Forensic Analysis of Health and Fitness Applications on Android
Abstract
The field of computer forensics focuses on retrieving, analyzing, and presenting computer-based data to be used as evidence in legal proceedings. With the proliferation of digital evidence in civil litigation, legal systems worldwide have adapted to accommodate these new forms of evidence. This research delves into the forensic analysis of health and fitness applications on Android devices, which are now critical targets for forensic investigations due to the sensitive data they store, such as contacts, messages, images, and location information. Given the widespread use of over 250,000 health and fitness applications, there is an urgent need to evaluate their security and privacy measures. The objective of this study is to identify the potential forensic artifacts available within these applications and assess their implications for user privacy and security. By employing rigorous forensic methodologies, we analyze various popular health and fitness apps to understand how securely they store user data and how this data can be extracted and utilized in forensic investigations. Our findings highlight the importance of choosing secure applications that protect user privacy, a crucial consideration for users and developers alike.
References
- Akarawita, I. U., Perera, A. B., & Atukorale, A. (2016). ANDROPHSY - Forensic framework for Android. 15th International Conference on Advances in ICT for Emerging Regions, ICTer 2015 - Conference Proceedings, 250–258. https://doi.org/10.1109/ICTER.2015.7377696
- Al-Saleh, M. I., & Forihat, Y. A. (2013). Skype Forensics in Android Devices. International Journal of Computer Applications, 78(7), 975–8887. www.android.com
- Alyahya, T., & Kausar, F. (2017). Snapchat Analysis to Discover Digital Forensic Artifacts on Android Smartphone. Procedia Computer Science, 109, 1035–1040. https://doi.org/10.1016/J.PROCS.2017.05.421
- Anobah, M., Saleem, S., & Popov, O. (2014). Testing Framework for Mobile Device Forensics Tools. Journal of Digital Forensics, Security and Law, 9(2), 18. https://doi.org/https://doi.org/10.15394/jdfsl.2014.1183
- Ayers, R., Brothers, S., & Jansen, W. (2014). Guidelines on mobile device forensics. National Institute of Standards and Technology . https://doi.org/10.6028/NIST.SP.800-101R1
- Best practices for search and seizure of electronic and digital evidence GUIDELINES FOR DIGITAL FORENSICS FIRST RESPONDERS. (2021).
- Boueiz, M. R. (2020). Importance of rooting in an Android data acquisition. 8th International Symposium on Digital Forensics and Security, ISDFS 2020. https://doi.org/10.1109/ISDFS49300.2020.9116445
- Chang, M. S., & Yen, C. P. (2019). Forensic Analysis of Social Networks Based on Instagram. International Journal of Network Security, 21(5), 850. https://doi.org/10.6633/IJNS.201909
- Dimitriadis, A., Ivezic, N., Kulvatunyou, B., & Mavridis, I. (2020). D4I-Digital forensics framework for reviewing and investigating cyber attacks. https://doi.org/10.1016/j.array.2019.100015
- Dogan, S., & Akbal, E. (2017). Analysis of mobile phones in digital forensics. 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2017 - Proceedings, 1241–1244. https://doi.org/10.23919/MIPRO.2017.7973613
- Easttom, C. (2019). System Forensics, Investigation, and Response.
- Gilbert, A., Seigfried-Spellar, K. C., & Seigfried-Spellar, K. (2022). Forensic Discoverability of iOS Vault Applications. Journal of Digital Forensics, Security and Law, 17(1), 1. https://doi.org/https://doi.org/10.15394/jdfsl.2022.1773
- Guo, W., Wu, S., & Wang, D. (2017). A forensics method for android devices based on the technique of temporary root. ICCSE 2017 - 12th International Conference on Computer Science and Education, 502–505. https://doi.org/10.1109/ICCSE.2017.8085543
- Hussain, W., Punja, S. G., & Mislan, R. P. (2008). Mobile Device Analysis. SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, 2(1). http://www.numberingplans.com/?page=analysis
- Jasmin Cosic ; Miroslav Baca. (2010, June). Do we have full control over integrity in digital evidence life cycle? | IEEE Conference Publication | IEEE Xplore. Proceedings of the ITI 2010, 32nd International Conference on Information Technology Interfaces. http://0y10egqdk.y.https.ieeexplore.ieee.org.seu.proxy.deepknowledge.io/document/5546413/citations?tabFilter=papers#citations
- Lewis, J. A., Zheng, D. E., & Carter, W. A. (2017). The Effect of Encryption on Lawful Access to Communications and Data. www.rowman.com
- Montasari, R., Hill, R., Carpenter, V., & Hosseinian-Far, A. (2019). The standardised digital forensic investigation process model (SDFIPM). Advanced Sciences and Technologies for Security Applications, 169–209. https://doi.org/10.1007/978-3-030-11289-9_8
- Ogazi-Onyemaechi, B. C., Dehghantanha, A., & Choo, K. K. R. (2017). Performance of Android Forensics Data Recovery Tools. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 91–110. https://doi.org/10.1016/B978-0-12-805303-4.00007-1
- Padmanabhan, R., Lobo, K., Ghelani, M., Sujan, D., & Shirole, M. (2017). Comparative analysis of commercial and open source mobile device forensic tools. 2016 9th International Conference on Contemporary Computing, IC3 2016. https://doi.org/10.1109/IC3.2016.7880238
- Popescu, A. C., & Farid, H. (2004). Statistical Tools for Digital Forensics. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3200, 128–147. https://doi.org/10.1007/978-3-540-30114-1_10
- Quality of Life - Vision 2030. (n.d.). Retrieved March 23, 2022, from https://www.vision2030.gov.sa/v2030/vrps/qol/
- Shortall, A., & Azhar, M. A. H. bin. (2016). Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms. Proceedings - 2015 6th International Conference on Emerging Security Technologies, EST 2015, 13–17. https://doi.org/10.1109/EST.2015.16
- Skulkin, Oleg., Tindall, Donnie., & Tamma, Rohit. (2018). Learning Android Forensics Analyze Android Devices with the Latest Forensic Tools and Techniques, 2nd Edition. https://learning.oreilly.com/library/view/learning-android-forensics/9781789131017/
- Son, N., Lee, Y., Kim, D., James, J. I., Lee, S., & Lee, K. (2013). A study of user data integrity during acquisition of Android devices. Digital Investigation, 10, S3–S11. https://doi.org/10.1016/J.DIIN.2013.06.001
- statcounter. (2022). Mobile Operating System Market Share Worldwide | Statcounter Global Stats. https://gs.statcounter.com/os-market-share/mobile/worldwide
- Tzanou, M. (2020). Health data privacy under the GDPR : big data challenges and regulatory responses. https://www.routledge.com/Health-Data-Privacy-under-the-GDPR-Big-Data-Challenges-and-Regulatory-Responses/Tzanou/p/book/9780367077143
- Wilson, R., & Chi, H. (2018). A Framework for Validating Aimed Mobile Digital Forensics Evidences. https://doi.org/10.1145/3190645.3190695
Downloads
Similar Articles
- Nabih Abdelmajid, The Necessity of Cybersecurity for Community Safety The Proposal of the Safe Family Program for Educating the Gulf Arab Community on Information Security for Both Students and Parents , International Journal of Information & Digital Security: Vol. 1 No. 1 (2023): International Journal of Information & Digital Security
- Firas Habbal, Impact of Information Security on National Digital Investment , International Journal of Information & Digital Security: Vol. 1 No. 1 (2023): International Journal of Information & Digital Security
- Saad M. Almalki, Nabih T. Abdelmajeed, A NEW INTELLIGENT MODEL FOR PHISHING WEB SITES DETECTION , International Journal of Information & Digital Security: Vol. 1 No. 1 (2023): International Journal of Information & Digital Security
- Driss Abbadi, Morocco's cybersecurity strategy between challenges and aspirations , International Journal of Information & Digital Security: Vol. 2 No. 1 (2024): International Journal of Information & Digital Security
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Hicham Ismaili , تنظيم المنصات الرقمية: دراسة مقارنة , International Journal of Information & Digital Security: Vol. 2 No. 1 (2024): International Journal of Information & Digital Security
- Driss Abbadi, Morocco's cybersecurity strategy between challenges and aspirations , International Journal of Information & Digital Security: Vol. 2 No. 1 (2024): International Journal of Information & Digital Security
- Nabih Abdelmajid, The Necessity of Cybersecurity for Community Safety The Proposal of the Safe Family Program for Educating the Gulf Arab Community on Information Security for Both Students and Parents , International Journal of Information & Digital Security: Vol. 1 No. 1 (2023): International Journal of Information & Digital Security
- Fayrouz Attia, أمن العمالة التونسية في ظل مخاطر التكنولوجيا الحديثة , International Journal of Information & Digital Security: Vol. 2 No. 1 (2024): International Journal of Information & Digital Security
- Nasser Jarallah Al-Ghamdi, Dr. Mousa Al-Akhras, Dr. Fuad Alhosban, Forensic Analysis of Health and Fitness Applications on Android , International Journal of Information & Digital Security: Vol. 2 No. 1 (2024): International Journal of Information & Digital Security
- Saad M. Almalki, Nabih T. Abdelmajeed, A NEW INTELLIGENT MODEL FOR PHISHING WEB SITES DETECTION , International Journal of Information & Digital Security: Vol. 1 No. 1 (2023): International Journal of Information & Digital Security
- Firas Habbal, Impact of Information Security on National Digital Investment , International Journal of Information & Digital Security: Vol. 1 No. 1 (2023): International Journal of Information & Digital Security