Forensics. Advances in Digital Forensics VII, 12(3), pp. 35–46.
  3. Hegarty, R. , 2010. Digital Evidence in Cloud Computing Systems. Computer Law & Security Review, 26(3), pp. 12–18.
  4. Vidalis, S. , 2010. Cloud Computing Storms. International Journal of Intelligent Computing Research, 1(1), pp. 63–72.
  5. Glisson,T. 2012. Calm before the Storm: The Challenges of Cloud Computing in Digital Forensics. International Journal of Digital Crime and Forensics, 4(2), pp. 28–48.
  6. Reilly, D. , 2010. Cloud Computing: Forensic Challenges for Law Enforcement. International Conference for Internet Technology and Secured Transactions (ICITST), 13(2), pp. 1 1–17.
  7. Dykstra, J. , 2012. Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing: Exploring and Evaluating Tools, Trust, and Techniques. Digital Forensic Research Workshop (DFRWS), 43(12), pp. 12–19.
  8. Delport, W. , 2011. Isolating a Cloud Instance for a Digital Forensic Investigation. Information Security for South Africa, 4(2), pp. 16–23.
  9. Glisson, T. , 2011. A Comparison of Forensic Evidence Recovery Techniques for a Windows Mobile Smart Phone. Digital Investigation, 8(1), pp. 23–36
  10. Mayall, G. , 2011. Electronic Retention: What Does Your Mobile Phone Reveal About You? International Journal of Information Security, 10(6), pp. 37–49.
  11. Johnson, D. , 2011. Third Party Application Forensics on Apple Mobile Devices. System Sciences (HICSS), 2011 44th Hawaii International Conference on, 14(5), pp. 11–12.
  12. Hoog, A. , 2012. Iphone and Ios Forensics - Investigation, Analysis and Mobile Security for Apple Iphone, Ipad and Ios Devices. Syngress, 1(1), pp. 10–12.
  13. Richard, B. , 2010. Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery? The Journal of Digital Forensics Security and Law, 5(3), pp. 13–29.
  14. Breeuwsma, M. , 2013. Forensic Imaging of Embedded Systems using JTAG (boundary-scan). Digital Investigation, 3(1), pp. 32–42
  15. Mislan, R. , 2009. Hashing Techniques for Mobile Device Forensics. Small Scale Digital Device Forensics Journal, 12(2), pp. 19–24.
  16. Dankar, S. , 2009. Hashing Techniques for Mobile Device Forensics. Small Scale Digital Device Forensics Journal, 32(12), pp. 18–24
  17. Mellars, B. , 2004. Forensic Examination of Mobile devices. Digital Investigation, 1(4), pp. 66–72.
  18. Reiber,L. 2008. SIMs and Salsa, MFI Forum, Mobile Forensics, 13(2), pp. 15-20
  19. Willassen, S. , 2005. Forensic Analysis of Mobile Phone Internal Memory. IFIP WG 11. 9 International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, February 13-16, 2005, in Advances in Digital Forensics, 194(14), pp. 19–23.
  20. Distefano, A. 2008. An Overall Assessment of Mobile Internal Acquisition Tool. Digital Investigation, 5(1), pp. 12–27.
  21. Mutawa, N. L. , Baggili, I. and Marrington, A. (2012) 'Forensic analysis of social networking applications on mobile devices', Digital investigation, 9, pp. 524-533


Cloud forensics, Mobile cloud forensic applications, and Cloud forensics tools