Abstract

Advances in smartphone technology coupled with the widespread use of smartphones in daily activities create large quantities of smartphone data. This data becomes increasingly important when smartphones are linked to civil or criminal investigations. As with all forms of digital data, smartphone data is susceptible to intentional or accidental alterations by users or installed applications. It is, therefore, essential to establish the authenticity of smartphone data before submitting it as evidence. Previous research has formulated a smartphone data evaluation model, which provides a methodical approach for evaluating the authenticity of smartphone data. However, the smartphone data evaluation model only stipulates how to evaluate smartphone data without providing a formal outcome about the authenticity of the data.

Highlights

  • The competitive nature of the global smartphone market [4] stimulates continuous advancements in smartphone technology

  • The authenticity of smartphone data is of great importance to ensuring that digital forensic professionals draw correct and accurate conclusions based on the data

  • The results enable a digital forensic professional to make informed decisions pertaining to the evaluated smartphone data

Read more

Summary

Introduction

The competitive nature of the global smartphone market [4] stimulates continuous advancements in smartphone technology. While several studies have successfully demonstrated the manipulation, fabrication and alteration of smartphone data [11, 14], unknown or unexpected changes to smartphone data that go undetected can lead to erroneous conclusions in investigations It is essential for digital forensic professionals to establish the authenticity of smartphone data before formulating any conclusions [15]. Pieterse et al [13] formally defined the term “authenticity” with regard to smartphone data and used the definition to articulate several requirements for evaluating the authenticity of the data. The first value corresponds to a grade of authenticity while the second value describes the completeness of the evaluation This classification enables digital forensic professionals to present the authenticity of evaluated smartphone data with confidence. Experiments involving the manipulation of iPhone 7 data confirm the effectiveness of the classification model in assessing the authenticity of smartphone data

Background
Authentic Smartphone Data
Requirements for Authentic Data
Smartphone Data Evaluation Model
Classification Model
Categorization of the Requirements
Authenticity Score
Authenticity Grading Scale
Completeness
Authenticity Classification
Authenticity Classification Tool
Tool Description
Experimental Results
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.