2,136
Views
27
CrossRef citations to date
0
Altmetric
Papers

Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices

, , &
Pages 615-642 | Received 19 Jun 2015, Accepted 17 Aug 2015, Published online: 03 Mar 2016

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Mohamad Ahtisham Wani, Wasim Ahmad Bhat & Ali Dehghantanha. (2020) An analysis of anti-forensic capabilities of B-tree file system (Btrfs). Australian Journal of Forensic Sciences 52:4, pages 371-386.
Read now
Victor R. Kebande & H. S. Venter. (2018) Novel digital forensic readiness technique in the cloud environment. Australian Journal of Forensic Sciences 50:5, pages 552-591.
Read now

Articles from other publishers (25)

Tawanda Mushiri & Marvellous Moyo. 2023. Healthcare Systems Design of Intelligent Testing Centers. Healthcare Systems Design of Intelligent Testing Centers 199 219 .
Muhammad Haziq Mohd Zainudin, Khairul Akram Zainol Ariffin, Dahlia Asyiqin Ahmad Zainaddin, Ahmad Tarmizi Abdul Ghani & Siti Norul Huda Sheikh Abdullah. (2022) Cloud-based Data Extraction From Mobile Devices: A Preliminary Analysis. Cloud-based Data Extraction From Mobile Devices: A Preliminary Analysis.
Shahnawaz Khan, Ammar Yusuf, Mohammad Haider, K. Thirunavukkarasu, Parma Nand & Mohammad Khalid Imam Rahmani. (2022) A Review of Android and iOS Operating System Security. A Review of Android and iOS Operating System Security.
Sumin Shin, Giyoon Kim, Soram Kim & Jongsung Kim. (2022) Forensic analysis of note and journal applications. Forensic Science International: Digital Investigation 40, pages 301355.
Crossref
Dr. Dirk Pawlaszczyk, Martin Bochmann, Philipp Engler, Coert Klaver & Christian Hummert. (2022) API-based evidence acquisition in the cloud - a survey. Open Research Europe 2, pages 69.
Crossref
Richard Buurke & Nhien-An Le-Khac. 2022. Digital Forensics and Cyber Crime. Digital Forensics and Cyber Crime 93 108 .
Fatma GÜNEŞ ERİŞ & Erhan AKBAL. (2021) Forensic Analysis of Popular Social Media Applications on Android Smartphones. Balkan Journal of Electrical and Computer Engineering 9:4, pages 386-397.
Crossref
Marie-Rose Boueiz. (2020) Importance of rooting in an Android data acquisition. Importance of rooting in an Android data acquisition.
Wasim Ahmad Bhat, Mohammad Faid Jalal, Sajid Sajad Khan, Faiqah Farooq Shah & Mohamad Ahtisham Wani. (2019) Forensic analysis of Sync.com and FlipDrive cloud applications on Android platform. Forensic Science International 302, pages 109845.
Crossref
Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda & Mohd Taufik Abdullah. (2019) Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study. IEEE Transactions on Sustainable Computing 4:2, pages 204-216.
Crossref
Mitchell Vásquez Bermúdez, Jorge Hidalgo Larrea & María del Pilar Avilés Vera. (2019) Evaluación del uso efectivo de nextcloud como una herramienta colaborativa para la gestión del aprendizaje. Revista Científica Ciencia y Tecnología 21:Vol. 19 Núm. 21 (2019).
Crossref
Mohammed Asim, Dean Richard McKinnel, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh & Gregory Epiphaniou. 2019. Handbook of Big Data and IoT Security. Handbook of Big Data and IoT Security 179 210 .
Krzysztof Nagrabski, Michael Hopkins, Milda Petraityte, Ali Dehghantanha, Reza M. Parizi, Gregory Epiphaniou & Mohammad Hammoudeh. 2019. Handbook of Big Data and IoT Security. Handbook of Big Data and IoT Security 129 151 .
Yee-Yang Teing, Sajad Homayoun, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi, Mohammad Hammoudeh & Gregory Epiphaniou. 2019. Handbook of Big Data and IoT Security. Handbook of Big Data and IoT Security 73 127 .
Lim Sze Thiam, Tooska Dargahi & Ali Dehghantanha. 2019. Handbook of Big Data and IoT Security. Handbook of Big Data and IoT Security 329 344 .
Pablo F. Ordoñez-Ordoñez, Domingo D. Herrera-Loaiza & Roberth Figueroa-Diaz. 2019. Technology Trends. Technology Trends 104 115 .
Adam J. Brown, William Bradley Glisson, Todd R. Andel & Kim-Kwang Raymond Choo. (2018) Cloud forecasting: Legal visibility issues in saturated environments. Computer Law & Security Review 34:6, pages 1278-1290.
Crossref
Yee‐Yang Teing, Ali Dehghantanha & Kim‐Kwang Raymond Choo. (2017) CloudMe forensics: A case of big data forensic investigation. Concurrency and Computation: Practice and Experience 30:5.
Crossref
Christian J. D’Orazio & Kim-Kwang Raymond Choo. (2018) Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps. Future Generation Computer Systems 79, pages 247-261.
Crossref
Anand Kumar Mishra, Emmanuel Pilli & Mahesh Govil. 2018. Advances in Digital Forensics XIV. Advances in Digital Forensics XIV 243 261 .
Andrii Shalaginov, Sergii Banin, Ali Dehghantanha & Katrin Franke. 2018. Cyber Threat Intelligence. Cyber Threat Intelligence 7 45 .
Mudit Kalpesh Pandya, Sajad Homayoun & Ali Dehghantanha. 2018. Cyber Threat Intelligence. Cyber Threat Intelligence 281 296 .
Shasi Pokharel, Kim-Kwang Raymond Choo & Jixue Liu. (2017) Mobile cloud security: An adversary model for lightweight browser security. Computer Standards & Interfaces 49, pages 71-78.
Crossref
M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos & A. Dehghantanha. 2017. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 285 305 .
Kenneth M. Ovens & Gordon Morison. (2016) Identification and Analysis of Email and Contacts Artefacts on iOS and OS X. Identification and Analysis of Email and Contacts Artefacts on iOS and OS X.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.