International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 187 - Number 17 |
Year of Publication: 2025 |
Authors: Joy Awoleye, Sarah Mavire, Allan Munyira, Kelvin Magora |
![]() |
Joy Awoleye, Sarah Mavire, Allan Munyira, Kelvin Magora . Forensic Analysis Frameworks for Encrypted Cloud Storage Investigations. International Journal of Computer Applications. 187, 17 ( Jun 2025), 8-19. DOI=10.5120/ijca2025925241
The use of encryption in cloud storage is so rampant that traditional hard disk imaging and file carving methods are no longer as good. Traditional methods are compromised by encrypted data, especially in such distributed infrastructures that do not allow direct fetching. The layered forensic framework in this research targets the impediments of client-side and provider-managed encryption in cloud ecosystems. The framework includes three different investigative components: Type 1 analysis, interpretation of the system logs, and data metadata evaluation. By concentrating on unique weaknesses in cryptologic systems, the framework enables indirect restoration and recovery in the absence of regular access procedures. To carry out simulated practical encrypted cloud activities, a testbed was developed, consisting of VeraCrypt containers, AWS-like logging schemes, along with standard endpoint metadata. To assess the framework, open-source tools including Volatility, ELK Stack, and EnCase were deployed to compare performance with traditional forensic procedures. The analysis showed significant improvements in terms of recovery of encryption keys, reliability of rebuilding sessions, and more effective sketching of behaviour. The framework brought 65% (compared to less than 5% baseline) recovery of the encryption keys; ensured 80% session reconstruction completeness (compared to only 35%); and discovered 70% of behavioural patterns (compared to 30%). For the legal and ethical considerations, the framework used only the non-content artefact, and its analysis was organised in accordance with the GDPR rules. Through the provision of a modular, provider-independent approach to cloud-based encrypted forensics, the present study furthers future developments in mobile, IoT, and cross-border cloud-based data investigations. The study demonstrates that when indirect artefacts are placed in a structured, unified package, they offer strong, admissible digital evidence in encryption-based contexts.