Google Drive: Forensic analysis of data remnants

Journal of Network and Computer Applications - Tập 40 - Trang 179-193 - 2014
Darren Quick1, Kim–Kwang Raymond Choo1
1Information Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes Campus, Mawson Lakes Boulevard, Mawson Lakes SA 5095, Australia

Tóm tắt

Từ khóa


Tài liệu tham khảo

Association of Chief Police Officers (ACPO). Good practice guidelines for computer based evidence v4.0. 〈www.7safe.com/electronic_evidence〉; 2006.

Biggs S, Vidalis S. Cloud computing: the impact on digital forensic investigations. In: Proceedings of IEEE international conference for internet technology and secured transactions (ICITST 2009); 2009. p. 1–6.

Birk D. Technical challenges of forensic investigations in cloud computing environments. In: Proceedings of the workshop on cryptography and security in clouds. IBM Forum Switzerland. Zurich; 2011.

Chung, 2012

Duffy A. Faraday Bag testing in a reverberation chamber – a preliminary study. 〈http://www.faradaybag.com/faraday-bag-testing/demontfort-university-faraday-bag-testing.html〉; 2010.

Guo H, Shang T, Jin B. Forensic investigations in cloud environments. In: Proceedings of the IEEE international conference on computer science and information processing (CSIP); 2012.

Kleynhans, 2012

McClain, 2011

McKemmish, 1999, What is forensic computing?, Trends Issues Crime Crim Justice, 118, 1

Microsoft. How NTFS reserves space for its Master File Table (MFT). 〈http://support.microsoft.com/kb/174619〉; 2008.

Microsoft. Shortcuts: frequently asked questions. 〈http://windows.microsoft.com/en-us/windows-vista/Shortcuts-frequently-asked-questions〉; 2012.

Microsoft. What is the prefetch folder? 〈http://windows.microsoft.com/en-AU/windows-vista/What-is-the-prefetch-folder〉; 2012.

Mueller L. Windows 7 Forensics – Part IV – Thumbcache_⁎.db. 〈http://www.forensickb.com/2010/01/windows-7-forensics-part-iv.html〉; 2010.

National Institute of Justice (NIJ). Forensic examination of digital evidence: a guide for law enforcement. 〈http://nij.gov/nij/pubs-sum/199408.htm〉; 2004.

National Institute of Justice (NIJ). Electronic crime scene investigation: a guide for first responders. 2nd edition. 〈http://www.nij.gov/pubs-sum/219941.htm〉; 2008.

Office of Law Enforcement Standards of the National Institute of Standards and Technology (NIST). NIST computer forensic tool testing. 〈http://www.cftt.nist.gov/disk_imaging.htm〉; 2012.

Quick, 2013, Digital droplets: microsoft skydrive forensic data remnants, Future Gener Comput Syst, 29, 1378, 10.1016/j.future.2013.02.001

Quick, 2013, Dropbox analysis: data remnants on user machines, Digital Invest, 10, 3, 10.1016/j.diin.2013.02.003

Slay, 2009, Towards a formalization of digital forensics, 37

Subashini, 2011, A survey on security issues in service delivery models of cloud computing, J Network Comput Appl, 34, 1, 10.1016/j.jnca.2010.07.006

Taylor, 2010, Digital evidence in cloud computing systems, Comput Law Secur Rev, 26, 304, 10.1016/j.clsr.2010.03.002

US Government Accountability Office (US GAO). Information technology reform: progress made but future cloud computing efforts should be better planned’. 〈http://www.gao.gov/assets/600/592249.pdf〉; 2012.

W3Counter. Browser statistics July 2012. 〈http://www.w3counter.com/globalstats.php?year=2012&month=7〉; 2012.