메뉴 건너뛰기




Volumn 48, Issue 6, 2016, Pages 615-642

Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices

Author keywords

Android forensic; cloud forensics; cloud storage applications forensics; digital forensics; iOS forensic

Indexed keywords

ARTIFACT; HUMAN; PHYSICIAN;

EID: 84961218182     PISSN: 00450618     EISSN: 1834562X     Source Type: Journal    
DOI: 10.1080/00450618.2015.1110620     Document Type: Article
Times cited : (49)

References (33)
  • 1
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • B.Martini, K.-K.R.Choo. An integrated conceptual digital forensic framework for cloud computing. Digit Invest. 2012;9(2):71–80.10.1016/j.diin.2012.07.001
    • (2012) Digit Invest , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 3
    • 84884590254 scopus 로고    scopus 로고
    • Amazon cloud drive forensic analysis
    • J.S.Hale. Amazon cloud drive forensic analysis. Digit Invest. 2013;10(3):259–265.10.1016/j.diin.2013.04.006
    • (2013) Digit Invest , vol.10 , Issue.3 , pp. 259-265
    • Hale, J.S.1
  • 4
    • 84949175431 scopus 로고    scopus 로고
    • Secure mobile cloud computing and security issues
    • Springer
    • Q.Gu, M.Guirguis. High performance cloud auditing and applications. Springer; 2014. Secure mobile cloud computing and security issues; 65–90. Available from:http://link.springer.com/chapter/10.1007/978-1-4614-3296-8_3
    • (2014) High performance cloud auditing and applications , pp. 65-90
    • Gu, Q.1    Guirguis, M.2
  • 5
    • 84938850824 scopus 로고    scopus 로고
    • Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
    • F.Norouzizadeh Dezfouli, A.Dehghantanha, B.Eterovic-Soric, K.K.R.Choo. Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Aust. J. Forensic Sci. 2015:1–20. Available from:doi:10.1080/00450618.2015.1066854
    • (2015) Aust. J. Forensic Sci , pp. 1-20
    • Norouzizadeh Dezfouli, F.1    Dehghantanha, A.2    Eterovic-Soric, B.3    Choo, K.K.R.4
  • 6
    • 84963541600 scopus 로고    scopus 로고
    • Chapter 14 - Conceptual evidence collection and analysis methodology for Android devices
    • Choo R.K.-K.R., (ed), Boston, MA: Syngress
    • B.Martini, Q.Do, K.-K.R.Choo. The cloud security ecosystem. Boston, MA:Syngress; 2015. R.K.-K.R.Choo, editor. Chapter 14 - Conceptual evidence collection and analysis methodology for Android devices; p. 285–307. Available from:http://www.sciencedirect.com/science/article/pii/B978012801595700014810.1016/B978-0-12-801595-7.00014-8
    • (2015) The cloud security ecosystem , pp. 285-307
    • Martini, B.1    Do, Q.2    Choo, K.-K.R.3
  • 7
    • 85018181307 scopus 로고    scopus 로고
    • Chapter 15 - Mobile cloud forensics: an analysis of seven popular Android apps
    • Choo R.K.-K.R., (ed), Boston, MA: Syngress
    • B.Martini, Q.Do, K.-K.R.Choo. The cloud security ecosystem. Boston, MA:Syngress; 2015. R.K.-K.R.Choo, editor. Chapter 15 - Mobile cloud forensics:an analysis of seven popular Android apps; p. 309–345. Available from:http://www.sciencedirect.com/science/article/pii/B978012801595700015X10.1016/B978-0-12-801595-7.00015-X
    • (2015) The cloud security ecosystem , pp. 309-345
    • Martini, B.1    Do, Q.2    Choo, K.-K.R.3
  • 9
    • 84964322400 scopus 로고    scopus 로고
    • Chapter 19 - Ubuntu one investigation: detecting evidences on client machines
    • Choo R.K.-K.R., (ed), Boston, MA: Syngress
    • M.Shariati, A.Dehghantanha, B.Martini, K.-K.R.Choo. The cloud security ecosystem. Boston, MA:Syngress; 2015. R.K.-K.R.Choo, editor. Chapter 19 - Ubuntu one investigation:detecting evidences on client machines; p. 429–446. Available from:http://www.sciencedirect.com/science/article/pii/B978012801595700019710.1016/B978-0-12-801595-7.00019-7
    • (2015) The cloud security ecosystem , pp. 429-446
    • Shariati, M.1    Dehghantanha, A.2    Martini, B.3    Choo, K.-K.R.4
  • 11
    • 84870254680 scopus 로고    scopus 로고
    • Digital forensic investigation of cloud storage services
    • H.Chung, J.Park, S.Lee, C.Kang. Digital forensic investigation of cloud storage services. Digit Invest. 2012;9(2):81–95.10.1016/j.diin.2012.05.015
    • (2012) Digit Invest , vol.9 , Issue.2 , pp. 81-95
    • Chung, H.1    Park, J.2    Lee, S.3    Kang, C.4
  • 12
    • 84872349700 scopus 로고    scopus 로고
    • 2012 International conference on cyber-enabled distributed computing and knowledge discovery (CyberC)
    • F.Marturana, G.Me, S.Tacconi. A case study on digital forensics in the cloud. 2012 International conference on cyber-enabled distributed computing and knowledge discovery (CyberC). 2012:111–116.10.1109/CyberC.2012.26
    • (2012) A case study on digital forensics in the cloud , pp. 111-116
    • Marturana, F.1    Me, G.2    Tacconi, S.3
  • 13
    • 84864596423 scopus 로고    scopus 로고
    • Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques
    • J.Dykstra, A.T.Sherman. Acquiring forensic evidence from infrastructure-as-a-service cloud computing:exploring and evaluating tools, trust, and techniques. Digit Invest. 2012;9(SUPPL.):S90–S98.10.1016/j.diin.2012.05.001
    • (2012) Digit Invest , vol.9 , pp. S90-S98
    • Dykstra, J.1    Sherman, A.T.2
  • 14
    • 84875493689 scopus 로고    scopus 로고
    • Using smartphones as a proxy for forensic evidence contained in cloud storage services
    • G.Grispos, W.B.Glisson, T.Storer. Using smartphones as a proxy for forensic evidence contained in cloud storage services. IEEE. 2013:4910–4919. Available from:http://ezproxy.upm.edu.my:2078/xpl/articleDetails.jsp?tp=&arnumber=6480436&matchBoolean%3Dtrue%26searchField%3DSearch_All%26queryText%3D%28%28p_Abstract%3Aforensics%29+AND+p_Abstract%3Aios%29
    • (2013) IEEE , pp. 4910-4919
    • Grispos, G.1    Glisson, W.B.2    Storer, T.3
  • 15
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: owncloud as a case study
    • B.Martini, K.-K.R.Choo. Cloud storage forensics:owncloud as a case study. Digit Invest. 2013;10(4):287–299.10.1016/j.diin.2013.08.005
    • (2013) Digit Invest , vol.10 , Issue.4 , pp. 287-299
    • Martini, B.1    Choo, K.-K.R.2
  • 19
    • 84898004587 scopus 로고    scopus 로고
    • Cloud data imager: a unified answer to remote acquisition of cloud storage areas
    • C.Federici. Cloud data imager:a unified answer to remote acquisition of cloud storage areas. Digit Invest. 2014;11(1):30–42.10.1016/j.diin.2014.02.002
    • (2014) Digit Invest , vol.11 , Issue.1 , pp. 30-42
    • Federici, C.1
  • 20
    • 84896319180 scopus 로고    scopus 로고
    • Google drive: forensic analysis of data remnants
    • D.Quick, K.-K.R.Choo. Google drive:forensic analysis of data remnants. J Netw Comput Appl. 2014;40:179–193.10.1016/j.jnca.2013.09.016
    • (2014) J Netw Comput Appl , vol.40 , pp. 179-193
    • Quick, D.1    Choo, K.-K.R.2
  • 21
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • (Including Special sections: High Performance Computing in the Cloud & Resource Discovery Mechanisms for P2P Systems)
    • D.Quick, K.-K.R.Choo. Digital droplets:Microsoft SkyDrive forensic data remnants. Future Gener Comput Syst. 2013;29(6):1378–1394. (Including Special sections:High Performance Computing in the Cloud & Resource Discovery Mechanisms for P2P Systems).10.1016/j.future.2013.02.001
    • (2013) Future Gener Comput Syst , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 22
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: data remnants on user machines
    • D.Quick, K.-K.R.Choo. Dropbox analysis:data remnants on user machines. Digit Invest. 2013;10(1):3–18.10.1016/j.diin.2013.02.003
    • (2013) Digit Invest , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 23
    • 84963541600 scopus 로고    scopus 로고
    • Conceptual evidence collection and analysis methodology for Android devices
    • B.Martini, Q.Do, K.K.R.Choo. Conceptual evidence collection and analysis methodology for Android devices. Cloud Secur. Ecosyst. 2015:285–307. doi:10.1016/B978-0-12-801595-7.00014-8
    • (2015) Cloud Secur. Ecosyst , pp. 285-307
    • Martini, B.1    Do, Q.2    Choo, K.K.R.3
  • 24
    • 77957695303 scopus 로고    scopus 로고
    • Organised crime groups in cyberspace: a typology
    • K.-K.R.Choo. Organised crime groups in cyberspace:a typology. Trends in Organized Crime. 2008;11(3):270–295.10.1007/s12117-008-9038-9
    • (2008) Trends in Organized Crime , vol.11 , Issue.3 , pp. 270-295
    • Choo, K.-K.R.1
  • 25
    • 77957695303 scopus 로고    scopus 로고
    • Criminal exploitation of online systems by organised crime groups
    • K.-K.R.Choo, R.G.Smith. Criminal exploitation of online systems by organised crime groups. Trends in Organized Crime. 2008;11(3):270–295.10.1007/s12117-008-9038-9
    • (2008) Trends in Organized Crime , vol.11 , Issue.3 , pp. 270-295
    • Choo, K.-K.R.1    Smith, R.G.2
  • 26
    • 84989325260 scopus 로고    scopus 로고
    • EDRM File Format Data Set 1.0.1. [cited 2015 Jan 17]. Available from:http://www.edrm.net/resources/data-sets/edrm-file-format-data-set
  • 27
    • 85013170297 scopus 로고    scopus 로고
    • Towards a unified forensic investigation framework of smartphones
    • S.H.Mohtasebi, A.Dehghantanha. Towards a unified forensic investigation framework of smartphones. Int J Comput Theory Eng. 2013;5(2):351.10.7763/IJCTE.2013.V5.708
    • (2013) Int J Comput Theory Eng , vol.5 , Issue.2 , pp. 351
    • Mohtasebi, S.H.1    Dehghantanha, A.2
  • 28
    • 84856645731 scopus 로고    scopus 로고
    • Information Assurance and Security (IAS), 2011 7th International Conference on. IEEE
    • F.Daryabar, A.Dehghantanha, N.I.Udzir. Investigation of bypassing malware defences and malware detections. Information Assurance and Security (IAS), 2011 7th International Conference on. IEEE; 2011. p. 173–178. Available from:http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=612281510.1109/ISIAS.2011.6122815
    • (2011) Investigation of bypassing malware defences and malware detections , pp. 173-178
    • Daryabar, F.1    Dehghantanha, A.2    Udzir, N.I.3
  • 31
    • 84978399590 scopus 로고    scopus 로고
    • M0Droid: an Android behavioral-based malware detection model
    • M.Damshenas, A.Dehghantanha, K.-K.R.Choo, R.Mahmud. M0Droid:an Android behavioral-based malware detection model. J Inf Privacy Secur. 2015;11(3):141–157.10.1080/15536548.2015.1073510
    • (2015) J Inf Privacy Secur , vol.11 , Issue.3 , pp. 141-157
    • Damshenas, M.1    Dehghantanha, A.2    Choo, K.-K.R.3    Mahmud, R.4
  • 33
    • 84910046949 scopus 로고    scopus 로고
    • Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on. IEEE
    • A.Dehghantanha, K.Franke. Privacy-respecting digital investigation. Privacy, Security and Trust (PST), 2014 Twelfth Annual International Conference on. IEEE; 2014. p. 129–138. Available from:http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=689093210.1109/PST.2014.6890932
    • (2014) Privacy-respecting digital investigation , pp. 129-138
    • Dehghantanha, A.1    Franke, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.