Abstract: As the distinction between personal and organizational device usage continues to blur, the combination of applications that interact increases the need to investigate potential security issues. Although security and forensic researchers have been able to recover a variety of artifacts, empirical research has not examined a suite of application artifacts from the perspective of high-level pattern identification. This research presents a preliminary investigation into the idea that residual artifacts generated by cloud-based synchronized applications can be used to identify broad user behavior patterns. To accomplish this, the researchers conducted a single-case, pretest-posttest, quasi experiment using a smartphone device and a suite of Google mobile applications. The contribution of this paper is two-fold. First, it provides a proof of concept of the extent to which residual data from cloud-based synchronized applications can be used to broadly identify user behavior patterns from device data patterns. Second, it highlights the need for security controls to prevent and manage information flow between BYOD mobile devices and cloud synchronization services.
Keywords: Bring Your Own Device (BYOD), Cloud, Apps, Digital Forensics, Residual data
Download this article: JISAR - V8 N2 Page 4.pdf
Recommended Citation: Grispos, G., Glisson, W. B., Pardue, J., Dickson, M. (2015). Identifying User Behavior from Residual Data in Cloud-based Synchronized Apps. Journal of Information Systems Applied Research, 8(2) pp 4-14. http://jisar.org/2015-8/ ISSN: 1946-1836. (A preliminary version appears in The Proceedings of CONISAR 2014)