Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "d7d97296-cc4c-4700-930b-01020d59ffb2"}, "_deposit": {"id": "3528", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3528"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3528", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Cloud Storage Forensics Framework", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "There are various types of cloud services witheach type having a potentially different use in criminalactivity. The storage as a service (StaaS) is showingsignificant growth as users adopt the capability to storedata in the cloud environment across a range ofdevices. Cloud storage forensics has recently emergedas a salient area of inquiry. One area of difficulty is theidentification and acquisition of potential data whendisparate services can be utilized by criminals. There isa need for a sound digital forensic frameworkrelating to the forensic analysis of client devices toidentify potential data holdings. In this paper thecloud storage forensic framework is proposed whichbased on open source cloud StaaS application(OwnCloud). In this paper, the evidences are createdand collected according to the Cloud users and ServiceProvider actions using digital provenance scheme. Thecryptographic and hash algorithms are used to be thereliable and trusted provenances at the evidencegeneration and verification. The aims of this paper areto help forensic examiners and to solve criminal casesin the Cloud environment."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Cloud Storage"}, {"interim": "Digital forensic"}, {"interim": "Forensic"}, {"interim": "Provenance"}, {"interim": "Cryptography"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "3.Cloud Storage Forensics Framework.pdf", "filesize": [{"value": "1243 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 1243000.0, "url": {"url": "https://meral.edu.mm/record/3528/files/3.Cloud Storage Forensics Framework.pdf"}, "version_id": "00c56757-eec8-4868-9aba-4bc25b0710b8"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conferences on Computer Applications(ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Nay Aung"}, {"subitem_authors_fullname": "Min, Myat Myat"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/127"}, "item_title": "Cloud Storage Forensics Framework", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003528", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3528", "relation": {}, "relation_version_is_last": true, "title": ["Cloud Storage Forensics Framework"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Cloud Storage Forensics Framework

http://hdl.handle.net/20.500.12678/0000003528
http://hdl.handle.net/20.500.12678/0000003528
dceda10e-e44a-4bb1-8279-5e2343c44ba3
d7d97296-cc4c-4700-930b-01020d59ffb2
None
Preview
Name / File License Actions
3.Cloud 3.Cloud Storage Forensics Framework.pdf (1243 Kb)
Publication type
Article
Upload type
Publication
Title
Title Cloud Storage Forensics Framework
Language en
Publication date 2015-02-05
Authors
Aung, Nay Aung
Min, Myat Myat
Description
There are various types of cloud services witheach type having a potentially different use in criminalactivity. The storage as a service (StaaS) is showingsignificant growth as users adopt the capability to storedata in the cloud environment across a range ofdevices. Cloud storage forensics has recently emergedas a salient area of inquiry. One area of difficulty is theidentification and acquisition of potential data whendisparate services can be utilized by criminals. There isa need for a sound digital forensic frameworkrelating to the forensic analysis of client devices toidentify potential data holdings. In this paper thecloud storage forensic framework is proposed whichbased on open source cloud StaaS application(OwnCloud). In this paper, the evidences are createdand collected according to the Cloud users and ServiceProvider actions using digital provenance scheme. Thecryptographic and hash algorithms are used to be thereliable and trusted provenances at the evidencegeneration and verification. The aims of this paper areto help forensic examiners and to solve criminal casesin the Cloud environment.
Keywords
Cloud Storage, Digital forensic, Forensic, Provenance, Cryptography
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/127
Journal articles
Thirteenth International Conferences on Computer Applications(ICCA 2015)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:06:38.709370
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL