Abstract
Unquestionably, the proliferation of mobile devices has dominated the main streams in contemporary ubiquitous wireless networks. Unfortunately, the misappropriating of those state-of-the-art gadgets has resulted in unprecedented information security issues in next generation cyberspace security arena. This paper illustrates the essence of generic procedures to provide the probative digital evidences for a typical Gmail Chat session in connection with the IE browser under different scenarios. When the computer-related information security issues arise with regard to the company, the corporate information incident response team should be able to disclose and preserve the evaporating digital trails following the right procedures to avoid the volatile characteristics in their natures. Furthermore, the design of the experiments of the paper identifies four cases to demonstrate the feasibility, availability, reliability, and traceability among them, which are essential for the corporate information security staffs to seriously consider when mushrooming cyber crimes are unknowingly and hastily burgeoning in an unparalleled manner. The organizations might have to scrutinize the negligible digital trails with cognitive expertise instead of entirely relying on law enforcement agencies from the public sectors due to the time constraints as well as publicity concerns or the minor computing resource policy violation unwarily occurred by the employees accordingly.
References
Cassidy RF, Chavez A, Trent J, Urrea J (2008) Remote forensic analysis of process control systems. IFIP International Federation for Information Processing, 253, critical infrastructure protection, pp 223–235
Chu HC, Deng DJ, Park JH (2011) Live data mining concerning social networking forensics based on a facebook session through aggregation of social data. IEEE J Sel Areas Commun 29(7):1368–1376
Chung H, Park J, Lee S, Kang C (2012) Digital forensic investigation of cloud storage services. Digit Investig 9(2):81–95
Dezfouli FN, Dehghantanha A, Mahmoud R, Sani NFBM, bin Shamsuddin S (2012) Volatile memory acquisition using backup for forensic investigation. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), International Conference on pp 186–189. IEEE
Kim Y, Chang H (2012) IT convergence index and measurement design in the manufacturing industry. J Converg 3(3):47–50
Lee J (2008) Proposal for efficient searching and presentation in digital forensics, In Proceedings of the 2008 Third international Conference on Availability, Reliability and Security. ARES. IEEE Computer Society, Washington, pp 1377–1381
Matthew S, Jill (2010) Recovery of skype application activity data from physical memory, international conference on availability, reliability and security, pp 283–288
Oh J, Lee SB, Lee SJ (2011) Advanced evidence collection and analysis of web browser activity. Digit Investig 8:S62–S70
Ruan K, Carthy J, Kechadi M, Crosbie M (2011) Cloud forensics. In: Peterson G, Shenoi S (eds) Advances in digital forensics VII. Springer, Heidelberg, pp 35–46
Ruan K, James J, Carthy J, Kechadi T (2012) Key terms for service level agreements to support cloud forensics. Adv Digit Forensic VIII, IFIP AICT 383:201–212
Sharma MJ, Leung VCM (2012) IP Multimedia subsystem authentication protocol in LTE-heterogeneous networks. Hum-centric Comput Inf Sci 2(16):1–19
Sørensen LT, Skouby KE (2009) Requirements on next generation social networking—a User’s perspective. Wirel Pers Commun 51(4):811–823
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34:1–11
Sylve J, Case A, Marziale L, Richard GG (2012) Acquisition and analysis of volatile memory from android devices. Digit Investig 8(3–4):175–184
Taylor M, Haggerty J, Gresty D, Lamb D (2011) Forensic investigation of cloud computing systems. Netw Secur 2011(3):4–10
Thing V, Ng K, Chang E (2010) Live memory forensics of mobile phones. Digit Investig 7(S):S74–S82
Thing VLL, Ng KY, Chang EC (2010) Live memory forensics of mobile phones. Digit Investig 7(Supplement):S74–S82
Tsai CL, Lin UC, Chang AY, Chen CJ (2010) Information security issue of enterprises adopting the application of cloud computing, Networked Computing and Advanced Information Management (NCM), 6th International Conference, pp 645–649
Wu B, Xu M, Zhang H, Xu J, Ren Y, Zheng N (2013) A recovery approach for SQLite history recorders from YAFFS2, 7804:295–299
Yen YS, Lin IL, Wu BL (2011) A study on the forensic mechanisms of VoIP attacks: analysis and digital evidence. Digit Investig 8:56–67
Yoo DS, Choi SS (2010) Medium access control with dynamic frame length in wireless sensor networks. J Inf Process Syst 6(4):501–510
Acknowledgments
The authors would like to acknowledge the funding support of National Taichung University of Education, Taiwan, of the research grant of Project NTCU-F102104. This research was also supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2014-H0301-14-4007) supervised by the NIPA (National IT Industry Promotion Agency).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chu, HC., Yin, MH., Hsu, CH. et al. The disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimedia. Multimed Tools Appl 75, 14039–14055 (2016). https://doi.org/10.1007/s11042-014-2194-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2194-9