Cloud storage is now a well established and popular service adopted by many individuals, often at limited or no cost. It provides users with the ability to store content on a cloud service provider’s infrastructure offering the benefit of redundancy, reliability, security, flexibility of access and the potential assumed liability of the provider for data loss within the contexts of a licensing agreement. Consequently, this form of remote storage provides a regulatory challenge as content which once resided upon a seized digital exhibit, available for scrutiny during a digital forensic investigatory, may no longer be present where attempting to acquire access to it creates costing and juridical difficulties. This article offers a digital forensic examination of trace-evidence left in the Internet browser cache following cloud storage account usage and interaction. Following interactions with Dropbox and Google Drive in the Chrome browser, testing demonstrates the possibility to recover data capable of facilitating a partial reconstruction of a user’s cloud storage account, with results offered and contextualised.


Alqahtany, S., Clarke, N., Furnell, S. and Reich, C., 2015, April. Cloud forensics: a review of challenges, solutions and open problems. In Cloud Computing (ICCC), 2015 International Conference on (pp. 1-9). IEEE.

Aminnezhad, A., Dehghantanha, A., Abdullah, M.T. and Damshenas, M., 2013. Cloud forensics issues and opportunities. International Journal of Information Processing and Management, 4(4), p.76.

BBC News (2011) ‘Are there criminals hiding in the cloud?’ Available at: http://news.bbc.co.uk/1/hi/programmes/click_online/9477968.stm (Accessed: 1 August 2018)

BBC News (2013) ‘Ian Watkins child abuse inquiry appeal prompts new leads’ Available at: https://www.bbc.co.uk/news/uk-wales-25159467 (Accessed: 1 August 2018)

BBC News (2017) ‘British teacher held in Spain over child sexual images’ Available at: https://www.bbc.co.uk/news/uk-40847761 (Accessed: 1 August 2018)

Birk, D. and Wegener, C., 2011, May. Technical issues of forensic investigations in cloud computing environments. In Systematic Approaches to Digital Forensic Engineering (SADFE), 2011 IEEE Sixth International Workshop on (pp. 1-10). IEEE.

Casey, E., Geradts, Z. and Nikkel, B., 2018. Transdisciplinary strategies for digital investigation challenges. Digital Investigation 25 pp.1-4

Choo, K.K.R. and Dehghantanha, A. eds., 2016. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Syngress.

Daryabar, F., Dehghantanha, A. and Choo, K.K.R., 2017. Cloud storage forensics: MEGA as a case study. Australian Journal of Forensic Sciences, 49(3), pp.344-357.

Dropbox (2016) ‘Celebrating half a billion users’ Available at: https://blogs.dropbox.com/dropbox/2016/03/500-million/ (Accessed: 1 August 2018)

Dykstra, J. and Sherman, A.T., 2011, May. Understanding issues in cloud forensics: two hypothetical case studies. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 45-54).

Dykstra, J. and Sherman, A.T., 2012. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation, 9, pp.S90-S98.

Europol, E.C.C., 2014. The Internet Organised Crime Threat Assessment (IOCTA). Available at: https://www.europol.europa.eu/sites/default/files/documents/europol_iocta_web.pdf (Accessed: 1 August 2018)

Google (2017) ‘Requests for user information’ Available at: https://transparencyreport.google.com/user-data/overview?hl=en&user_requests_report_period=series:requests,accounts;authority:;time:Y2015H2&lu=user_requests_report_period (Accessed: 27 August 2018)

Grispos, G., Storer, T. and Glisson, W.B., 2012. Calm before the storm: The challenges of cloud computing in digital forensics. International Journal of Digital Crime and Forensics (IJDCF), 4(2), pp.28-48.

Hayes, B., 2008. Cloud computing. Communications of the ACM, 51(7), pp.9-11.

Horsman, G., 2018a. I didn't see that! An examination of internet browser cache behaviour following website visits. Digital Investigation, 25 105-113

Horsman, G., 2018b. Reconstructing streamed video content: A case study on YouTube and Facebook Live stream content in the Chrome web browser cache.

Horsman, G., 2018c. Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics. Computers & Security, 73, pp.294-306.

Horsman, G., 2018d. I didn't see that! An examination of internet browser cache behaviour following website visits. Digital Investigation.

James, J.I. and Gladyshev, P., 2016. A survey of mutual legal assistance involving digital evidence. Digital Investigation, 18, pp.23-32.

Malik, R., Shashidhar, N. and Chen, L., 2015. Cloud Storage Client Application Analysis. International Journal of Security, 9(1), p.1.

Martini, B., Do, Q. and Choo, K.K.R., 2015. Mobile cloud forensics: An analysis of seven popular Android apps. arXiv preprint arXiv:1506.05533.

Martini, B., Do, Q. and Raymond Choo, K.K., 2016. Digital forensics in the cloud era: The decline of passwords and the need for legal reform. Trends & Issues in Crime & Criminal Justice, (512).

Marturana, F., Me, G. and Tacconi, S., 2012, October. A case study on digital forensics in the cloud. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on (pp. 111-116). IEEE.

Mell, P. and Grance, T., 2011. The NIST definition of cloud computing.

Microsoft (2016) ‘London’s police officers get new tool to fight crime – Microsoft Azure’ Available at: https://news.microsoft.com/en-gb/2016/12/01/35558/ (Accessed August 10 2018)

Nirsoft (2018) ‘ChromeCacheView v1.77 - Cache viewer for Google Chrome Web browser’ Available at: https://www.nirsoft.net/utils/chrome_cache_view.html (Accessed August 10 2018)

O’Connell, Gerard (2018) ‘Vatican diplomat sentenced to five years in prison for child pornography crimes’ Available at: https://www.americamagazine.org/faith/2018/06/23/vatican-diplomat-sentenced-five-years-prison-child-pornography-crimes (Accessed: 1 August 2018)

Parliamentary Office of Science and Technology (2016) ‘Digital Forensics and Crime’ POSTnote 520 March 2016 Available at: http://researchbriefings.files.parliament.uk/documents/POST-PN-0520/POST-PN-0520.pdf (Accessed 19 July 2018)

Quick, D., Martini, B. and Choo, R., 2013. Cloud storage forensics. Syngress.

Ruan, K., Carthy, J., Kechadi, T. and Crosbie, M., 2011, January. Cloud forensics. In IFIP International Conference on Digital Forensics (pp. 35-46). Springer, Berlin, Heidelberg.

Ruparelia, N.B., 2016. Cloud computing. Mit Press.

Simou, S., Kalloniatis, C., Kavakli, E. and Gritzalis, S., 2014, June. Cloud forensics: identifying the major issues and challenges. In International Conference on Advanced Information Systems Engineering (pp. 271-284). Springer, Cham.

Sky News (2018) ‘Lucy McHugh murder suspect jailed for refusing to reveal Facebook password’ Available at: https://news.sky.com/story/lucy-mchugh-murder-suspect-jailed-for-refusing-to-reveal-facebook-password-11486507 (Accessed 3 September 2018)

Statista (2018a) ‘Number of consumer cloud-based service users worldwide in 2013 and 2018 (in billions)’ Available at: https://www.statista.com/statistics/321215/global-consumer-cloud-computing-users/ (Accessed 17 August 2018)

Statista (2018b) ‘Global market share held by the leading web browser versions as of February 2018’ Available at: https://www.statista.com/statistics/268299/most-popular-internet-browsers/ (Accessed 3 September 2018)

Statista (2018c) ‘Forecast number of personal cloud storage consumers/users worldwide from 2014 to 2020 (in millions)’ Available at: https://www.statista.com/statistics/499558/worldwide-personal-cloud-storage-users/ (Accessed 3 September 2018)

Thethi, N. and Keane, A., 2014, February. Digital forensics investigations in the cloud. In Advance Computing Conference (IACC), 2014 IEEE International (pp. 1475-1480). IEEE.

Zargari, S. and Benford, D., 2012, September. Cloud forensics: Concepts, issues, and challenges. In Emerging Intelligent Data and Web Technologies (EIDWT), 2012 Third International Conference on (pp. 236-243). IEEE.

Zawoad, S. and Hasan, R., 2013. Digital forensics in the cloud. ALABAMA UNIV IN BIRMINGHAM. Zawoad, S. and Hasan, R., 2012, December. I have the proof: Providing proofs of past data possession in cloud forensics. In Cyber Security (CyberSecurity), 2012 International Conference on (pp. 75-82). IEEE.


To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.