A Framework for IoT Data Acquisition and Forensics Analysis

被引:0
作者
Chi, Hongmei [1 ]
Aderibigbe, Temilola [1 ]
Granville, Bobby C. [1 ]
机构
[1] Florida A&M Univ, Dept Comp & Info Sci, Tallahassee, FL 32307 USA
来源
2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA) | 2018年
关键词
admissibility; Data Acquisition; IoT Devices; Andrioid; Timeline analysis;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A framework for IOT data acquisition and analysis is proposed. This framework can help data collection from a variety of different IoT devices. More precisely, our objective is to construct a practical methodology to facilitate forensic collection of forensic data from a multitude of IoT devices and related sites, such as smart phone, hubs, and cloud. Then we will use timeline analysis to present all related data in digital admissibility. In this paper, we will be focusing on building a framework of data acquisitions and forensic analysis for IoT devices being connected to mobile device and cloud.
引用
收藏
页码:5142 / 5146
页数:5
相关论文
共 7 条
[1]   FACE: Automated digital evidence discovery and correlation [J].
Case, Andrew ;
Cristina, Andrew ;
Marziale, Lodovico ;
Richard, Golden G. ;
Roussev, Vassil .
DIGITAL INVESTIGATION, 2008, 5 :S65-S75
[2]   Digital forensic approaches for Amazon Alexa ecosystem [J].
Chung, Hyunji ;
Park, Jungheum ;
Lee, Sangjin .
DIGITAL INVESTIGATION, 2017, 22 :S15-S25
[3]   Digital forensic investigation of cloud storage services [J].
Chung, Hyunji ;
Park, Jungheum ;
Lee, Sangjin ;
Kang, Cheulhoon .
DIGITAL INVESTIGATION, 2012, 9 (02) :81-95
[4]  
Columbus L., 2017, Forbes
[5]   Digital forensics research: The next 10 years [J].
Garfinkel, Simson L. .
DIGITAL INVESTIGATION, 2010, 7 :S64-S73
[6]  
Oren Y, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P353
[7]   The Forensics Edge Management System: A Concept and Design [J].
Oriwoh, Edewede ;
Sant, Paul .
2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, :544-550