메뉴 건너뛰기




Volumn 10, Issue 4, 2013, Pages 287-299

Cloud storage forensics: OwnCloud as a case study

Author keywords

Cloud forensics; Cloud storage forensics; Digital forensics; Open source cloud; Private cloud; SaaS; StaaS; Storage as a service

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER CRIME; DIGITAL FORENSICS; DIGITAL STORAGE; ELECTRONIC CRIME COUNTERMEASURES;

EID: 84889083567     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2013.08.005     Document Type: Article
Times cited : (128)

References (35)
  • 1
    • 84889095236 scopus 로고    scopus 로고
    • AARNET viewed 10 April 2013
    • AARNET CloudStor+ 2013 viewed 10 April 2013
    • (2013) CloudStor+
  • 3
    • 84889099910 scopus 로고    scopus 로고
    • Australian Government Department of Broadband, Communications and the Digital Economy
    • Australian Government Department of Broadband, Communications and the Digital Economy The national cloud computing strategy 2013
    • (2013) The National Cloud Computing Strategy
  • 4
    • 84889100924 scopus 로고    scopus 로고
    • Australian Government Parliamentary Joint Committee on Intelligence and Security
    • Australian Government Parliamentary Joint Committee on Intelligence and Security Proof Committee Hansard (Public) Wednesday, 5 September 2012 2012
    • (2012) Proof Committee Hansard (Public) Wednesday, 5 September 2012
  • 7
    • 84870254680 scopus 로고    scopus 로고
    • Digital forensic investigation of cloud storage services
    • H. Chung, J. Park, S. Lee, and C. Kang Digital forensic investigation of cloud storage services Digital Investigation 9 2 2012 81 95
    • (2012) Digital Investigation , vol.9 , Issue.2 , pp. 81-95
    • Chung, H.1    Park, J.2    Lee, S.3    Kang, C.4
  • 9
    • 84864596423 scopus 로고    scopus 로고
    • Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
    • J. Dykstra, and A.T. Sherman Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques Digital Investigation 9 1 2012 S90 S98
    • (2012) Digital Investigation , vol.9 , Issue.1
    • Dykstra, J.1    Sherman, A.T.2
  • 10
    • 84876187834 scopus 로고    scopus 로고
    • European Network and Information Security Agency (ENISA) European Network and Information Security Agency Heraklion, Greece
    • European Network and Information Security Agency (ENISA) Procure secure: a guide to monitoring of security service levels in cloud contracts 2012 European Network and Information Security Agency Heraklion, Greece
    • (2012) Procure Secure: A Guide to Monitoring of Security Service Levels in Cloud Contracts
  • 13
    • 84875587046 scopus 로고    scopus 로고
    • Cloud computing and its implications for cybercrime investigations in Australia
    • C. Hooper, B. Martini, and K.-K.R. Choo Cloud computing and its implications for cybercrime investigations in Australia Computer Law & Security Review 29 2 2013 152 163
    • (2013) Computer Law & Security Review , vol.29 , Issue.2 , pp. 152-163
    • Hooper, C.1    Martini, B.2    Choo, K.-K.R.3
  • 18
    • 85013973534 scopus 로고    scopus 로고
    • Storage-as-a-service poised for big boost
    • J. Kovar Storage-as-a-service poised for big boost CRN 1291 2009 14 18
    • (2009) CRN , vol.1291 , pp. 14-18
    • Kovar, J.1
  • 19
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • B. Martini, and K.-K.R. Choo An integrated conceptual digital forensic framework for cloud computing Digital Investigation 9 2 2012 71 80
    • (2012) Digital Investigation , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 22
  • 26
    • 84889103076 scopus 로고    scopus 로고
    • ownCloud viewed 12 July 2013
    • ownCloud Sync clients | ownCloud.org 2013 viewed 12 July 2013
    • (2013) Sync Clients | OwnCloud.org
  • 27
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: Data remnants on user machines
    • D. Quick, and K.-K.R. Choo Dropbox analysis: Data remnants on user machines Digital Investigation 10 1 2013 3 18
    • (2013) Digital Investigation , vol.10 , Issue.1 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 28
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • D. Quick, and K.-K.R. Choo Digital droplets: Microsoft SkyDrive forensic data remnants Future Generation Computer Systems 29 6 2013 1378 1394
    • (2013) Future Generation Computer Systems , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 31
    • 84889086422 scopus 로고    scopus 로고
    • United Nations Office on Drugs and Crime (UNODC) United Nations New York, US
    • United Nations Office on Drugs and Crime (UNODC) The use of the Internet for terrorist purposes 2012 United Nations New York, US
    • (2012) The Use of the Internet for Terrorist Purposes
  • 32
    • 35248883259 scopus 로고    scopus 로고
    • United States National Institute of Justice (US NIJ) U.S. Department of Justice Washington, DC
    • United States National Institute of Justice (US NIJ) Forensic examination of digital evidence: a guide for law enforcement 2004 U.S. Department of Justice Washington, DC
    • (2004) Forensic Examination of Digital Evidence: A Guide for Law Enforcement
  • 33
    • 84889091912 scopus 로고    scopus 로고
    • Cloud-based data storage
    • J. Waters Cloud-based data storage The Education Digest 76 8 2011 28 34
    • (2011) The Education Digest , vol.76 , Issue.8 , pp. 28-34
    • Waters, J.1
  • 34
    • 84889095749 scopus 로고    scopus 로고
    • How to choose a storage as a service provider
    • 18 February 2009
    • M. Wipperfeld How to choose a storage as a service provider eWeek 2009 18 February 2009
    • (2009) EWeek
    • Wipperfeld, M.1
  • 35
    • 84870235296 scopus 로고    scopus 로고
    • The digital forensics cyber exchange principle
    • December 2011-January 2012
    • K. Zatyko, and J. Bay The digital forensics cyber exchange principle Forensic Magazine 2012 13 15 December 2011-January 2012
    • (2012) Forensic Magazine , pp. 13-15
    • Zatyko, K.1    Bay, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.