Computer Science ›› 2015, Vol. 42 ›› Issue (Z11): 348-351.

Previous Articles     Next Articles

Digital Forensic Investigation in Cloud Storage

DONG Zhen-xing, ZHANG Qing and CHEN Long   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Nowadays,many users utilize the cloud storage service to store or share their data.At the same time,there are an increasing number of illegal cases about preserving illegal information or stealing the company’s confidential data through cloud storage service.Collecting the crucial evidences from cloud storage service reliably and completely has become an urgent problem.This paper took 360 cloud storage service as example,analyzed the law of residual data after accessing to the cloud storage through the browser and/or client software,and then presented a forensic analysis method to identify user behaviors.The time line of user’s action is reconstructed by combining logs and history data remnants together.Therefore the user behaviors related to the cloud storage service are profiled clearly.These ideas and methods can be applied to other cloud storage services currently used.

Key words: Cloud computing,Cloud storage,Digital forensic,User behavior analysis

[1] Shams Z,Amit K D,Ragib H.SecLaaS:secure logging-as-a-service for cloud forensics[C]∥ASIA CCS’13 Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security Table of Contents.New York:ACM,2013:219-230
[2] Zawoad S,Hasan R.I have the proof:providing proofs of past data possession in cloud forensics[C]∥Cyber Security.Washing-ton,DC,IEEE,2012:75-82
[3] 谢亚龙,丁丽萍,林渝淇,等.ICFF:一种 IaaS 模式下的云取证框架[J].通信学报,2013,34(5):200-206
[4] Sang Ting.A log based approach to make digital forensics easier on cloud computing[C]∥ 2013 Third International Conference on Intelligent System Design and Engineering Applications(ISDEA).Hong Kong,IEEE,2013:91-94
[5] Darren Q,Kim-Kwang R C.Digital droplets:Microsoft SkyDrive forensic data remnants[J].Future Generation Computer Systems,2013,29(6):1378-1394
[6] Fabio M,Gianluigi M,Simone T.A case study on digital forensics in the cloud[C]∥2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery(CyberC).Sanya,IEEE,2012:111-116
[7] Hale J S.Amazon cloud drive forensic analysis[J].Digital Inves-tigation,2013,10(3):259-265
[8] Quick D,Choo K-K R.Forensic collection of cloud storage data:Does the act of collection result in changes to the data or its metadata[J].Digital Investigation,2013,10(3):266-277
[9] Quick D,Choo K-K R.Dropbox analysis:data remnants on user machines[J].Digital Investigation,2013,10(1):3-18
[10] Chunga H,Parka J,Leea S,et al.Digital forensic investigation of cloud storage service[J].Digital Investigation,2012,9(2):81-95

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!