Denne identifikatoren kan du bruke til å sitere eller lenke til denne innførselen:
http://elartu.tntu.edu.ua/handle/lib/50449
| Tittel: | Browser-based cloud storage forensics on google drive artifacts in firefox |
| Alternative titler: | Браузерна форензіка хмарного сховища google drive: дослідження артефактів у firefox |
| Authors: | Яксаї, Хузаіфа Саді Джамал, Фахрун Белло, Белло Муса Ахмад, Тіджані Адам Yakasai, Huzaifa Sadi Jamal, Fakhrun Bello, Bello Musa Ahmad, Tijjani Adam |
| Affiliation: | Університет Шобіт, Індія Shobhit University, India |
| Bibliographic description (Ukraine): | Browser-based cloud storage forensics on google drive artifacts in firefox / Huzaifa Sadi Yakasai, Fakhrun Jamal, Bello Musa Bello, Tijjani Adam Ahmad // Book of abstracts of the Ⅳ International Conference of Young Scholars and Higher Education Applicants „Philosophical dimensions of technology“, 26 November 2025. — Tern. : PE Palianytsia V.A., 2025. — P. 56–65. — (Scientific and technological progress: problems and prospects). |
| Bibliographic reference (2015): | Browser-based cloud storage forensics on google drive artifacts in firefox / Yakasai H. S. та ін. // Book of abstracts of the Ⅳ International Conference of Young Scholars and Higher Education Applicants „Philosophical dimensions of technology“, Ternopil, 26 November 2025. 2025. P. 56–65. |
| Bibliographic citation (APA): | Yakasai, H. S., Jamal, F., Bello, B. M., & Ahmad, T. A. (2025). Browser-based cloud storage forensics on google drive artifacts in firefox. Book of abstracts of the Ⅳ International Conference of Young Scholars and Higher Education Applicants „Philosophical dimensions of technology“, 26 November 2025, Ternopil, 56-65. PE Palianytsia V.A... |
| Bibliographic citation (CHICAGO): | Yakasai H. S., Jamal F., Bello B. M., Ahmad T. A. (2025) Browser-based cloud storage forensics on google drive artifacts in firefox. Book of abstracts of the Ⅳ International Conference of Young Scholars and Higher Education Applicants „Philosophical dimensions of technology“ (Tern., 26 November 2025), pp. 56-65. |
| Is part of: | Матеріали Ⅳ Міжнародної конференції молодих учених та здобувачів вищої освіти „Філософські виміри техніки“, 2025 Book of abstracts of the Ⅳ International Conference of Young Scholars and Higher Education Applicants „Philosophical dimensions of technology“, 2025 |
| Conference/Event: | Ⅳ Міжнародна конференція молодих учених та здобувачів вищої освіти „Філософські виміри техніки“ |
| Journal/Collection: | Матеріали Ⅳ Міжнародної конференції молодих учених та здобувачів вищої освіти „Філософські виміри техніки“ |
| Utgivelsesdato: | 26-nov-2025 |
| Date of entry: | 19-des-2025 |
| Forlag: | ФОП Паляниця В. А. PE Palianytsia V.A. |
| Place of the edition/event: | Тернопіль Ternopil |
| Temporal Coverage: | 26 листопада 2025 р. 26 November 2025 |
| Supervisor: | Джамал, Фахрун Jamal, Fakhrun |
| UDC: | 004.056.53 004.738.5 |
| Emneord: | cloud storage digital forensics browser forensics Google Drive Firefox |
| Number of pages: | 10 |
| Page range: | 56-65 |
| Start page: | 56 |
| End page: | 65 |
| Abstrakt: | Cloud storage services are widely used globally, the users of the services are accessing the services using different devices from different locations, amongst which they used the services unethically like breaching someone’s privacy and unauthorised access to an individual’s or organization’s data. But after the interactions with the services, there weсloud storage, digital forensics, browser forensics, Google Drive, Firefore some footprint of the suspects that can be found, which leaves some digital artifacts accessible through web browsers. This research focuses on gathering and analyzing forensic evidence from Firefox’s SQLite database, targeting the user’s interactions with Google Drive. By using ‘places.sqlite’ [1], [2]. We extracted the user’s browsing history, metadata, and timestamps and convert it into human readable form. This analysis will help digital forensics professionals to understand the persistence of browser-based artifacts in forensic investigations and students for guidance on the steps for retrieving browser artifacts [3][4] |
| URI: | http://elartu.tntu.edu.ua/handle/lib/50449 |
| ISBN: | 978-617-8751-05-0 |
| Copyright owner: | © Тернопільський національний технічний університет імені Івана Пулюя, 2025 |
| URL for reference material: | https://www.forensicfocus.com/articles/retrieving-digital-evidence-methods-techniques-and-issues/ |
| References (International): | 1. T. Gros, R. Dirauf, and F. Freiling, “Systematic Analysis of Browser History Evidence,” in 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE), New York, NY, USA: IEEE, May 2020, pp. 1–12. doi: 10.1109/SADFE51007.2020.00010. 2. E. Qazi, T. Zia, A. Alotibi, and S. Altaleedi, “Examining the Behavior of Web Browsers Using Popular Forensic Tools,” Int. J. Digit. Crime Forensics, vol. 16, July 2024, doi: 10.4018/IJDCF.349218. 3. “FQLite - SQLite Forensic Toolkit.” 4. F. Jamal and T. Siddiqui, “Comparative Analysis of Load Balancing Techniques in Cloud Computing, Based on LB Metrices,” in 2021 5th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India: IEEE, Oct. 2021, pp. 1–5. doi: 10.1109/ISCON52037.2021.9702508. 5. A. W. Malik, D. S. Bhatti, T.-J. Park, H. U. Ishtiaq, J.-C. Ryou, and K.-I. Kim, “Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges,” Sensors, vol. 24, no. 2, p. 433, Jan. 2024, doi: 10.3390/s24020433. 6. A. A. Ahmed, K. Farhan, M. I. H. Ninggal, and G. Alselwi, “Retrieving and Identifying Remnants of Artefacts on Local Devices Using Sync.com Cloud,” Sensors, vol. 25, no. 1, p. 106, Dec. 2024, doi: 10.3390/s25010106. 7. E. Ramadhani and S. I. Isnaindar, “Digital Forensics in Google Drive: Techniques for Extracting and Analyzing Digital Artifacts,” Int. J. Saf. Secur. Eng., vol. 14, no. 4, pp. 1203–1211, Aug. 2024, doi: 10.18280/ijsse.140417. 8. M. M. Alshabibi, A. K. Bu Dookhi, and M. M. Hafizur Rahman, “Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review,” Computers, vol. 13, no. 8, p. 213, Aug. 2024, doi: 10.3390/computers13080213. 9. R. Shah, P. Shukla, D. Rathod, S. Hitesh, and Y. Zala, “Web Browser Forensics: Mozilla Firefox,” Int. J. Electron. Secur. Digit. Forensics, vol. 1, p. 1, Jan. 2024, doi: 10.1504/IJESDF.2024.10055704. 10. F. Jamal and M. Bansal, “Web Log Analyzer for Semantic Web Mining,” vol. 6, 2015. 11. C. A. Chhajed, “Comparison of Persistence of Deleted Files on Different File Systems and Disk Types,” thesis, Purdue University Graduate School, 2024. doi: 10.25394/PGS.25639515.v2. 12. R. Bagley, R. I. Ferguson, and P. Leimich, “FIREFOX BROWSER FORENSIC ANALYSIS VIA RECOVERY OF SQLITE ARTIFACTS FROM UNALLOCATED SPACE.” 13. M. F. Abdillah and Y. Prayudi, “Data Recovery Comparative Analysis using Open-based Forensic Tools Source on Linux,” Int. J. Adv. Comput. Sci. Appl. IJACSA, vol. 13, no. 9, Art. no. 9, Dec. 2022, doi: 10.14569/IJACSA.2022.0130975. 14. S. Veerappampalayam Easwaramoorthy, S. Thamburasa, G. Samy, B. Bhushan S, and A. Karrothu, Digital Forensic Evidence Collection of Cloud Storage Data for Investigation. 2016. doi: 10.1109/ICRTIT.2016.7569516. 15. A. Adesina, A. Adebiyi, and C. Ayo, “Detection and extraction of digital footprints from the iDrive cloud storage using web browser forensics analysis,” Indones. J. Electr. Eng. Comput. Sci., vol. 26, p. 550, Apr. 2022, doi: 10.11591/ijeecs.v26.i1.pp550-559. 16. F. Focus, “Retrieving Digital Evidence: Methods, Techniques and Issues,” Forensic Focus. Accessed: Mar. 13, 2025. [Online]. Available: https://www.forensicfocus.com/articles/retrieving-digital-evidence-methods-techniques-and-issues/ 17. R. Bagley, I. Ferguson, and P. Leimich, Firefox Browser Forensic Analysis via Recovery of SQLite Artefacts from Unallocated Space. 2012. 18. “Autopsy - Digital Forensics.” 19. “Firefox Browser History for Forensic Investigations by Dean _ Medium.” 20. Prince Sultan University, A. Mahlous, H. Mahlous, and King’s College London University, “Private Browsing Forensic Analysis: A Case Study of Privacy Preservation in the Brave Browser,” Int. J. Intell. Eng. Syst., vol. 13, no. 6, pp. 294–306, Dec. 2020, doi: 10.22266/ijies2020.1231.26. 21. R. R. Chand, N. A. Sharma, and M. A. Kabir, “Advancing Web Browser Forensics: Critical Evaluation of Emerging Tools and Techniques,” SN Comput. Sci., vol. 6, no. 4, p. 355, Apr. 2025, doi: 10.1007/s42979-025-03921-6. 22. X. Fernández-Fuentes, T. F. Pena, and J. C. Cabaleiro, “Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study,” Comput. Secur., vol. 115, p. 102626, Apr. 2022, doi: 10.1016/j.cose.2022.102626. 23. R. R. Chand, N. A. Sharma, and M. A. Kabir, “Advancing Web Browser Forensics: Critical Evaluation of Emerging Tools and Techniques,” SN Comput. Sci., vol. 6, no. 4, p. 355, Apr. 2025, doi: 10.1007/s42979-025-03921-6. 24. S. G. Punja and I. Whiffin, “Missing SQLite Records Analysis.” 25. “Web Browser Forensic Tools: Autopsy, BHE and NetAnalysis” Int. J. Res. Innov. Appl.Sci. 26. “Autopsy_Web Artifacts.” |
| Content type: | Conference Abstract |
| Vises i samlingene: | Ⅳ Міжнародна конференція молодих учених та здобувачів вищої освіти „Філософські виміри техніки“ (2025) |
Tilhørende filer:
| Fil | Beskrivelse | Størrelse | Format | |
|---|---|---|---|---|
| ICPDT_2025_Yakasai_H_S-Browser_based_cloud_storage_56-65.pdf | 1,62 MB | Adobe PDF | Vis/Åpne | |
| ICPDT_2025_Yakasai_H_S-Browser_based_cloud_storage_56-65__COVER.png | 487,51 kB | image/png | Vis/Åpne |
Alle innførsler i DSpace er beskyttet av copyright