Article
Version 1
Preserved in Portico This version is not peer-reviewed
Cloud Drives Forensic Artifacts A Google Drive Case
Version 1
: Received: 22 December 2018 / Approved: 3 January 2019 / Online: 3 January 2019 (12:17:11 CET)
How to cite: Khairallah, T. Cloud Drives Forensic Artifacts A Google Drive Case. Preprints 2018, 2018120345. https://doi.org/10.20944/preprints201812.0345.v1 Khairallah, T. Cloud Drives Forensic Artifacts A Google Drive Case. Preprints 2018, 2018120345. https://doi.org/10.20944/preprints201812.0345.v1
Abstract
This research proposed in this paper focuses on gathering evidence from devices with Windows 10 operating systems in order to discover and collect artifacts left by cloud storage applications that suggest their use even after the deletion of the Google client application. We show where and what type of data remnants can be found using our analysis which can be used as evidence in a digital forensic investigations.
Keywords
Cloud Storage Forensics, Cloud Application Artifacts, Data Remnants, Data Carving, Digital Forensic Investigations
Subject
Computer Science and Mathematics, Software
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment