MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "801dcaca-8a98-4f8c-bf87-2c1549ee4951"}, "_deposit": {"id": "4151", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4151"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4151", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Forensics Investigation System for Cloud Storage based on Provenance Scheme", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Cloud storage forensics has recently emergedas a salient area of inquiry. One area ofdifficulty is the identification and acquisition ofpotential data when disparate services can beutilized by criminals. There is a need for asound digital forensic framework relating tothe forensic analysis of client devices toidentify potential data holdings. This paperproposes a forensic investigation framework forcloud storage environment. In the proposedsystem, the evidences are created and collectedaccording to the cloud user’s actions usingdigital provenance scheme. However,provenance information cannot be trusted unlessits integrity is assured. So, the cryptographicalgorithms are used to be the reliable andtrusted provenances (evidences) at preservationphase and used to verify the evidence atexamination phase. By using this scheme, theproposed system is faster than traditionalinvestigation system for the forensics purpose. Italso helps forensic examiners to examinesensitive file from the cloud storages."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Cloud Storage"}, {"interim": "Digital forensic"}, {"interim": "Forensic"}, {"interim": "Provenance"}, {"interim": "Cryptography"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "20163.pdf", "filesize": [{"value": "410 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 410000.0, "url": {"url": "https://meral.edu.mm/record/4151/files/20163.pdf"}, "version_id": "8b41375b-9666-4e8c-aff0-db12d5801d8c"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fourteenth International Conference On Computer Applications (ICCA 2016)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aung, Nay Aung"}, {"subitem_authors_fullname": "Min, Myat Myat"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2016-02-25"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/185"}, "item_title": "Forensics Investigation System for Cloud Storage based on Provenance Scheme", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004151", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4151", "relation": {}, "relation_version_is_last": true, "title": ["Forensics Investigation System for Cloud Storage based on Provenance Scheme"], "weko_shared_id": -1}
Forensics Investigation System for Cloud Storage based on Provenance Scheme
http://hdl.handle.net/20.500.12678/0000004151
http://hdl.handle.net/20.500.12678/000000415168ce7bfa-4d71-42b0-a194-f37047a33f10
801dcaca-8a98-4f8c-bf87-2c1549ee4951
Name / File | License | Actions |
---|---|---|
20163.pdf (410 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Forensics Investigation System for Cloud Storage based on Provenance Scheme | |||||
Language | en | |||||
Publication date | 2016-02-25 | |||||
Authors | ||||||
Aung, Nay Aung | ||||||
Min, Myat Myat | ||||||
Description | ||||||
Cloud storage forensics has recently emergedas a salient area of inquiry. One area ofdifficulty is the identification and acquisition ofpotential data when disparate services can beutilized by criminals. There is a need for asound digital forensic framework relating tothe forensic analysis of client devices toidentify potential data holdings. This paperproposes a forensic investigation framework forcloud storage environment. In the proposedsystem, the evidences are created and collectedaccording to the cloud user’s actions usingdigital provenance scheme. However,provenance information cannot be trusted unlessits integrity is assured. So, the cryptographicalgorithms are used to be the reliable andtrusted provenances (evidences) at preservationphase and used to verify the evidence atexamination phase. By using this scheme, theproposed system is faster than traditionalinvestigation system for the forensics purpose. Italso helps forensic examiners to examinesensitive file from the cloud storages. | ||||||
Keywords | ||||||
Cloud Storage, Digital forensic, Forensic, Provenance, Cryptography | ||||||
Identifier | http://onlineresource.ucsy.edu.mm/handle/123456789/185 | |||||
Journal articles | ||||||
Fourteenth International Conference On Computer Applications (ICCA 2016) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |