Cyber Forensics on Advanced Technology Platforms
DOI:
https://doi.org/10.65879/3070-5789.2025.01.01Keywords:
Cyber forensics, Cloud, Virtual machines, Internet of Things (IoT), Mobile device forensics, HealthcareAbstract
The motivation of the research in this paper is to extend cyber forensics to advanced technology platforms that are beyond traditional workstations and servers. Specifically, these technology platforms include cloud and virtual machines (VMs), the Internet of Things (IoT), and mobile devices that are significant for cyber forensics. Digital forensics process and challenges in cloud forensics are presented. VMs are helpful for cyber forensics. IoT forensics has been categorized into three dimensions: technical, spatial, and temporal. Mobile device forensics helps detect cyber risks or threats, investigate crimes, and recover deleted or lost data. Mobile forensic tools are compared and summarized based on their functions. Cyber forensics on advanced technology platforms in healthcare is presented. Applications of mobile device forensics in healthcare lie in regulatory compliance, data security, and privacy.
References
[1] Manral B, Somani G, Choo KK, Conti M, Gaur MS. A systematic survey on cloud forensics challenges, solutions, and future directions. ACM Computing Surveys (CSUR) 2019; 52(6): 1-38.
https://doi.org/10.1145/3361216
[2] Hou J, Li Y, Yu J, Shi W. A survey on digital forensics in Internet of Things. IEEE Internet of Things Journal 2019; 7(1): 1-15.
https://doi.org/10.1109/JIOT.2019.2940713
[3] Jayakrishnan AR, Vasanthi V. Internet of things forensics honeynetcloud investigation model. In2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) 2020; pp. 660-666. IEEE.
https://doi.org/10.1109/ICESC48915.2020.9155775
[4] Morić Z, Dakić V, Kapulica A, Regvart D. Forensic Investigation Capabilities of Microsoft Azure: A Comprehensive Analysis and Its Significance in Advancing Cloud Cyber Forensics. Electronics 2024; 13(22): 4546.
https://doi.org/10.3390/electronics13224546
[5] Karagiannis C, Vergidis K. Digital evidence and cloud forensics: contemporary legal challenges and the power of disposal. Information 2021; 12(5): 181.
https://doi.org/10.3390/info12050181
[6] Ali SA, Memon S, Sahito F. Analysis of cloud forensics techniques for emerging technologies. In2020 International Conference on Computing, Networking, Telecommunications & Engineering Sciences Applications (CoNTESA) 2020; pp. 106-111. IEEE.
https://doi.org/10.1109/CoNTESA50436.2020.9302862
[7] Purnaye P, Kulkarni V. BiSHM: Evidence detection and preservation model for cloud forensics. Open Computer Science 2022; 12(1): 154-70.
https://doi.org/10.1515/comp-2022-0241
[8] Zhang J, Gao C, Gong L, Gu Z, Man D, Yang W, Li W. Malware detection based on multi-level and dynamic multi-feature using ensemble learning at hypervisor. Mobile Networks and Applications 2021; 26(4): 1668-1685.
https://doi.org/10.1007/s11036-019-01503-4
[9] Amiroon S, Fachkha C. Digital forensics and investigations of the internet of things: A short survey. In2020 3rd International Conference on Signal Processing and Information Security (ICSPIS) 2020; pp. 1-4. IEEE.
https://doi.org/10.1109/ICSPIS51252.2020.9340150
[10] Yang W, Johnstone MN, Sikos LF, Wang S. Security and forensics in the internet of things: Research advances and challenges. In2020 Workshop on Emerging Technologies for Security in IoT (ETSecIoT) 2020; pp. 12-17. IEEE.
https://doi.org/10.1109/ETSecIoT50046.2020.00007
[11] Bernardo BM, São Mamede H, dos Santos VM, Barroso JM. Mobile device forensics framework: a toolbox to support and enhance this process. Emerging Science Journal 2024; 8(3): 972-998.
https://doi.org/10.28991/ESJ-2024-08-03-011
[12] Fukami A, Stoykova R, Geradts Z. A new model for forensic data extraction from encrypted mobile devices. Forensic Science International: Digital Investigation 2021; 38: 301169.
https://doi.org/10.1016/j.fsidi.2021.301169
[13] Aljahdali A, ALSAIDI N, Alsafri M, Alsulami A, Almutairi T. Mobile device forensics. Romanian Journal of Information Technology & Automatic Control/Revista Română de Informatică și Automatică 2021; 31(3).
https://doi.org/10.33436/v31i3y202107
[14] Horsman G. “I couldn't find it, your honour, it mustn't be there!”–Tool errors, tool limitations and user error in digital forensics. Science & justice 2018; 58(6): 433-440.
https://doi.org/10.1016/j.scijus.2018.04.001
[15] Beard I. Digital Photos, Embedded Metadata and Personal Privacy. In The Complete Guide to Personal Digital Archiving 2018; pp. 201-212. ALA Editions.
https://doi.org/10.7282/T3TH8QR9
[16] Jayaraman I, Stanislaus Panneerselvam A. A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud. Journal of Ambient Intelligence and Humanized Computing 2021; 12(5): 4911-4924.
https://doi.org/10.1007/s12652-020-01931-1
[17] Mishra AK, Govil MC, Pilli ES, Bijalwan A. Digital Forensic Investigation of Healthcare Data in Cloud Computing Environment. Journal of Healthcare Engineering 2022; 1: 9709101.
https://doi.org/10.1155/2022/9709101
[18] Fernández-Fuentes X, Pena TF, Cabaleiro JC. Digital forensic analysis of the private mode of browsers on Android. Computers & Security 2023; 134: 103425.
https://doi.org/10.1016/j.cose.2023.103425
[19] Alqahtany SS, Syed TA. ForensicTransMonitor: a comprehensive blockchain approach to reinvent digital forensics and evidence management. Information 2024; 15(2): 109.
https://doi.org/10.3390/info15020109
[20] Grispos G, Tursi F, Mahoney W. A digital forensic analysis of an electrocardiogram medical device: A first look. Wiley Interdisciplinary Reviews: Forensic Science 2024; 6(6): e1535.
https://doi.org/10.1002/wfs2.1535
[21] El-Zawawy MA, Vasudev H, Conti M. BDMFA: Forensic-enabling attestation technique for Internet of Medical Things. Internet of Things 2025; 29: 101464.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Journal of Cybersecurity, Digital Forensics and Jurisprudence

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.