Abstract
The increasing usage of mobile cloud computing leads the cloud to become a hotbed of crime. Cloud storage is different from previous data storage in digital forensics. In this paper, we concentrate on gathering evidence from mobile iOS devices and the types of data remnants that can be found on iOS devices for different user scenarios and device states. We develop several steps for experimenting on Google Drive, OneDrive and Dropbox. We found that the evidence collection of power-off state is not the major problem in digital forensics. Different applications of cloud storage show the different statuses of data remnants. The study also shows that thumbnails and cache files are the key of evidence recovery. We present how the digital investigators to collect evidence by examining the data remnants files as well.









Similar content being viewed by others
References
IDC (2020) Retrieved from https://www.idc.com/promo/smartphone-market-share/os. Accessed 3 Feb 2020
Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13(8):1587–1611
NIST Special Publication 800-101 (2014) Guidelines on cell phone forensics
Brothers S (2009) Cell phone and GPS forensic tool classification system. In: Presentation to Digital Forensics
Ruan K, Carthy J, Kechadi T, Baggili I (2013) Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results. Digit Investig 10(1):34–43
Guo H, Jing B (2012) Forensic investigations in Cloud environments. In: International Conference on Computer Science and Information Processing (CSIP), pp 248–251
Dezfouli F, Dehghantanha A, Mahmoud R, Sani N, Shamsuddin S (2012) Volatile memory acquisition using backup for forensic investigation. In: International Conference on Cyber Security, Cyber Warfare and Digital Forensic
Quick D, Choo K (2013) Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata? Digit Investig 10(3):266–277
Poore J, Flores J, Atkison T (2013) Evolution of digital forensics in virtualization by using virtual machine introspection. In: ACM Southeast Conference
Marty R (2011) Cloud application logging for forensics. In: ACM Symposium on Applied Computing, pp 178–184
Chung H, Park J, Lee S, Kang C (2012) Digital forensic investigation of cloud storage services. J Digit Investig 9:81–95
Liao Z, Wu S, Xi B, Wang F, Ming D, Chen B (2019) Digital forensics design of IOS operating system. In: Proceedings of the 2019 3rd High Performance Computing and Cluster Technologies Conference (HPCCT 2019), pp 232–236
iTunes (2020) Retrieved from https://support.apple.com/zh-tw/itunes. Accessed 3 Feb 2020
Grispos G, Glisson WB, Storer T (2013) Using smartphones as a proxy for forensic evidence contained in cloud storage services. In: 46th Hawaii International Conference in System Sciences (HICSS), pp 4910–4919
Fernando N, Loke SW, Rahayu W (2013) Mobile cloud computing: a survey. Future Gener Comput Syst 29:84–106
Google Drive (2020) Retrieved from https://www.google.com/drive/. Accessed 3 Feb 2020
OneDrive (2020) Retrieved from https://support.office.com/zh-tw/onedrive. Accessed 3 Feb 2020
Dropbox (2020) Retrieved from https://www.dropbox.com/help/security. Accessed 3 Feb 2020
iTools (2020) Retrieved from http://pro.itools.cn/itools3/feature.php. Accessed 3 Feb 2020
Bader M, Baggili I (2010) iPhone 3GS forensics: logical analysis using Apple iTunes backup utility. Small Scale Digit Device Forensics J 4(1):1–15
Acknowledgement
This research was partially supported by the Oriental Institute of Technology under the Grants RD 108-7-11-006, RD 108-0055 and the Ministry of Science and Technology of the Republic of China under the Grants MOST 107-2221-E-005-031 and MOST 107-2221-E-015-001-MY2.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ko, HJ., Huang, CT., Zhuang, ZW. et al. Cloud evidence tracks of storage service linking with iOS systems. J Supercomput 77, 77–94 (2021). https://doi.org/10.1007/s11227-020-03255-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-020-03255-5