Digital Forensic Evidence Collection of Cloud Storage Data for Investigation

被引:0
作者
Easwaramoorthy, Sathishkumar [1 ]
Thamburasa, Sankar [2 ]
Samy, Guru [3 ]
Bhushan, S. Bharath [1 ]
Aravind, Karrothu [1 ]
机构
[1] VIT Univ, SITE, Vellore, Tamil Nadu, India
[2] Synoph Syst Private Ltd, Bangalore, Karnataka, India
[3] PSG Coll Technol, Dept Informat Technol, Coimbatore, Tamil Nadu, India
来源
2016 5TH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT) | 2016年
关键词
Digital forensics; web browser; client software; Microsoft One Drive; Amazon cloud Drive; Windows; 7; DATA REMNANTS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent days Cloud services such as storage is more familiar to business and Individuals. This storage services are found as a problem to examiners and researchers in the field of forensics. There are many kind of storage services available in cloud and every service face a diverse issues in illegitimate action. The evidence identification, preservation, and collection are hard when dissimilar services are utilized by offenders. Lack of knowledge regarding location of evidence data can also affect investigation and it take more time to meet every cloud storage providers to decide where the evidence is saved within their infrastructure. In this study two popular public cloud service providers (Microsoft One Drive and Amazon cloud drive) are used to perform forensics evidence collection procedure through browser and service providers software on a Windows 7 computer. By identifying the evidence data on a client device, provide a clear idea about type of evidences are exist in machine for forensics practitioners. Possible evidence determined throughout this study include file timestamps, file hashes, client software log files, memory captures, link files and other evidences are also obtainable to different cloud service providers.
引用
收藏
页数:6
相关论文
共 10 条
  • [1] Ben Martini Kim-Kwang, 2013, SCI DIRECT DIGITAL I, V10, P287
  • [2] Digital forensic investigation of cloud storage services
    Chung, Hyunji
    Park, Jungheum
    Lee, Sangjin
    Kang, Cheulhoon
    [J]. DIGITAL INVESTIGATION, 2012, 9 (02) : 81 - 95
  • [3] Amazon Cloud Drive forensic analysis
    Hale, Jason S.
    [J]. DIGITAL INVESTIGATION, 2013, 10 (03) : 259 - 265
  • [4] Martini Ben, 2012, SCI DIRECT DIGITAL I, V9, P71
  • [5] Google Drive: Forensic analysis of data remnants
    Quick, Darren
    Choo, Kim-Kwang Raymond
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 40 : 179 - 193
  • [6] Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
    Quick, Darren
    Choo, Kim-Kwang Raymond
    [J]. DIGITAL INVESTIGATION, 2013, 10 (03) : 266 - 277
  • [7] Digital droplets: Microsoft SkyDrive forensic data remnants
    Quick, Darren
    Choo, Kim-Kwang Raymond
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (06): : 1378 - 1394
  • [8] Quick Darren, 2013, SCI DIRECT DIGITAL I, V13, P63
  • [9] Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results
    Ruan, Keyun
    Carthy, Joe
    Kechadi, Tahar
    Baggili, Ibrahim
    [J]. DIGITAL INVESTIGATION, 2013, 10 (01) : 34 - 43
  • [10] shirkhekar Deoyani, 2014, INT J ADV RES COMPUT, V2, P192