**Chapter 7**

*Digital Forensic Science*

2016;**48**(4):469-488

10.1016/j.jnca.2013.09.016

[18] Oh J, Lee S, Lee S. Advanced evidence collection and analysis of web browser activity. Digital Investigation.

2011;**8**:S62-S70. DOI: 10.1016/j.

[19] Juels A, Kaliski BS Jr. PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on Computer and Communications Security; ACM. 2007. pp. 584-597. DOI: 10.1145/1315245.1315317

[20] Dykstra J, Sherman AT. Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digital Investigation. 2013;**10**:S87-S95

[21] Chung H, Park J, Lee S, Kang C. Digital forensic investigation of cloud storage services. Digital investigation.

[22] Daryabar F, Dehghantanha A, Choo KK. Cloud storage forensics: MEGA as a case study. Australian Journal of Forensic Sciences. 2017;**49**(3):344-357. DOI: 10.1080/00450618.2016.1153714

[23] Martini B, Choo KK. Cloud storage forensics: ownCloud as a case study.

Nov 1 2012;**9**(2):81-95. DOI:

1709/1709.10395

diin.2011.05.008

Applications. 2017. pp. 41-62. DOI: 10.1016/B978-0-12-805303-4.00004-6 Digital Investigation. 2013;**10**(4): 287-299. DOI: 10.1016/j.diin.2013.08.005

[24] Teing YY, Dehghantanha A, Choo KK, Yang LT. Forensic investigation of P2P cloud storage services and backbone for IoT networks:

BitTorrent Sync as a case study. Computers & Electrical Engineering. 2017;**58**:350-363. DOI: 10.1016/j. compeleceng.2016.08.020

[26] https://webforms.ey.com/ Publication/vwLUAssets/

html

[25] http://prateek-paranjpe.blogspot. com/p/cyber-forensics-case-studies.

ey-responding-to-cybercrimeincidentsin-india-new/\$FILE/ey-responding-tocybercrime-incidents-in-india.pdf

artefacts on Android and iOS platforms. Australian Journal of Forensic Sciences.

[17] Quick D, Choo KK. Google drive: forensic analysis of data remnants. Journal of Network and Computer Applications. 2014;**40**:179-193. DOI:

[16] Norouzizadeh Dezfouli F, Dehghantanha A, Eterovic-Soric B, Choo KK. Investigating social networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+

**116**
