DIGITAL FORENSIC ANALYSIS OF DROPBOX ON WINDOWS 10 DEVICES
Main Article Content
Abstract
In an Internet-connected world, computers are increasingly used to access cloud storage services, which allow users to access data anytime, anywhere. However, these devices are targeted by cybercriminals to perform malicious activities, such as data intrusion, malware installation, identity theft, cyber terrorism. As a result, computers are an important source of evidence in investigating crimes. In this article, we investigate the digital forensic of Dropbox applications, a popular cloud storage service, on the Windows 10 operating system platform, one of the most popular and widely used operating systems in the world. We attempted to identify residual data that may be of interest to investigative authorities, such as information generated during logins, uploads, downloads, deletions, and file sharing. The findings as well as the results can help the authorities to easily obtain evidence data from the DropBox application on Windows 10.
Keywords
Cloud storage, digital forensic, dropBox forensic, Windows forensic
Article Details
References
Choo, K. K. R., & Smith, R. (2008). Criminal Exploitation of Online Systems by Organised Crime Groups. Asian Journal of Criminology, 37-59.
Chung, H., Park, J., Lee, S., & Kang, C. (2012). Digital forensic investigation of cloud storage services. Digital Investigation, 81-95.
Dykstra, J., & Sherman, A. (2012). Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation, S90-S98.
Grispos, G., Glisson, W. B., & Storer, T. (2013). Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services. IEEE, 4910-4919.
Gu, Q., & Guirguis, M. (2014). High Performance Cloud Auditing and Applications. Springer.
Hale, J. (2013). Amazon Cloud Drive forensic analysis. Digital Investigation, 259-265.
Magnet Forensic. (2022, 10 9). Magnet Forensic. Retrieved from Magnet Forensic: https://www.magnetforensics.com/products/magnet-axiom/
Martini, B., & Choo, K. K. R. (2012). An integrated conceptual digital forensic framework for cloud computing. Digital Investigation, 71-80.
Martini, B., & Choo, K. K. R. (2013). Cloud storage forensics: ownCloud as a case study. Digital Investigation, 287-299.
Martini, B., & Choo, K. K. R. (2014). Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept. IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (pp. 935-942).
Martini, B., Do, Q., & Choo, K.-K. R. (2015). Conceptual evidence collection and analysis methodology for Android devices, 285-307.
Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. NIST Special Publication 800-145.
Microsoft. (2022, 10 9). Microsoft by the Numbers. Retrieved from https://news.microsoft.com/bythenumbers/en/windowsdevices
NIST. (2022, 10 9). National Software Reference Library. Retrieved from National Software Reference Library: https://www.nist.gov/itl/ssd/software-quality-group/national-software-reference-library-nsrl
Quick, D., Martini, B., & Choo, K. K. R. (2014). Cloud storage forensics. Syngress, an Imprint of Elsevier.
Service, U. F. (n.d.). Reforestation, Nurseries, and Genetics Resources. Retrieved from http://www.rngr.net
Shariati, M., Dehghantanha, A., & Choo, K. K. R. (2016). SugarSync forensic analysis. Australian Journal of Forensic Sciences, 95-117.
Shariati, M., Dehghantanha, A., Martini, B., & Choo, K. K. R. (2018). Ubuntu One Investigation: Detecting Evidences on Client Machines. Syngress, 429-446.
SQLiteStudio. (2022, 10 9). SQLiteStudio. Retrieved from SQLiteStudio: https://sqlitestudio.pl/
Wen, Y., Man, X., Le, K., & Shi, W. (2013). Forensics-as-a-Service (FaaS): Computer Forensic Workflow Management and. The Fifth International Conferences on Pervasive Patterns and Applications, (pp. 208-214).
Zawoad, S., Dutta, A. K., & Hasan, R. (2013). SecLaaS: secure logging-as-a-service for cloud forensics. Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, (pp. 219-230).