Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Cost effective data wiping methods for mobile phone

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Thanks to the supply of smartphones, mobile phones have come to store increasingly more personal information of users. To protect users’ information, the information stored in mobile phones should not only be managed safety but also be deleted not to allow restoration. In the filesystems that have been applied to existing mobile phones, even when users have deleted information, data are not completely wiped from the storage. Therefore, the data can be easily recovered by using forensics tools. Considering that mobile phones are always exposed to the risk of robberies and loss, this situation can be misused for personal information spill. The present paper points out problems in the methods of data deleting from smartphones, proposes an efficient data deleting method considering mobile device environments with limitations in battery and hardware performance such as smartphones, and analyzes the efficiency of the techniques in relation to the types of filesystems and data formats.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Carrier B (2005) File system forensic analysis, Addison Wesley, March 2005

  2. Hoog A (2001) Android forensics — investigation, analysis and mobile security for google android. Elsevier Science & Technology, Jul 2001

  3. Jahankhani H (2006) Criminal investigation and forensic analysis of smartphones. Inform Secur

  4. Jansen W, Ayers R (2007) Guidelines on cell phone forensics, NIST Special Publication 800–101, May 2007

  5. Lessard J, Kessler GC (2010) Android forensics: Simplifying cell phone examinations. Small Scale Digit Device Forensic J 4, September 2010

  6. Park S, Lee Y, Kim S (2011) A high performance NAND array file system based on multiple NAND flash memories. J Supercomput October 2011

  7. Quick D (2011) “Forensic analysis of the android file system YAFFS. Proc Aust Digit Forensics Conf, December 2011

  8. Shin I (2012) Secure file delete in NAND-based Storage. Int J Netw Secur Appl 6

  9. Spanjer E (2009) Flash management — why and how? November 2009

  10. Watson AB (1994) NASA Ames Research Center: image compression using the discrete cosine transform. Mathematica J 4(1)

  11. Wright C, Kleiman D, Shyaam Sundhar RS (2008) Overwriting hard drive data— the great wiping controversy, ICISS 2008, LNCS 5352

  12. Zdziarski J (2008) iPhone forensics: recovering evidence, personal data and corporate assets, O’Reilly Media, September 2008

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juho Kim.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kang, SH., Park, KY. & Kim, J. Cost effective data wiping methods for mobile phone. Multimed Tools Appl 71, 643–655 (2014). https://doi.org/10.1007/s11042-013-1603-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-013-1603-9

Keywords