Skip to main content
Log in

The disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimedia

Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Unquestionably, the proliferation of mobile devices has dominated the main streams in contemporary ubiquitous wireless networks. Unfortunately, the misappropriating of those state-of-the-art gadgets has resulted in unprecedented information security issues in next generation cyberspace security arena. This paper illustrates the essence of generic procedures to provide the probative digital evidences for a typical Gmail Chat session in connection with the IE browser under different scenarios. When the computer-related information security issues arise with regard to the company, the corporate information incident response team should be able to disclose and preserve the evaporating digital trails following the right procedures to avoid the volatile characteristics in their natures. Furthermore, the design of the experiments of the paper identifies four cases to demonstrate the feasibility, availability, reliability, and traceability among them, which are essential for the corporate information security staffs to seriously consider when mushrooming cyber crimes are unknowingly and hastily burgeoning in an unparalleled manner. The organizations might have to scrutinize the negligible digital trails with cognitive expertise instead of entirely relying on law enforcement agencies from the public sectors due to the time constraints as well as publicity concerns or the minor computing resource policy violation unwarily occurred by the employees accordingly.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

References

  1. Cassidy RF, Chavez A, Trent J, Urrea J (2008) Remote forensic analysis of process control systems. IFIP International Federation for Information Processing, 253, critical infrastructure protection, pp 223–235

  2. Chu HC, Deng DJ, Park JH (2011) Live data mining concerning social networking forensics based on a facebook session through aggregation of social data. IEEE J Sel Areas Commun 29(7):1368–1376

    Article  Google Scholar 

  3. Chung H, Park J, Lee S, Kang C (2012) Digital forensic investigation of cloud storage services. Digit Investig 9(2):81–95

    Article  Google Scholar 

  4. Dezfouli FN, Dehghantanha A, Mahmoud R, Sani NFBM, bin Shamsuddin S (2012) Volatile memory acquisition using backup for forensic investigation. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), International Conference on pp 186–189. IEEE

  5. http://www.epochconverter.com

  6. http://www.techpathways.com

  7. Kim Y, Chang H (2012) IT convergence index and measurement design in the manufacturing industry. J Converg 3(3):47–50

    Google Scholar 

  8. Lee J (2008) Proposal for efficient searching and presentation in digital forensics, In Proceedings of the 2008 Third international Conference on Availability, Reliability and Security. ARES. IEEE Computer Society, Washington, pp 1377–1381

  9. Matthew S, Jill (2010) Recovery of skype application activity data from physical memory, international conference on availability, reliability and security, pp 283–288

  10. Oh J, Lee SB, Lee SJ (2011) Advanced evidence collection and analysis of web browser activity. Digit Investig 8:S62–S70

    Article  Google Scholar 

  11. Ruan K, Carthy J, Kechadi M, Crosbie M (2011) Cloud forensics. In: Peterson G, Shenoi S (eds) Advances in digital forensics VII. Springer, Heidelberg, pp 35–46

    Chapter  Google Scholar 

  12. Ruan K, James J, Carthy J, Kechadi T (2012) Key terms for service level agreements to support cloud forensics. Adv Digit Forensic VIII, IFIP AICT 383:201–212

    Article  Google Scholar 

  13. Sharma MJ, Leung VCM (2012) IP Multimedia subsystem authentication protocol in LTE-heterogeneous networks. Hum-centric Comput Inf Sci 2(16):1–19

    Google Scholar 

  14. Sørensen LT, Skouby KE (2009) Requirements on next generation social networking—a User’s perspective. Wirel Pers Commun 51(4):811–823

    Article  Google Scholar 

  15. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34:1–11

    Article  Google Scholar 

  16. Sylve J, Case A, Marziale L, Richard GG (2012) Acquisition and analysis of volatile memory from android devices. Digit Investig 8(3–4):175–184

    Article  Google Scholar 

  17. Taylor M, Haggerty J, Gresty D, Lamb D (2011) Forensic investigation of cloud computing systems. Netw Secur 2011(3):4–10

    Article  Google Scholar 

  18. Thing V, Ng K, Chang E (2010) Live memory forensics of mobile phones. Digit Investig 7(S):S74–S82

    Article  Google Scholar 

  19. Thing VLL, Ng KY, Chang EC (2010) Live memory forensics of mobile phones. Digit Investig 7(Supplement):S74–S82

    Article  Google Scholar 

  20. Tsai CL, Lin UC, Chang AY, Chen CJ (2010) Information security issue of enterprises adopting the application of cloud computing, Networked Computing and Advanced Information Management (NCM), 6th International Conference, pp 645–649

  21. Wu B, Xu M, Zhang H, Xu J, Ren Y, Zheng N (2013) A recovery approach for SQLite history recorders from YAFFS2, 7804:295–299

  22. Yen YS, Lin IL, Wu BL (2011) A study on the forensic mechanisms of VoIP attacks: analysis and digital evidence. Digit Investig 8:56–67

    Article  Google Scholar 

  23. Yoo DS, Choi SS (2010) Medium access control with dynamic frame length in wireless sensor networks. J Inf Process Syst 6(4):501–510

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

The authors would like to acknowledge the funding support of National Taichung University of Education, Taiwan, of the research grant of Project NTCU-F102104. This research was also supported by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (NIPA-2014-H0301-14-4007) supervised by the NIPA (National IT Industry Promotion Agency).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jong Hyuk Park.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chu, HC., Yin, MH., Hsu, CH. et al. The disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimedia. Multimed Tools Appl 75, 14039–14055 (2016). https://doi.org/10.1007/s11042-014-2194-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2194-9

Keywords

Navigation