scispace - formally typeset
Proceedings ArticleDOI

Digital forensic analysis of cloud storage data in IDrive and Mega cloud drive

Reads0
Chats0
TLDR
Key evidences discovered on this investigation comprises of RAM memory captures, registry files application logs, file time and date values and browser artifacts are acquired from these two cloud companies on a user windows machine.
Abstract
In this technological world one of the general method for user to save their data is cloud. Most of the cloud storage company provides some storage space as free to its users. Both individuals and corporate are storing their files in the cloud infrastructure so it becomes a problem for a forensics analyst to perform evidence acquisition and examination. One reason that makes evidence acquisition more difficult is user data always saved in remote computer on cloud. Various cloud companies available in the market serving storage as one of their services and everyone delivering different kinds of features and facilities in the storage technology. One area of difficulty is the acquisition of evidential data associated to a cybercrime stored in a different cloud company service. Due to lack of understanding about the location of evidence data regarding which place it is saved could also affect an analytical process and it take a long time to speak with all cloud service companies to find whether data is saved within their cloud. By analyzing two cloud service companies (IDrive and Mega cloud drive) this study elaborates the various steps involved in the activity of obtaining evidence on a user account through a browser and then via cloud software application on a Windows 7 machine. This paper will detail findings for both the Mega cloud drive and IDrive client software, to find the different evidence that IDrive and the mega cloud drive leaves behind on a user computer. By establishing the artifacts on a user machine will give an overall idea regarding kind of evidence residue in user computer for investigators. Key evidences discovered on this investigation comprises of RAM memory captures, registry files application logs, file time and date values and browser artifacts are acquired from these two cloud companies on a user windows machine.

read more

Citations
More filters
Journal ArticleDOI

A novel predicate based access control scheme for cloud environment using open stack swift storage

TL;DR: A framework termed Predicate Based Access Control (PBAC) is proposed to render fine grained access control to Swift storage, an object storage service in open source cloud named OpenStack that makes the Swift storage and retrieval more secure.
Journal ArticleDOI

A Comprehensive Review on Secure Data Sharing in Cloud Environment

TL;DR: Various protocols, management and control mechanisms under data security, access control, query grouping and energy efficiency headings are proposed and developed to help future researchers in developing efficient, security data sharing schemes in cloud environment.
Proceedings ArticleDOI

Forensics Readiness survey in cloud computing with a meta-analysis approach

TL;DR: This paper discusses the literature study using a meta-analysis approach that applies social network analysis from 38 papers that discuss forensic readiness with its supporting factors to get the most ideal model/framework for forensics readiness on the cloud from previously published research.
Book ChapterDOI

A Taxonomy of Cloud Endpoint Forensic Tools

TL;DR: This chapter presents a taxonomy of the forensic tools used to extract data from endpoint devices and from cloud service providers, and provides investigators with an easily searchable catalog of tools that can meet their technical requirements during cloud forensic investigations.
References
More filters
Journal ArticleDOI

Impacts of increasing volume of digital forensic data

TL;DR: It is concluded that there remains a need for further research with a focus on real world applicability of a method or methods to address the digital forensic data volume challenge.
Journal ArticleDOI

Digital forensic investigation of cloud storage services

TL;DR: In this article, the authors proposed a new procedure for investigating and analyzing the artifacts of all accessible devices, such as Windows system, Mac system, iPhone, and Android smartphone, for forensic investigation of cloud storage services.
Journal ArticleDOI

Dropbox analysis: Data remnants on user machines

TL;DR: By determining the data remnants on client devices, research contributes to a better understanding of the types of terrestrial artifacts that are likely to remain for digital forensics practitioners and examiners.
Journal ArticleDOI

Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results

TL;DR: The researcher presents the results and analysis of a survey that was widely circulated among digital forensic experts and practitioners internationally on cloud forensics and critical criteria for cloud forensic capability in order to better understand the key fundamental issues of cloud forensic such as its definition, scope, challenges, opportunities and missing capabilities.
Journal ArticleDOI

Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?

TL;DR: It was determined that there were no changes to the contents of files during the process of upload, storage, and download to the three cloud storage services and the timestamps remained the same throughout the process.