Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(266.98KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Client Forensics: An Assessment of Existing Research And Future Directions
Rose Shumba
Pages - 45 - 54     |    Revised - 30-06-2018     |    Published - 01-10-2018
Volume - 12   Issue - 3    |    Publication Date - October 2018  Table of Contents
MORE INFORMATION
KEYWORDS
Cloud Forensics, Cloud Storage Services, Client Forensics.
ABSTRACT
This paper provides an assessment of processes for identifying artifacts, left on client devices after a cloud storage interaction. It focuses on those artifacts that may be used to prove usage of a cloud service, as proposed by the current research. Besides providing the current state of knowledge in client forensics, this paper (1) provides a summary of current research in the area of client forensics, (2) presents similarities and differences among proposed processes and identified artifacts, and (3) presents some possible future work. Investigators need to understand how devices and cloud storage services interact, the types of evidential artifacts that are likely to remain on the devices after cloud storage interaction, and how they may be used to prove usage. Not knowing if a cloud service was accessed, or which cloud service or the location of digital evidence can potentially impede an investigation.
CITED BY (0)  
1 Google Scholar
2 BibSonomy
3 Doc Player
4 Scribd
5 SlideShare
1 Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digital Investigation, 10(1), pp 34-43 [2016].
2 Stamford. (n.d.). Gartner Says That Consumers Will Store More Than a Third of Their Digital Content in the Cloud by 2016. Available: http://www.gartner.com/newsroom/id/2060215.
3 NIST. (2014). NIST Cloud Computing Forensic Science Challenges (NISTIR 8006).
4 Marturana, F., Me, G., & Tacconi, S.. A Case Study on Digital Forensics in the Cloud. In Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery [2012].
5 Quick, D., & Choo, K. R.. Dropbox analysis: Data remnants on user machines. Digital Investigation, 10(1), pp 3-18 [2013].
6 Quick, D., & Choo, K. R. Google Drive: Forensic analysis of data remnants. Journal of Network and Computer Applications, 40, pp 179-193 [2014].
7 Quick, D., Martini, B., & Choo, K. R. Forensic Collection of Cloud Storage Data. Cloud Storage Forensics, pp 153-174 [2014].
8 Chung, H., Park, J., Lee, S., & Kang, C.. Digital forensic investigation of cloud storage services. Digital Investigation, 9(2), pp 81-95 [2012].
9 Malik, R., Shashidhar, N., & Chen, L.. Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform. In the Proceedings of the Int'l Conf. Security and Management [2015].
10 Epifani, M.. Cloud Storage Forensics. Paper presented at SANS European Digital Forensics Summit, Prague [2013].
11 Long, C., & Qing, Z.. Forensic Analysis to China's Cloud Storage Services. International Journal of Machine Learning and Computing, 5(6), pp 467-470 [2015].
Dr. Rose Shumba
Cyber Science Department United States Naval Academy - United States of America
shumba@usna.edu