{"created":"2020-09-01T13:06:37.840414+00:00","id":3528,"links":{},"metadata":{"_buckets":{"deposit":"d7d97296-cc4c-4700-930b-01020d59ffb2"},"_deposit":{"id":"3528","owners":[],"pid":{"revision_id":0,"type":"recid","value":"3528"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/3528","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Cloud Storage Forensics Framework","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"There are various types of cloud services witheach type having a potentially different use in criminalactivity. The storage as a service (StaaS) is showingsignificant growth as users adopt the capability to storedata in the cloud environment across a range ofdevices. Cloud storage forensics has recently emergedas a salient area of inquiry. One area of difficulty is theidentification and acquisition of potential data whendisparate services can be utilized by criminals. There isa need for a sound digital forensic frameworkrelating to the forensic analysis of client devices toidentify potential data holdings. In this paper thecloud storage forensic framework is proposed whichbased on open source cloud StaaS application(OwnCloud). In this paper, the evidences are createdand collected according to the Cloud users and ServiceProvider actions using digital provenance scheme. Thecryptographic and hash algorithms are used to be thereliable and trusted provenances at the evidencegeneration and verification. The aims of this paper areto help forensic examiners and to solve criminal casesin the Cloud environment."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Cloud Storage"},{"interim":"Digital forensic"},{"interim":"Forensic"},{"interim":"Provenance"},{"interim":"Cryptography"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"3.Cloud Storage Forensics Framework.pdf","filesize":[{"value":"1243 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/3528/files/3.Cloud Storage Forensics Framework.pdf"},"version_id":"00c56757-eec8-4868-9aba-4bc25b0710b8"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Thirteenth International Conferences on Computer Applications(ICCA 2015)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Nay Aung"},{"subitem_authors_fullname":"Min, Myat Myat"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2015-02-05"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/127"},"item_title":"Cloud Storage Forensics Framework","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"3528","relation_version_is_last":true,"title":["Cloud Storage Forensics Framework"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T08:07:48.667880+00:00"}