scispace - formally typeset
Open AccessJournal ArticleDOI

Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync

Mark Scanlon, +3 more
- Vol. 9, Iss: 2, pp 85-99
TLDR
6th International Conference on Digital Forensics and Cyber Crime (ICDF2C 2014), New Haven, Connecticut, United States, 18-20 September 2014
Abstract
6th International Conference on Digital Forensics and Cyber Crime (ICDF2C 2014), New Haven, Connecticut, United States, 18-20 September 2014

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Forensic investigation of P2P cloud storage services and backbone for IoT networks

TL;DR: The cloud forensics framework of Martini and Choo is extended to provide a forensically sound investigation methodology for the newer BitTorrent Sync applications, suggesting that artefacts relating to the installation, uninstallation, log-in,log-off, and file synchronisation could be recovered, which are potential sources of IoT forensics.
Proceedings ArticleDOI

Battling the digital forensic backlog through data deduplication

TL;DR: A novel solution to combat the digital forensic backlog is discussed that leverages a deduplication-based paradigm to eliminate the reacquisition, redundant storage, and reanalysis of previously processed data.
Proceedings ArticleDOI

Overview of the Forensic Investigation of Cloud Services

TL;DR: The state-of-the-art in cloud-focused, digital forensic practises for the collection and analysis of evidence and an overview of the potential use of cloud technologies to provide Digital Forensics as a Service are examined.
Journal ArticleDOI

Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study.

TL;DR: This research contributes to an in‐depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices.
Journal ArticleDOI

CloudMe forensics: A case of big data forensic investigation

TL;DR: In this article, the types and locations of the artefacts relating to the installation and uninstallation of CloudMe client application, logging in and out, and file synchronization events from the computer desktop and mobile clients are described.
References
More filters
Journal ArticleDOI

Digital forensic investigation of cloud storage services

TL;DR: In this article, the authors proposed a new procedure for investigating and analyzing the artifacts of all accessible devices, such as Windows system, Mac system, iPhone, and Android smartphone, for forensic investigation of cloud storage services.
Journal ArticleDOI

Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?

TL;DR: It was determined that there were no changes to the contents of files during the process of upload, storage, and download to the three cloud storage services and the timestamps remained the same throughout the process.
Proceedings ArticleDOI

Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services

TL;DR: In this paper, the authors present a preliminary investigation into the residual artifacts created on an iOS and Android device that has accessed a cloud storage service and provide an initial assessment on the extent to which cloud storage data is stored on these client-side devices This view acts as a proxy for data stored in the cloud.
Book

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

TL;DR: The iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner and can be taken into any court room.
Related Papers (5)