Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Cloud Drives Forensic Artifacts A Google Drive Case

Version 1 : Received: 22 December 2018 / Approved: 3 January 2019 / Online: 3 January 2019 (12:17:11 CET)

How to cite: Khairallah, T. Cloud Drives Forensic Artifacts A Google Drive Case. Preprints 2018, 2018120345. https://doi.org/10.20944/preprints201812.0345.v1 Khairallah, T. Cloud Drives Forensic Artifacts A Google Drive Case. Preprints 2018, 2018120345. https://doi.org/10.20944/preprints201812.0345.v1

Abstract

This research proposed in this paper focuses on gathering evidence from devices with Windows 10 operating systems in order to discover and collect artifacts left by cloud storage applications that suggest their use even after the deletion of the Google client application. We show where and what type of data remnants can be found using our analysis which can be used as evidence in a digital forensic investigations.

Keywords

Cloud Storage Forensics, Cloud Application Artifacts, Data Remnants, Data Carving, Digital Forensic Investigations

Subject

Computer Science and Mathematics, Software

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.