<?xml version='1.0' encoding='UTF-8'?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
  <responseDate>2026-05-02T10:41:16Z</responseDate>
  <request metadataPrefix="oai_dc" identifier="oai:meral.edu.mm:recid/3528" verb="GetRecord">https://meral.edu.mm/oai</request>
  <GetRecord>
    <record>
      <header>
        <identifier>oai:meral.edu.mm:recid/3528</identifier>
        <datestamp>2021-12-13T08:07:48Z</datestamp>
        <setSpec>1582963302567:1597824273898</setSpec>
        <setSpec>user-ucsy</setSpec>
      </header>
      <metadata>
        <oai_dc:dc xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:oai_dc="http://www.openarchives.org/OAI/2.0/oai_dc/" xmlns="http://www.w3.org/2001/XMLSchema" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/oai_dc/ http://www.openarchives.org/OAI/2.0/oai_dc.xsd">
          <dc:title>Cloud Storage Forensics Framework</dc:title>
          <dc:creator>Aung, Nay Aung</dc:creator>
          <dc:creator>Min, Myat Myat</dc:creator>
          <dc:description>There are various types of cloud services witheach type having a potentially different use in criminalactivity. The storage as a service (StaaS) is showingsignificant growth as users adopt the capability to storedata in the cloud environment across a range ofdevices. Cloud storage forensics has recently emergedas a salient area of inquiry. One area of difficulty is theidentification and acquisition of potential data whendisparate services can be utilized by criminals. There isa need for a sound digital forensic frameworkrelating to the forensic analysis of client devices toidentify potential data holdings. In this paper thecloud storage forensic framework is proposed whichbased on open source cloud StaaS application(OwnCloud). In this paper, the evidences are createdand collected according to the Cloud users and ServiceProvider actions using digital provenance scheme. Thecryptographic and hash algorithms are used to be thereliable and trusted provenances at the evidencegeneration and verification. The aims of this paper areto help forensic examiners and to solve criminal casesin the Cloud environment.</dc:description>
          <dc:date>2015-02-05</dc:date>
          <dc:identifier>http://hdl.handle.net/20.500.12678/0000003528</dc:identifier>
          <dc:identifier>https://meral.edu.mm/records/3528</dc:identifier>
        </oai_dc:dc>
      </metadata>
    </record>
  </GetRecord>
</OAI-PMH>
