Abstract
Thanks to the supply of smartphones, mobile phones have come to store increasingly more personal information of users. To protect users’ information, the information stored in mobile phones should not only be managed safety but also be deleted not to allow restoration. In the filesystems that have been applied to existing mobile phones, even when users have deleted information, data are not completely wiped from the storage. Therefore, the data can be easily recovered by using forensics tools. Considering that mobile phones are always exposed to the risk of robberies and loss, this situation can be misused for personal information spill. The present paper points out problems in the methods of data deleting from smartphones, proposes an efficient data deleting method considering mobile device environments with limitations in battery and hardware performance such as smartphones, and analyzes the efficiency of the techniques in relation to the types of filesystems and data formats.
Similar content being viewed by others
References
Carrier B (2005) File system forensic analysis, Addison Wesley, March 2005
Hoog A (2001) Android forensics — investigation, analysis and mobile security for google android. Elsevier Science & Technology, Jul 2001
Jahankhani H (2006) Criminal investigation and forensic analysis of smartphones. Inform Secur
Jansen W, Ayers R (2007) Guidelines on cell phone forensics, NIST Special Publication 800–101, May 2007
Lessard J, Kessler GC (2010) Android forensics: Simplifying cell phone examinations. Small Scale Digit Device Forensic J 4, September 2010
Park S, Lee Y, Kim S (2011) A high performance NAND array file system based on multiple NAND flash memories. J Supercomput October 2011
Quick D (2011) “Forensic analysis of the android file system YAFFS. Proc Aust Digit Forensics Conf, December 2011
Shin I (2012) Secure file delete in NAND-based Storage. Int J Netw Secur Appl 6
Spanjer E (2009) Flash management — why and how? November 2009
Watson AB (1994) NASA Ames Research Center: image compression using the discrete cosine transform. Mathematica J 4(1)
Wright C, Kleiman D, Shyaam Sundhar RS (2008) Overwriting hard drive data— the great wiping controversy, ICISS 2008, LNCS 5352
Zdziarski J (2008) iPhone forensics: recovering evidence, personal data and corporate assets, O’Reilly Media, September 2008
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kang, SH., Park, KY. & Kim, J. Cost effective data wiping methods for mobile phone. Multimed Tools Appl 71, 643–655 (2014). https://doi.org/10.1007/s11042-013-1603-9
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-013-1603-9