Digital Evidence Identification on Google Drive in Android Device Using NIST Mobile Forensic Method

  • Yudhana A
  • Umar R
  • Ahmadi A
N/ACitations
Citations of this article
69Readers
Mendeley users who have this article in their library.

Abstract

The use of cloud storage media is very popular nowadays, especially with the Google Drive cloud storage media on smartphones. The increasing number of users of google drive storage media does not rule out the possibility of being used as a medium for storing illegal data, such as places to store negative content and so on. On a smartphone with an Android operating system that has a Google Drive application installed, digital evidence can be extracted by acquiring and analyzing the system files. This study implemented a mobile forensic method based on guidelines issued by the National Institute of Standards of Technology (NIST). The results of this study are presented in the form of data recovery in the deleted Google Drive storage media, which results in the form of headers of the data type in the form of deleting account names, deleted file types, and timestamp of deleted files. Digital evidence obtained with 59 Axiom Magnet software found in the Entry227 file, with 46 files, if the percentage is a success rate of 77%.

Cite

CITATION STYLE

APA

Yudhana, A., Umar, R., & Ahmadi, A. (2019). Digital Evidence Identification on Google Drive in Android Device Using NIST Mobile Forensic Method. Scientific Journal of Informatics, 6(1), 54–63. https://doi.org/10.15294/sji.v6i1.17767

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free