Skip to main content
Erschienen in: The Journal of Supercomputing 1/2021

26.03.2020

Cloud evidence tracks of storage service linking with iOS systems

verfasst von: Hung-Jui Ko, Cheng-Ta Huang, Zhi-Wei Zhuang, Gwoboa Horng, Shiuh-Jeng Wang

Erschienen in: The Journal of Supercomputing | Ausgabe 1/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The increasing usage of mobile cloud computing leads the cloud to become a hotbed of crime. Cloud storage is different from previous data storage in digital forensics. In this paper, we concentrate on gathering evidence from mobile iOS devices and the types of data remnants that can be found on iOS devices for different user scenarios and device states. We develop several steps for experimenting on Google Drive, OneDrive and Dropbox. We found that the evidence collection of power-off state is not the major problem in digital forensics. Different applications of cloud storage show the different statuses of data remnants. The study also shows that thumbnails and cache files are the key of evidence recovery. We present how the digital investigators to collect evidence by examining the data remnants files as well.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(8):1587–1611CrossRef Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(8):1587–1611CrossRef
3.
Zurück zum Zitat NIST Special Publication 800-101 (2014) Guidelines on cell phone forensics NIST Special Publication 800-101 (2014) Guidelines on cell phone forensics
4.
Zurück zum Zitat Brothers S (2009) Cell phone and GPS forensic tool classification system. In: Presentation to Digital Forensics Brothers S (2009) Cell phone and GPS forensic tool classification system. In: Presentation to Digital Forensics
5.
Zurück zum Zitat Ruan K, Carthy J, Kechadi T, Baggili I (2013) Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results. Digit Investig 10(1):34–43CrossRef Ruan K, Carthy J, Kechadi T, Baggili I (2013) Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results. Digit Investig 10(1):34–43CrossRef
6.
Zurück zum Zitat Guo H, Jing B (2012) Forensic investigations in Cloud environments. In: International Conference on Computer Science and Information Processing (CSIP), pp 248–251 Guo H, Jing B (2012) Forensic investigations in Cloud environments. In: International Conference on Computer Science and Information Processing (CSIP), pp 248–251
7.
Zurück zum Zitat Dezfouli F, Dehghantanha A, Mahmoud R, Sani N, Shamsuddin S (2012) Volatile memory acquisition using backup for forensic investigation. In: International Conference on Cyber Security, Cyber Warfare and Digital Forensic Dezfouli F, Dehghantanha A, Mahmoud R, Sani N, Shamsuddin S (2012) Volatile memory acquisition using backup for forensic investigation. In: International Conference on Cyber Security, Cyber Warfare and Digital Forensic
8.
Zurück zum Zitat Quick D, Choo K (2013) Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata? Digit Investig 10(3):266–277CrossRef Quick D, Choo K (2013) Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata? Digit Investig 10(3):266–277CrossRef
9.
Zurück zum Zitat Poore J, Flores J, Atkison T (2013) Evolution of digital forensics in virtualization by using virtual machine introspection. In: ACM Southeast Conference Poore J, Flores J, Atkison T (2013) Evolution of digital forensics in virtualization by using virtual machine introspection. In: ACM Southeast Conference
10.
Zurück zum Zitat Marty R (2011) Cloud application logging for forensics. In: ACM Symposium on Applied Computing, pp 178–184 Marty R (2011) Cloud application logging for forensics. In: ACM Symposium on Applied Computing, pp 178–184
11.
Zurück zum Zitat Chung H, Park J, Lee S, Kang C (2012) Digital forensic investigation of cloud storage services. J Digit Investig 9:81–95CrossRef Chung H, Park J, Lee S, Kang C (2012) Digital forensic investigation of cloud storage services. J Digit Investig 9:81–95CrossRef
12.
Zurück zum Zitat Liao Z, Wu S, Xi B, Wang F, Ming D, Chen B (2019) Digital forensics design of IOS operating system. In: Proceedings of the 2019 3rd High Performance Computing and Cluster Technologies Conference (HPCCT 2019), pp 232–236 Liao Z, Wu S, Xi B, Wang F, Ming D, Chen B (2019) Digital forensics design of IOS operating system. In: Proceedings of the 2019 3rd High Performance Computing and Cluster Technologies Conference (HPCCT 2019), pp 232–236
14.
Zurück zum Zitat Grispos G, Glisson WB, Storer T (2013) Using smartphones as a proxy for forensic evidence contained in cloud storage services. In: 46th Hawaii International Conference in System Sciences (HICSS), pp 4910–4919 Grispos G, Glisson WB, Storer T (2013) Using smartphones as a proxy for forensic evidence contained in cloud storage services. In: 46th Hawaii International Conference in System Sciences (HICSS), pp 4910–4919
15.
Zurück zum Zitat Fernando N, Loke SW, Rahayu W (2013) Mobile cloud computing: a survey. Future Gener Comput Syst 29:84–106CrossRef Fernando N, Loke SW, Rahayu W (2013) Mobile cloud computing: a survey. Future Gener Comput Syst 29:84–106CrossRef
20.
Zurück zum Zitat Bader M, Baggili I (2010) iPhone 3GS forensics: logical analysis using Apple iTunes backup utility. Small Scale Digit Device Forensics J 4(1):1–15 Bader M, Baggili I (2010) iPhone 3GS forensics: logical analysis using Apple iTunes backup utility. Small Scale Digit Device Forensics J 4(1):1–15
Metadaten
Titel
Cloud evidence tracks of storage service linking with iOS systems
verfasst von
Hung-Jui Ko
Cheng-Ta Huang
Zhi-Wei Zhuang
Gwoboa Horng
Shiuh-Jeng Wang
Publikationsdatum
26.03.2020
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 1/2021
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-020-03255-5

Weitere Artikel der Ausgabe 1/2021

The Journal of Supercomputing 1/2021 Zur Ausgabe