Investigation model for locating data remnants on cloud storage
Cloud storage services allow users to store their data online and remotely access, maintain, manage, and back up their data from anywhere through the Internet. Although this storage is helpful, it challenges digital forensic investigators and practitioners in collecting, identifying, acquiring, and...
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
Springer Nature Switzerland
2019
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/24829/ http://umpir.ump.edu.my/id/eprint/24829/ http://umpir.ump.edu.my/id/eprint/24829/ http://umpir.ump.edu.my/id/eprint/24829/1/22.%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf http://umpir.ump.edu.my/id/eprint/24829/2/22.1%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf |
Summary: | Cloud storage services allow users to store their data online and remotely access, maintain, manage, and back up their data from anywhere through the Internet. Although this storage is helpful, it challenges digital forensic investigators and practitioners in collecting, identifying, acquiring, and preserving evidential data. This research proposes an investigation scheme for analyzing data remnants and determining probative artefacts in a cloud environment. Using the Box cloud as a case study, we collect the data remnants available on end-user device storage following the accessing, uploading, and storing of data in the cloud storage. The data remnants are collected from several sources, such as client software files, Prefetch, directory listings, registries, browsers, network PCAP, and memory and link files. Results indicate that the collected data remnants are helpful in determining a sufficient number of artefacts about investigated cybercrimes. |
---|