Abstract | ||
---|---|---|
In this paper, we seek to determine the residual artefacts of forensic value on Windows and Ubuntu client machines of using Syncany private cloud storage service. We demonstrate the types and the locations of the artefacts that can be forensically recovered (e.g. artefacts associated with the installation, uninstallation, log-in, log-off, and file synchronisation actions). Findings from this research contribute to an in-depth understanding of cloud-enabled big data storage forensics related to the collection of big data artefacts from a private cloud storage service, which have real-world implications and impacts (e.g. in criminal investigations and civil litigations). Echoing the observations of Ab Rahman et al. (2006), we reiterated the importance of forensic-by-design in future cloud-enabled big data storage solutions. |
Year | DOI | Venue |
---|---|---|
2016 | 10.1007/978-3-319-49145-5_34 | Lecture Notes in Computer Science |
Keywords | DocType | Volume |
Cloud forensics,Cloud-enabled big data storage forensics,Syncany forensics,Client forensics,Memory forensics | Conference | 67 |
ISSN | Citations | PageRank |
0302-9743 | 2 | 0.40 |
References | Authors | |
26 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yee-Yang Teing | 1 | 9 | 1.88 |
Ali Dehghantanha | 2 | 446 | 48.15 |
Kim-Kwang Raymond Choo | 3 | 4103 | 362.49 |
Zaiton Muda | 4 | 23 | 2.58 |
Mohd Taufik Abdullah | 5 | 28 | 6.27 |
Wee-Chiat Chai | 6 | 2 | 0.40 |