Forensic sound manner should be used while collecting, preserving, and analyzing digital evidence to present it in court.
One could extract data like SMS, contacts, installed applications, GPS data and emails, deleted data.Īs per the definition of the carrier in 2006, Digital Evidence is data that supports or refutes a hypothesis about digital events. With these challenges in mobile forensics, syncing mobiles phone to a computer using software becomes easy. Each case or investigation of the new model needs to consider differently and requires following steps which could be different and unique to the case. The ratio of new models designed and launched is very high which makes very difficult to follow similar procedures. Mobile phones generally belong to a single person so analysis of it could reveal lots of personal information.ĭue to the rapid growth, it also introduced challenges. Due to the exponential growth of the mobile market, Importance of mobile forensics has also increased. Finally the proposed framework was tested on a simulated case study.Mobile forensics is a field of digital forensics which is focused towards mobile devices which are growing very fast. Also, tracking the usage of USB devices for data theft was presented. This deals with the extracted evidence from relevant Windows Registry keys. It helps the investigator in the decision making phase about the evidence. This paper presents a proposed framework for digital crime investigation based on Fuzzy logic. Therefore, digital forensics based on Windows registry is considered as a hot research field. It stores all hardware and software configurations, user activities, and transactions. Fortunately, in Windows Operating systems, all users' transactions are stored in a central point which is known as Windows Registry. These data stored in unnoticeable tiny devices such as USB sticks which may lead to a muddled decision because of the tediousness of the investigation. The recent challenge is due to the big size of data that the investigator may deal with.
The main goal of digital forensics is to extract accurate evidence which determines whether the convict is guilty or not. Since the lives of the persons are on the edge after being convicted in digital crimes. This study increases the knowledge of cloud storage forensics and the significance of registry analysis during digital investigations.
The study explores different experimental setups for the forensic analysis and adopted an integrated conceptual digital forensic framework in the investigation process to detect relevant forensic artifacts from the registry of a windows 10 device. This study identifies relevant artifacts that can be forensically extracted from the registry of a window 10 device that accessed iDrive cloud storage. Therefore, there is a need to perform client-side forensics to be able to carry out forensic investigation on digital devices as related to the activities on cloud storage. The logs of malicious usages can be obtained from the cloud service providers for forensic investigations but the privacy issue among other factors make it difficult for such logs to be shared. These benefits can also be exploited by the cybercriminals to perform various criminal activities including storing and exchanging of illegal materials on cloud storage platforms. The accessibility of cloud storage over the internet as a result of cloud computing technology provides the opportunity to store, share and upload data online with the use of digital devices which can be accessed anytime and anywhere.