MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "d7d97296-cc4c-4700-930b-01020d59ffb2"}, "_deposit": {"id": "3528", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3528"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3528", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Cloud Storage Forensics Framework", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "There are various types of cloud services witheach type having a potentially different use in criminalactivity. The storage as a service (StaaS) is showingsignificant growth as users adopt the capability to storedata in the cloud environment across a range ofdevices. Cloud storage forensics has recently emergedas a salient area of inquiry. One area of difficulty is theidentification and acquisition of potential data whendisparate services can be utilized by criminals. There isa need for a sound digital forensic frameworkrelating to the forensic analysis of client devices toidentify potential data holdings. In this paper thecloud storage forensic framework is proposed whichbased on open source cloud StaaS application(OwnCloud). In this paper, the evidences are createdand collected according to the Cloud users and ServiceProvider actions using digital provenance scheme. Thecryptographic and hash algorithms are used to be thereliable and trusted provenances at the evidencegeneration and verification. The aims of this paper areto help forensic examiners and to solve criminal casesin the Cloud environment."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Cloud Storage"}, {"interim": "Digital forensic"}, {"interim": "Forensic"}, {"interim": "Provenance"}, {"interim": "Cryptography"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "3.Cloud Storage Forensics Framework.pdf", "filesize": [{"value": "1243 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 1243000.0, "url": {"url": "https://meral.edu.mm/record/3528/files/3.Cloud Storage Forensics Framework.pdf"}, "version_id": "00c56757-eec8-4868-9aba-4bc25b0710b8"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Thirteenth International Conferences on Computer Applications(ICCA 2015)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Nay Aung"}, {"subitem_authors_fullname": "Min, Myat Myat"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2015-02-05"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/127"}, "item_title": "Cloud Storage Forensics Framework", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003528", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "3528", "relation": {}, "relation_version_is_last": true, "title": ["Cloud Storage Forensics Framework"], "weko_shared_id": -1}
Cloud Storage Forensics Framework
http://hdl.handle.net/20.500.12678/0000003528
http://hdl.handle.net/20.500.12678/0000003528dceda10e-e44a-4bb1-8279-5e2343c44ba3
d7d97296-cc4c-4700-930b-01020d59ffb2
Name / File | License | Actions |
---|---|---|
3.Cloud Storage Forensics Framework.pdf (1243 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Cloud Storage Forensics Framework | |||||
Language | en | |||||
Publication date | 2015-02-05 | |||||
Authors | ||||||
Aung, Nay Aung | ||||||
Min, Myat Myat | ||||||
Description | ||||||
There are various types of cloud services witheach type having a potentially different use in criminalactivity. The storage as a service (StaaS) is showingsignificant growth as users adopt the capability to storedata in the cloud environment across a range ofdevices. Cloud storage forensics has recently emergedas a salient area of inquiry. One area of difficulty is theidentification and acquisition of potential data whendisparate services can be utilized by criminals. There isa need for a sound digital forensic frameworkrelating to the forensic analysis of client devices toidentify potential data holdings. In this paper thecloud storage forensic framework is proposed whichbased on open source cloud StaaS application(OwnCloud). In this paper, the evidences are createdand collected according to the Cloud users and ServiceProvider actions using digital provenance scheme. Thecryptographic and hash algorithms are used to be thereliable and trusted provenances at the evidencegeneration and verification. The aims of this paper areto help forensic examiners and to solve criminal casesin the Cloud environment. | ||||||
Keywords | ||||||
Cloud Storage, Digital forensic, Forensic, Provenance, Cryptography | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/127 | |||||
Journal articles | ||||||
Thirteenth International Conferences on Computer Applications(ICCA 2015) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |