Institutional Repository

Conducting a forensic investigation of Amazon Drive on Android devices

Show simple item record

dc.contributor.author Nouhra, Virona
dc.date.accessioned 2021-10-20T06:44:49Z
dc.date.available 2021-10-20T06:44:49Z
dc.date.issued 2018
dc.identifier.citation Nouhra, V. (2018). Conducting a forensic investigation of Amazon Drive on Android devices (Master's thesis, Notre Dame University-Louaize, Zouk Mosbeh, Lebanon). Retrieved from http://ir.ndu.edu.lb/123456789/1375
dc.identifier.uri http://ir.ndu.edu.lb/123456789/1375
dc.description M.S. -- Faculty of Natural and Applied Sciences, Department of Computer Science, Notre Dame University, Louaize, 2018; "A thesis submitted in partial fulfillment of the requirements for the Master of Science in Computer Science"; Includes bibliographical references (leaves 77-81).
dc.description.abstract In the last few years, Cloud Storage has taken a new turn in becoming the latest trend to create a huge impact in the IT world. Amazon Drive is a cloud storage mobile applications created by Amazon. This application provides online and easy access to documents, music, photos and videos saved in your cloud drive. Due to the importance and widespread of the cloud, not only regular users, but also criminals have taken advantage of the services provided by this new technology to commit digital crimes. Digital forensics is a branch of forensic sciences that aims at investigating digital evidence found on electronic devices to help combat cybercrimes. It aims at identifying, preserving. collecting, analyzing and reporting digital remnants. Digital forensics plays a key role in helping forensic investigators identify valuable and court admissible information. In this thesis, an analysis is performed on the digital artifacts that are left behind on an Android device after Amazon Drive have been accessed. Methods and tools were used to examine digital evidence, its importance and relevance, to allow examiners to secure the evidence properly. This thesis follows 31 four step digital forensic framework to follow a proper forensic investigation process. The results of this process has identified the location of the evidence related to the Amazon Drive account. In addition, the tiles and folders were identified and in some cases the content of some tiles was retrieved. This thesis showed that deleted files can also be acquired. en_US
dc.format.extent iv, 81 leaves : color illustrations
dc.language.iso en en_US
dc.publisher Notre Dame University-Louaize en_US
dc.rights Attribution-NonCommercial-NoDerivs 3.0 United States *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/3.0/us/ *
dc.subject.lcsh Computer crimes--Investigation
dc.subject.lcsh Digital forensic science
dc.subject.lcsh Forensic sciences
dc.subject.lcsh Cloud computing
dc.subject.lcsh Mobile device forensics
dc.title Conducting a forensic investigation of Amazon Drive on Android devices en_US
dc.type Thesis en_US
dc.rights.license This work is licensed under a Creative Commons Attribution-NonCommercial 3.0 United States License. (CC BY-NC 3.0 US)
dc.contributor.supervisor Akiki, Pierre A., Ph.D. en_US
dc.contributor.department Notre Dame University-Louaize. Department of Computer Sciences en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States

Search DSpace


Advanced Search

Browse

My Account