z-logo
open-access-imgOpen Access
Detection and extraction of digital footprints from the iDrive cloud storage using web browser forensics analysis
Author(s) -
Adesoji A. Adesina,
Ayodele Ariyo Adebiyi,
C. K. Ayo
Publication year - 2022
Publication title -
indonesian journal of electrical engineering and computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.241
H-Index - 17
eISSN - 2502-4760
pISSN - 2502-4752
DOI - 10.11591/ijeecs.v26.i1.pp550-559
Subject(s) - cloud computing , digital forensics , computer science , the internet , cloud storage , world wide web , network forensics , computer security , service (business) , digital evidence , operating system , economy , economics
STorage as a  service (STaaS) allows its subscribers the ability to access their stored data with the use of internet enabled digital devices at anywhere, anyplace and anytime. The easy accessibility of cloud storage with digital devices is one of the major benefits of cloud computing but this benefit can also be exploited by cybercriminals to perform various forms of malicious usages. During forensic investigation, forensic examiners are expected to provided evidence in relation to the malicious usages but the physical inaccessibility to the digital artifacts on the cloud servers, the difficulty in retrieving evidential artifacts from various cloud storage services and the difficulty in obtaining forensic logs from the concerned cloud service providers among other factors make it difficult to perform forensic investigations. This paper provided step by step experimental guidelines to extract digital artifacts from Google Chrome and Internet Explorer from Windows 10 personal computer using iDrive cloud storage as a case study. The study used Nirsoft forensic tool to locate the relevant forensic artifacts and an integrated conceptual digital forensic framework was adopted to carry out the investigation. This study increases the knowledge of client forensics using web browser analysis during cloud storage forensic investigation.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here