Open Access   Article Go Back

A Decryption Process for Android Database Forensics

Nibedita Chakraborty1 , Krishna Punwar2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 23-26, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.2326

Online published on Mar 31, 2019

Copyright © Nibedita Chakraborty, Krishna Punwar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nibedita Chakraborty, Krishna Punwar, “A Decryption Process for Android Database Forensics,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.23-26, 2019.

MLA Style Citation: Nibedita Chakraborty, Krishna Punwar "A Decryption Process for Android Database Forensics." International Journal of Computer Sciences and Engineering 7.3 (2019): 23-26.

APA Style Citation: Nibedita Chakraborty, Krishna Punwar, (2019). A Decryption Process for Android Database Forensics. International Journal of Computer Sciences and Engineering, 7(3), 23-26.

BibTex Style Citation:
@article{Chakraborty_2019,
author = {Nibedita Chakraborty, Krishna Punwar},
title = {A Decryption Process for Android Database Forensics},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {23-26},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3790},
doi = {https://doi.org/10.26438/ijcse/v7i3.2326}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.2326}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3790
TI - A Decryption Process for Android Database Forensics
T2 - International Journal of Computer Sciences and Engineering
AU - Nibedita Chakraborty, Krishna Punwar
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 23-26
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
613 429 downloads 173 downloads
  
  
           

Abstract

Nowadays, Databases are mostly usable in business applications and financial transactions in Banks. Most of the database servers stores confidential and sensitive information of a mobile device. Database forensics is the part of digital forensics especially for the investigation of different databases and the sensitive information stored on a database. Mobile databases are totally different from the major database and are very platform independent as well. Even if they are not attached to the central database, they can still linked with the major database to drag and change the information stored on this. . SQLite Database is mostly needed by Android application development. SQLite is a freely available database management system which is specially used to perform relational functional and it comes inbuilt with android to perform database functions on android appliance. This paper will show how a message can be decrypted by using block cipher modes and which mode is more secured and fast.

Key-Words / Index Term

Database Forensics,Mobile Device ,Android,SQLite, Modes, Tools

References

[1] Database encryption using asymmetric keys: a case study, AlexandruBoicea, Florin Radulescu, Ciprian-OctivianTruica, CritinaCostea, 2017 21st International Conference on Control System and computer science.
[2] Common Investigation Process Model for Database Forensic Investigation Discipline, Arafat Aldhaqm, ShukorAbdRazak, SitiHajar Othman, 1st ICRIL-International Conference on Innovation in Science and Technology (IICIST-2015).
[3] Key Technologies for Mobile Phone Forensics and Application, Qingchao Su, Bin Xi, 2017 2nd International Conference on Multimedia and Image Processing.
[4] Research on the Data Recovery Method of Deleted SMS for iPhone, ZHANG Kai-xiang; ZHOU An-min, Modern Computer 2015.
[5] Cryptography and Network security, Tata McGraw-Hill education 2003, Atul Kahate.