Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync
Mark Scanlon,Jason Farina,Nhien An Le Khac,Tahar Kechadi +3 more
- Vol. 9, Iss: 2, pp 85-99
TLDR
6th International Conference on Digital Forensics and Cyber Crime (ICDF2C 2014), New Haven, Connecticut, United States, 18-20 September 2014Abstract:
6th International Conference on Digital Forensics and Cyber Crime (ICDF2C 2014), New Haven, Connecticut, United States, 18-20 September 2014read more
Citations
More filters
Journal ArticleDOI
Forensic investigation of P2P cloud storage services and backbone for IoT networks
TL;DR: The cloud forensics framework of Martini and Choo is extended to provide a forensically sound investigation methodology for the newer BitTorrent Sync applications, suggesting that artefacts relating to the installation, uninstallation, log-in,log-off, and file synchronisation could be recovered, which are potential sources of IoT forensics.
Proceedings ArticleDOI
Battling the digital forensic backlog through data deduplication
TL;DR: A novel solution to combat the digital forensic backlog is discussed that leverages a deduplication-based paradigm to eliminate the reacquisition, redundant storage, and reanalysis of previously processed data.
Proceedings ArticleDOI
Overview of the Forensic Investigation of Cloud Services
TL;DR: The state-of-the-art in cloud-focused, digital forensic practises for the collection and analysis of evidence and an overview of the potential use of cloud technologies to provide Digital Forensics as a Service are examined.
Journal ArticleDOI
Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study.
Yee-Yang Teing,Ali Dehghantanha,Kim-Kwang Raymond Choo,Kim-Kwang Raymond Choo,Tooska Dargahi,Mauro Conti +5 more
TL;DR: This research contributes to an in‐depth understanding of the types of terrestrial artifacts that are likely to remain after the use of cooperative storage cloud on client devices.
Journal ArticleDOI
CloudMe forensics: A case of big data forensic investigation
TL;DR: In this article, the types and locations of the artefacts relating to the installation and uninstallation of CloudMe client application, logging in and out, and file synchronization events from the computer desktop and mobile clients are described.
References
More filters
Journal ArticleDOI
Digital forensic investigation of cloud storage services
TL;DR: In this article, the authors proposed a new procedure for investigating and analyzing the artifacts of all accessible devices, such as Windows system, Mac system, iPhone, and Android smartphone, for forensic investigation of cloud storage services.
Book ChapterDOI
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
Arthur Huang,David Levinson +1 more
Journal ArticleDOI
Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
TL;DR: It was determined that there were no changes to the contents of files during the process of upload, storage, and download to the three cloud storage services and the timestamps remained the same throughout the process.
Proceedings ArticleDOI
Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services
TL;DR: In this paper, the authors present a preliminary investigation into the residual artifacts created on an iOS and Android device that has accessed a cloud storage service and provide an initial assessment on the extent to which cloud storage data is stored on these client-side devices This view acts as a proxy for data stored in the cloud.
Book
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
Andrew Hoog,Katie Strzempka +1 more
TL;DR: The iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner and can be taken into any court room.