CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Extracting Potential Forensic Evidences from Cloud Client Device using own Cloud as a Case Study

by Ghania Al Sadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 7
Year of Publication: 2015
Authors: Ghania Al Sadi
10.5120/ijca2015907482

Ghania Al Sadi . Extracting Potential Forensic Evidences from Cloud Client Device using own Cloud as a Case Study. International Journal of Computer Applications. 132, 7 ( December 2015), 15-21. DOI=10.5120/ijca2015907482

@article{ 10.5120/ijca2015907482,
author = { Ghania Al Sadi },
title = { Extracting Potential Forensic Evidences from Cloud Client Device using own Cloud as a Case Study },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 7 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number7/23605-2015907482/ },
doi = { 10.5120/ijca2015907482 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:28:30.878058+05:30
%A Ghania Al Sadi
%T Extracting Potential Forensic Evidences from Cloud Client Device using own Cloud as a Case Study
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 7
%P 15-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The highly distribution of cloud storage as a mean to store data rises the need to find a suitable forensic methods to extract forensic evidences during investigating criminal or illegal activities on cloud accounts. Most accurate evidences can be extracted from cloud serves; however forensic investigators cannot grant access to cloud servers due to privacy policies followed by cloud providers. Actually, amount of evidences can be extracted from client devices that may be of forensic investigator’s interests. This research utilizes open source cloud software to study cloud client structure to extract potential evidences from cloud client devices that will serve cloud forensic investigation field.

References
  1. Birk D, Wegener C. Technical Issues of Forensic Investigations in Cloud Computing Environments. 2011 Sixth IEEE Int Work Syst Approaches to Digit Forensic Eng [Internet]. 2011;1–10. Available from: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6159124
  2. Borgmann M. On the Security of Cloud Storage Services. 2012;1–146. Available from: papers3://publication/uuid/FE433248-1727-4313-A988-9EFC0E1B7CE9
  3. Council of Europe. Cyberterrorism: The Use of the Internet for Terrorist Purposes. 2007;497.
  4. Haggerty J. Digital Forensics in the Organisation. 2013;(October):17–20.
  5. Hani AFM, Paputungan IV, Hassan MF, Asirvadam VS, Daharus M. Development of private cloud storage for medical image research data. 2014 Int Conf Comput Inf Sci [Internet]. 2014;1–6. Available from: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6868433
  6. Martini B, Choo K-KR. An integrated conceptual digital forensic framework for cloud computing. Digit Investig [Internet]. Elsevier Ltd; 2012;9(2):71–80. Available from: http://linkinghub.elsevier.com/retrieve/pii/S174228761200059X
  7. Martini B, Choo K-KR. Cloud storage forensics: ownCloud as a case study. Digit Investig [Internet]. Elsevier Ltd; 2013;10(4):287–99. Available from: http://linkinghub.elsevier.com/retrieve/pii/S1742287613000911
  8. Sabahi F. Cloud computing security threats and responses. 2011 IEEE 3rd Int Conf Commun Softw Networks. 2011;245–9.
  9. Wu J, Ping L, Ge X, Wang Y, Fu J. Cloud Storage as the Infrastructure of Cloud Computing. 2010 Int Conf Intell Comput Cogn Informatics [Internet]. 2010;380–3. Available from: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5565955
  10. Zawoad S, Hasan R. Digital Forensics in the Cloud. CrossTalk [Internet]. 2013;(October):17–20. Available from: http://www.crosstalkonline.org/storage/issue-archives/2013/201309/201309-Zawoad.pdf
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Storage Cloud Forensic Cloud Client Forensic Framework Potential Evidences