Document Type

Article

Publication Date

6-3-2015

Publication Title

International Journal of Security

ISSN

1985-2320

Abstract

The research proposed in this paper focuses on gathering evidence from devices with UNIX/Linux systems (in particular on Ubuntu 14.04 and Android OS), and Windows 8.1, in order to find artifacts left by cloud storage applications that suggests their use even after the deletion of the applications. The work performed aims to expand upon the prior work done by other researches in the field of cloud forensics and to show an example of analysis. We show where and what type of data remnants can be found using our analysis and how this information can be used as evidence in a digital forensic investigation.

Comments

This is an Open Access publication published under CSC-OpenAccess Policy.

This article was retrieved from the International Journal of Security and is licensed under Creative Commons Attribution (CC-BY).

Share

COinS