Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Forensics Analysis from Cloud Storage Client Application on Proprietary Operating System

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Authors:
Amirullah Amirullah, Imam Riadi, Ahmad Luthfi
10.5120/ijca2016907696

Amirullah Amirullah, Imam Riadi and Ahmad Luthfi. Forensics Analysis from Cloud Storage Client Application on Proprietary Operating System. International Journal of Computer Applications 143(1):1-7, June 2016. BibTeX

@article{10.5120/ijca2016907696,
	author = {Amirullah Amirullah and Imam Riadi and Ahmad Luthfi},
	title = {Forensics Analysis from Cloud Storage Client Application on Proprietary Operating System},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2016},
	volume = {143},
	number = {1},
	month = {Jun},
	year = {2016},
	issn = {0975-8887},
	pages = {1-7},
	numpages = {7},
	url = {http://www.ijcaonline.org/archives/volume143/number1/25038-2016907696},
	doi = {10.5120/ijca2016907696},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Increased use of cloud storage services have become a necessity alternative that complements the main storage media in everyday activities because it offers ease of doing automatic backups, sharing files and photos and so forth on a variety of computing devices and smartphones. It is very possible loopholes for criminals to store illegal files or matters relating to such activities. There are various types of cloud services with each type having a different potential use in criminal activities. One area of ​​difficulty is the identification and acquisition of potential data when different services can be exploited by criminals. Because geographically cloud servers scattered in various regions. This causes difficulties for digital forensic investigators will add time and expense, to contact all potential service providers to determine whether the data stored in the server cloud services. This paper presented at a target on the client side user application to help find the data renmant on the use of cloud storage applications of various service provider on the proprietary operating system focuses on the Windows 10 platform. Results from this research include a variety of state after the install, deleted and uninstall web browser and memory, in order to find digital evidence. Based on the test results the success index average was 82.63% and the remaining can not be analyzed, the results depend on various state, procedures and tools that are used, the research can be carried out smoothly.

References

  1. Cisco.com, “No Title,” 2015. [Online]. Available: a) http://newsroom.cisco.com/press-release-content?type=webcontent&articleId=1724918. [Accessed: 01-Nov-2015].
  2. Cisco, “Cisco Global Cloud Index: Forecast and Methodology, 2014–2019,” Cisco Press, 2015. [Online]. Available: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/global-cloud-index-gci/Cloud_Index_White_Paper.pdf. [Accessed: 01-Nov-2015].
  3. D. Quick, B. Martini, and K.-K. R. Choo, Cloud Storage Forensics. 2014.
  4. M. Epifani, “Cloud Storage Forensics,” in SANS Eurupean Digital Forensics Summit 2013, 2013.
  5. J. Chung, H., Park and C. Lee, S., Kang, “Digital Forensic Investigation of Cloud Storage Services, Digital Investigation,” 2012.
  6. S. Mehreen and B. Aslam, “Windows 8 cloud storage analysis: Dropbox forensics,” in 2015 12th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 2015, pp. 312–317.
  7. R. Malik, “Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform,” Int’l Conf. Secur. Manag., 2015.
  8. M. Borgmann, T. Hahn, M. Herfert, T. Kunz, M. Richter, U. Viebeg, and S. Vowé, On the Security of Cloud Storage Services. Fraunhofer Verlag; Stuttgart, Germany: Fraunhofer Institute for Secure Information Technology SIT, 2012.
  9. T. Prasath and S. Karthikeyan, “Cloud Storage Vendors Wide Support and Security Key Features for Shifting Towards Business Perspective,” Int. J. Cloud Comput. Serv. Sci., vol. 2, no. 6, pp. 421–426, 2013.
  10. M. Lohnash and G. Akerlund, “Online Backup Comparison,” 2015. [Online]. Available: http://www.backupreview.com/online-comp-provider/. [Accessed: 01-Nov-2015].
  11. G. Reese, “Cloud Forensics Using Ebs Boot Volumes,” Oreilly.com, 2010.
  12. A. Iswardani and I. Riadi, “Denial of service log analysis using density k-means method,” J. Theor. Appl. Inf. Technol., vol. 83, no. 2, p. 2, 2016.
  13. P. . Clark, “Digital Forensics Tool Testing–Image Metadata in the Cloud’, Department of Computer Science and Media Technology,” Gjøvik Univ. Coll., 2011.
  14. A. K. Mccurdy, “Dropbox : Forensic Detection the requirements of Edinburgh Napier University,” 2013.
  15. H. Chung, J. Park, S. Lee, and C. Kang, “Digital forensic investigation of cloud storage services,” Digit. Investig., vol. 9, no. 2, pp. 81–95, 2012.
  16. Www.dropbox.com, “No Title.” [Online]. Available: http://www.dropbox.com.
  17. Copy.com, “No Title.” [Online]. Available: http://www.copy.com.
  18. Www.cloudme.com, “No Title.” [Online]. Available: http://www.cloudme.com.

Keywords

Cloud, Storage, Forensics, Operating System, Windows 10.