Google Drive: Forensic analysis of data remnants (Englisch)

In: Journal of Network and Computer Applications   ;  40 ;  179-193  ;  2013
  • ISSN:
  • Aufsatz (Zeitschrift)  /  Elektronische Ressource

Wie erhalte ich diesen Titel?

Download

Download ist DRM geschützt.


Kommerziell Vergütung an den Verlag: 36,00 € Grundgebühr: 4,00 € Gesamtpreis: 40,00 €
Akademisch Vergütung an den Verlag: 36,00 € Grundgebühr: 2,00 € Gesamtpreis: 38,00 €

Abstract Cloud storage is an emerging challenge to digital forensic examiners. The services are increasingly used by consumers, business, and government, and can potentially store large amounts of data. The retrieval of digital evidence from cloud storage services (particularly from offshore providers) can be a challenge in a digital forensic investigation, due to virtualisation, lack of knowledge on location of digital evidence, privacy issues, and legal or jurisdictional boundaries. Google Drive is a popular service, providing users a cost-effective, and in some cases free, ability to access, store, collaborate, and disseminate data. Using Google Drive as a case study, artefacts were identified that are likely to remain after the use of cloud storage, in the context of the experiments, on a computer hard drive and Apple iPhone3G, and the potential access point(s) for digital forensics examiners to secure evidence.

Highlights Digital evidence can be stored in cloud storage services, such as Google Drive. Identification of potential data storage is a challenge to forensic examiners. Google Drive was examined in relation to data remnants on a PC and an iPhone. Investigation points include directory listings, prefetch, link and registry files.

Inhaltsverzeichnis – Band 40

Zeige alle Jahrgänge und Ausgaben

Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.

1
An energy efficient hierarchical clustering index tree for facilitating time-correlated region queries in the Internet of Things
Tang, Jine / Zhou, ZhangBing / Niu, Jianwei / Wang, Qun | 2013
12
Simple models of the content duration and the popularity of television content
Fraile, Francisco / Carlos Guerri, Juan | 2013
21
Reducing view inconsistency by predicting avatars' motion in multi-server distributed virtual environments
Hu, Haiyang / Ren, Yizhi / Xu, Xu / Huang, Liguo / Hu, Hua | 2013
31
Counteracting security attacks in virtual machines in the cloud using property based attestation
Varadharajan, Vijay / Tupakula, Udaya | 2013
46
Multi-rate multicast routing in multi-gateway multi-channel multi-radio wireless mesh networks
Farzinvash, Leili / Dehghan, Mehdi | 2013
61
Niched ant colony optimization with colony guides for QoS multicast routing
Yin, Peng-Yeng / Chang, Ray-I. / Chao, Chih-Chiang / Chu, Yen-Ting | 2013
73
Community detection in social networks using hybrid merging of sub-communities
Arab, Mohsen / Afsharchi, Mohsen | 2013
85
Collaborative caching priority for processing requests in MANETs
Ahmed Elfaki, Mohamed / Ibrahim, Hamidah / Mamat, Ali / Othman, Mohamed / Safa, Haidar | 2013
97
Robustness of Internet under targeted attack: A cascading failure perspective
Wang, Jianwei / Jiang, Chen / Qian, Jianfei | 2013
105
Design and evaluation of mobile offloading system for web-centric devices
Park, Sehoon / Chen, Qichen / Han, Hyuck / Yeom, Heon Y. | 2013
116
Toward efficient estimation of available bandwidth for IEEE 802.11-based wireless networks
Zhao, Peng / Yang, Xinyu / Yu, Wei / Dong, Chiyong / Yang, Shusen / Bhattarai, Sulabh | 2013
126
Mobile Internet access over intermittent network connectivity
Xia, Yang / Yeo, Chai Kiat | 2013
139
An electronic voting mechanism for fighting bribery and coercion
Wu, Zhen-Yu / Wu, Ju-Chuan / Lin, Sung-Chiang / Wang, Charlotte | 2013
151
Metric-based taxonomy of routing protocols for cognitive radio ad hoc networks
Abdelaziz, Samar / ElNainay, Mustafa | 2013
164
Localization-free and energy-efficient hole bypassing techniques for fault-tolerant sensor networks
Yilmaz, Onur / Dagdeviren, Orhan / Erciyes, Kayhan | 2013
179
Google Drive: Forensic analysis of data remnants
Quick, Darren / Choo, Kim-Kwang Raymond | 2013
194
Benford's law behavior of Internet traffic
Arshadi, Laleh / Jahangir, Amir Hossein | 2013
206
Optimization on content service with local search in cloud of clouds
Zeng, Lingfang / Wang, Yang | 2013
216
Evaluating the benefit of the core-edge separation on intradomain traffic engineering under uncertain traffic demand
Li, Ke / Wang, Sheng / Xu, Shizhong / Wang, Xiong / Huang, Haojun / Ren, Jin / Zhai, Bo | 2013
227
Energy–delay tradeoff analysis of user state transition mechanism for mobile web services
Choi, Hyun-Ho / Lee, Ki-Ho / Lee, Jung-Ryun | 2013
234
Push or pull? Toward optimal content delivery using cloud storage
Guan, Xinjie / Choi, Baek-Young | 2013
244
Performance analysis of quantization-based approximation algorithms for precomputing the supported QoS
Hou, Ronghui / Lui, King-Shan / Leung, Ka-Cheong / Baker, Fred | 2013
255
A formal framework for modelling complex network management systems
Macia-Perez, Francisco / Lorenzo-Fonseca, Iren / Berna-Martinez, Jose Vicente | 2013
270
Energy-aware routing for biomedical wireless sensor networks
Abreu, Carlos / Ricardo, Manuel / Mendes, P.M. | 2013
279
JDER: A history-based forwarding scheme for delay tolerant networks using Jaccard distance and encountered ration
Ciobanu, R.I. / Reina, D.G. / Dobre, C. / Toral, S.L. / Johnson, P. | 2013
292
A transform domain-based anomaly detection approach to network-wide traffic
Jiang, Dingde / Xu, Zhengzheng / Zhang, Peng / Zhu, Ting | 2013
307
Network attacks: Taxonomy, tools and systems
Hoque, N. / Bhuyan, Monowar H. / Baishya, R.C. / Bhattacharyya, D.K. / Kalita, J.K. | 2013
325
A survey on vehicular cloud computing
Whaiduzzaman, Md / Sookhak, Mehdi / Gani, Abdullah / Buyya, Rajkumar | 2013
345
Rich Mobile Applications: Genesis, taxonomy, and open issues
Abolfazli, Saeid / Sanaei, Zohreh / Gani, Abdullah / Xia, Feng / Yang, Laurence T. | 2013
363
Vehicular communication ad hoc routing protocols: A survey
Sharef, Baraa T. / Alsaqour, Raed A. / Ismail, Mahamod | 2013
IFC
Editorial board
| 2014
Feedback