메뉴 건너뛰기




Volumn 49, Issue 3, 2017, Pages 344-357

Cloud storage forensics: MEGA as a case study

Author keywords

Android forensics; cloud forensics; cloud storage application forensics; iOS forensics

Indexed keywords

ARTICLE; ARTIFACT; CASE STUDY; CLOUD COMPUTING; DATA ANALYSIS; DATA BASE; FORENSIC SCIENCE; INFORMATION PROCESSING; METHODOLOGY; MOBILE APPLICATION; PROCESS MODEL;

EID: 84963876744     PISSN: 00450618     EISSN: 1834562X     Source Type: Journal    
DOI: 10.1080/00450618.2016.1153714     Document Type: Article
Times cited : (39)

References (52)
  • 1
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • Martini B, Choo K-KR. An integrated conceptual digital forensic framework for cloud computing. Digit Investig. 2012;9:71–80.10.1016/j.diin.2012.07.001
    • (2012) Digit Investig , vol.9 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 4
    • 85013170297 scopus 로고    scopus 로고
    • Towards a unified forensic investigation framework of smartphones
    • Mohtasebi, SH, Dehghantanha A, Towards a unified forensic investigation framework of smartphones. Int J Comput Theory Eng. 2013;5:351–355. 10.7763/IJCTE.2013.V5.708
    • (2013) Int J Comput Theory Eng , vol.5 , pp. 351-355
    • Mohtasebi, S.H.1    Dehghantanha, A.2
  • 14
    • 84963541600 scopus 로고    scopus 로고
    • Conceptual evidence collection and analysis methodology for android devices
    • Martini B, Do Q, Choo K-KR. Conceptual evidence collection and analysis methodology for android devices. Cloud Secur Ecosyst. 2015;285–307:doi:10.1016/B978-0-12-801595-7.00014-8.
    • (2015) Cloud Secur Ecosyst , pp. 285-307
    • Martini, B.1    Do, Q.2    Choo, K.-K.R.3
  • 15
    • 85018181307 scopus 로고    scopus 로고
    • Chapter 15 - mobile cloud forensics: an analysis of seven popular android apps
    • Martini, B, Do, Q, Choo, K-KR, Chapter 15 - mobile cloud forensics:an analysis of seven popular android apps. Cloud Secur Ecosyst. 2015;309–345. doi:http://dx.doi.org/10.1016/B978-0-12-801595-7.00015-X10.1016/B978-0-12-801595-7.00015-X
    • (2015) Cloud Secur Ecosyst , pp. 309-345
    • Martini, B.1    Do, Q.2    Choo, K.-K.R.3
  • 16
    • 84964403528 scopus 로고    scopus 로고
    • Investigating social networking applications on smartphones: detecting Facebook, twitter, LinkedIn, and Google+ artifacts on Android and iOS platforms
    • In press
    • Norouzi, F, Dehghantanha, A, Eterovic-Soric, B, Choo, K-KR. Investigating social networking applications on smartphones:detecting Facebook, twitter, LinkedIn, and Google+ artifacts on Android and iOS platforms. Aust J Forensics Sci. 2015. [In press].
    • (2015) Aust J Forensics Sci
    • Norouzi, F.1    Dehghantanha, A.2    Eterovic-Soric, B.3    Choo, K.-K.R.4
  • 18
    • 84964322400 scopus 로고    scopus 로고
    • Chapter 19 - Ubuntu One investigation: Detecting evidences on client machines
    • Choo R.K.-K.R., (ed), Boston: Syngress
    • Shariati, M, Dehghantanha, A, Martini, B, Choo, K-KR. The cloud security ecosystem. Boston:Syngress; 2015. Chapter 19 - Ubuntu One investigation:Detecting evidences on client machines (ed. Choo RK-KR,); 429–446.
    • (2015) The cloud security ecosystem , pp. 429-446
    • Shariati, M.1    Dehghantanha, A.2    Martini, B.3    Choo, K.-K.R.4
  • 21
    • 84938850824 scopus 로고    scopus 로고
    • Investigating social networking applications on smartphones detecting Facebook, twitter, LinkedIn and Google+ artefacts on Android and iOS platforms
    • Norouzizadeh Dezfouli F, Dehghantanha, A, Eterovic-Soric, B, Choo, K.-K. R. Investigating social networking applications on smartphones detecting Facebook, twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Aust J Forensic Sci. 2015;1–20:doi:10.1080/00450618.2015.1066854.
    • (2015) Aust J Forensic Sci , pp. 1-20
    • Norouzizadeh Dezfouli, F.1    Dehghantanha, A.2    Eterovic-Soric, B.3    Choo, K.K.R.4
  • 26
    • 84919570761 scopus 로고    scopus 로고
    • Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users
    • Imgraben J, Engelbrecht A, Choo K-KR. Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav Inf Technol. 2014;33:1347–1360.10.1080/0144929X.2014.934286
    • (2014) Behav Inf Technol , vol.33 , pp. 1347-1360
    • Imgraben, J.1    Engelbrecht, A.2    Choo, K.-K.R.3
  • 31
    • 84884589497 scopus 로고    scopus 로고
    • Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?
    • Quick D, Choo K-KR. Forensic collection of cloud storage data:does the act of collection result in changes to the data or its metadata? Digit. Investig. 2013;10:266–277.10.1016/j.diin.2013.07.001
    • (2013) Digit. Investig , vol.10 , pp. 266-277
    • Quick, D.1    Choo, K.-K.R.2
  • 33
    • 84870254680 scopus 로고    scopus 로고
    • Digital forensic investigation of cloud storage services
    • Chung H, Park J, Lee S, Kang C. Digital forensic investigation of cloud storage services. Digit Investig. 2012;9:81–95.10.1016/j.diin.2012.05.015
    • (2012) Digit Investig , vol.9 , pp. 81-95
    • Chung, H.1    Park, J.2    Lee, S.3    Kang, C.4
  • 35
    • 84864596423 scopus 로고    scopus 로고
    • Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques
    • Dykstra J, Sherman AT. Acquiring forensic evidence from infrastructure-as-a-service cloud computing:exploring and evaluating tools, trust, and techniques. Digit Investig. 2012;9:S90–S98.10.1016/j.diin.2012.05.001
    • (2012) Digit Investig , vol.9 , pp. S90-S98
    • Dykstra, J.1    Sherman, A.T.2
  • 36
    • 84884590254 scopus 로고    scopus 로고
    • Amazon cloud drive forensic analysis
    • Hale JS. Amazon cloud drive forensic analysis. Digit Investig. 2013;10:259–265.10.1016/j.diin.2013.04.006
    • (2013) Digit Investig , vol.10 , pp. 259-265
    • Hale, J.S.1
  • 37
    • 84875493689 scopus 로고    scopus 로고
    • Using smartphones as a proxy for forensic evidence contained in cloud storage services
    • Wailea, HI, USA: IEEE
    • Grispos, G, Glisson, WB, Storer, T. Using smartphones as a proxy for forensic evidence contained in cloud storage services. In 2013 46th Hawaii International Conference on System Sciences. Wailea, HI, USA:IEEE; 2013, 4910–4919. doi:10.1109/HICSS.2013.592
    • (2013) 2013 46th Hawaii International Conference on System Sciences , pp. 4910-4919
    • Grispos, G.1    Glisson, W.B.2    Storer, T.3
  • 38
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: Owncloud as a case study
    • Martini B, Choo K-KR. Cloud storage forensics:Owncloud as a case study. Digit Investig. 2013;10:287–299.10.1016/j.diin.2013.08.005
    • (2013) Digit Investig , vol.10 , pp. 287-299
    • Martini, B.1    Choo, K.-K.R.2
  • 39
    • 84920152770 scopus 로고    scopus 로고
    • Distributed filesystem forensics: xtreemfs as a case study
    • Martini B, Choo K-KR. Distributed filesystem forensics:xtreemfs as a case study. Digit Investig. 2014;11:295–313.10.1016/j.diin.2014.08.002
    • (2014) Digit Investig , vol.11 , pp. 295-313
    • Martini, B.1    Choo, K.-K.R.2
  • 40
    • 84896319180 scopus 로고    scopus 로고
    • Google drive: forensic analysis of data remnants
    • Quick D, Choo K-KR. Google drive:forensic analysis of data remnants. J Netw Comput Appl. 2014;40:179–193.10.1016/j.jnca.2013.09.016
    • (2014) J Netw Comput Appl , vol.40 , pp. 179-193
    • Quick, D.1    Choo, K.-K.R.2
  • 41
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: Microsoft SkyDrive forensic data remnants
    • Quick D, Choo K-KR. Digital droplets:Microsoft SkyDrive forensic data remnants. Futur Gener Comput Syst. 2013;29:1378–1394.10.1016/j.future.2013.02.001
    • (2013) Futur Gener Comput Syst , vol.29 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 42
    • 84877809583 scopus 로고    scopus 로고
    • Dropbox analysis: data remnants on user machines
    • Quick D, Choo K-KR. Dropbox analysis:data remnants on user machines. Digit Investig. 2013;10:3–18.10.1016/j.diin.2013.02.003
    • (2013) Digit Investig , vol.10 , pp. 3-18
    • Quick, D.1    Choo, K.-K.R.2
  • 43
    • 84904616098 scopus 로고    scopus 로고
    • A forensically robust method for acquisition of iCloud data
    • Oestreicher K. A forensically robust method for acquisition of iCloud data. Digit Investig. 2014;11:S106–S113.10.1016/j.diin.2014.05.006
    • (2014) Digit Investig , vol.11 , pp. S106-S113
    • Oestreicher, K.1
  • 45
    • 84898004587 scopus 로고    scopus 로고
    • Cloud data imager: a unified answer to remote acquisition of cloud storage areas
    • Federici C. Cloud data imager:a unified answer to remote acquisition of cloud storage areas. Digit Investig. 2014;11:30–42.10.1016/j.diin.2014.02.002
    • (2014) Digit Investig , vol.11 , pp. 30-42
    • Federici, C.1
  • 46
    • 85015922659 scopus 로고    scopus 로고
    • Elsevier
    • Ryan Ko, RC. The cloud security ecosystem. 1st ed. Elsevier; 2015. Available from:http://store.elsevier.com/The-Cloud-Security-Ecosystem/Ryan-Ko/isbn-9780128015957/
    • (2015) The cloud security ecosystem
    • Ryan Ko, R.C.1
  • 47
    • 84925118436 scopus 로고    scopus 로고
    • Cloud forensic technical challenges and solutions: a snapshot
    • Martini B, Choo K-KR. Cloud forensic technical challenges and solutions:a snapshot. IEEE Cloud Comput. 2014;1:20–25.10.1109/MCC.2014.69
    • (2014) IEEE Cloud Comput , vol.1 , pp. 20-25
    • Martini, B.1    Choo, K.-K.R.2
  • 48
    • 84930511409 scopus 로고    scopus 로고
    • Cloud forensics: technical challenges, solutions and comparative analysis
    • Pichan A, Lazarescu M, Soh ST. Cloud forensics:technical challenges, solutions and comparative analysis. Digit Investig. 2015;13:38–57.10.1016/j.diin.2015.03.002
    • (2015) Digit Investig , vol.13 , pp. 38-57
    • Pichan, A.1    Lazarescu, M.2    Soh, S.T.3
  • 49
    • 85013192181 scopus 로고    scopus 로고
    • Recovering residual forensic data from smartphone interactions with cloud storage providers
    • Boston: Syngress
    • Grispos, G, Glisson, W, Storer, T. The cloud security ecosystem. Boston:Syngress; 2015. Recovering residual forensic data from smartphone interactions with cloud storage providers (eds. Ko R, Choo K-KR,); 347–382.
    • (2015) The cloud security ecosystem , pp. 347-382
    • Grispos, G.1    Glisson, W.2    Storer, T.3    Ko, R.4    Choo, K.-K.R.5
  • 51
    • 84964322400 scopus 로고    scopus 로고
    • Chapter 19 - Ubuntu One investigation: Detecting evidences on client machines
    • Choo R.K.-K.R., (ed), Boston: Syngress
    • Shariati, M, Dehghantanha, A, Martini, B, Choo, K-KR. The cloud security ecosystem. Boston:Syngress; 2015. Chapter 19 - Ubuntu One investigation:Detecting evidences on client machines (ed. Choo RK-KR,); 429–446.
    • (2015) The cloud security ecosystem , pp. 429-446
    • Shariati, M.1    Dehghantanha, A.2    Martini, B.3    Choo, K.-K.R.4
  • 52
    • 85015912440 scopus 로고    scopus 로고
    • EDRM File Format Data Set 1.0.1. [Cited 2015 Feb 1]. Available from:http://www.edrm.net/projects/dataset/data-set-files


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.