Proposed Method for Mobile Forensics Investigation Analysis of Remnant Data on Google Drive Client
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Satrya, Gandeva Bayu | - |
dc.contributor.author | Shin, Soo Young | - |
dc.date.available | 2020-04-24T10:25:32Z | - |
dc.date.created | 2020-03-31 | - |
dc.date.issued | 2018-11 | - |
dc.identifier.issn | 1607-9264 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/kumoh/handle/2020.sw.kumoh/297 | - |
dc.description.abstract | The best known software developers all offer cloud storage services. Microsoft offers Onedrive to its users, Apple offers iCloud Drive and Google offers Google Drive or GDrive. The battle between these software developers is ongoing and they will always strive to give the best services to their users. It is not only technology that is evolving, however, but also ways in which security can be breached and data abused. The security of information on the Internet is increasingly at risk and there are many threats to cloud storage platforms. This research used the mobile forensics approach to help in identifying and analyzing user behavior that may occur while using GDrive application for cybercrime. The novelty of comparison and analyzing methods performed in this research can help to find remnant data from all activities performed by GDrive users in Android smartphones. Hence, this proposed method can assist investigators in finding remnant data on GDrive client and can provide knowledge for legal practitioners. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | LIBRARY & INFORMATION CENTER, NAT DONG HWA UNIV | - |
dc.title | Proposed Method for Mobile Forensics Investigation Analysis of Remnant Data on Google Drive Client | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Shin, Soo Young | - |
dc.identifier.doi | 10.3966/160792642018111906011 | - |
dc.identifier.scopusid | 2-s2.0-85060694795 | - |
dc.identifier.wosid | 000453592600011 | - |
dc.identifier.bibliographicCitation | JOURNAL OF INTERNET TECHNOLOGY, v.19, no.6, pp.1741 - 1751 | - |
dc.citation.title | JOURNAL OF INTERNET TECHNOLOGY | - |
dc.citation.volume | 19 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 1741 | - |
dc.citation.endPage | 1751 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.subject.keywordAuthor | Cloud storage | - |
dc.subject.keywordAuthor | Mobile forensics | - |
dc.subject.keywordAuthor | GDrive analysis | - |
dc.subject.keywordAuthor | Remnant data | - |
dc.subject.keywordAuthor | Cybercrime | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
350-27, Gumi-daero, Gumi-si, Gyeongsangbuk-do, Republic of Korea (39253)054-478-7170
COPYRIGHT 2020 Kumoh University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.