{"created":"2020-09-01T14:13:58.008848+00:00","id":4151,"links":{},"metadata":{"_buckets":{"deposit":"801dcaca-8a98-4f8c-bf87-2c1549ee4951"},"_deposit":{"id":"4151","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4151"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4151","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Forensics Investigation System for Cloud Storage based on Provenance Scheme","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Cloud storage forensics has recently emergedas a salient area of inquiry. One area ofdifficulty is the identification and acquisition ofpotential data when disparate services can beutilized by criminals. There is a need for asound digital forensic framework relating tothe forensic analysis of client devices toidentify potential data holdings. This paperproposes a forensic investigation framework forcloud storage environment. In the proposedsystem, the evidences are created and collectedaccording to the cloud user’s actions usingdigital provenance scheme. However,provenance information cannot be trusted unlessits integrity is assured. So, the cryptographicalgorithms are used to be the reliable andtrusted provenances (evidences) at preservationphase and used to verify the evidence atexamination phase. By using this scheme, theproposed system is faster than traditionalinvestigation system for the forensics purpose. Italso helps forensic examiners to examinesensitive file from the cloud storages."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value_mlt":[{"interim":"Cloud Storage"},{"interim":"Digital forensic"},{"interim":"Forensic"},{"interim":"Provenance"},{"interim":"Cryptography"}]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-03"}],"displaytype":"preview","filename":"20163.pdf","filesize":[{"value":"410 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4151/files/20163.pdf"},"version_id":"8b41375b-9666-4e8c-aff0-db12d5801d8c"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Fourteenth International Conference On Computer Applications (ICCA 2016)","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Aung, Nay Aung"},{"subitem_authors_fullname":"Min, Myat Myat"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2016-02-25"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/185"},"item_title":"Forensics Investigation System for Cloud Storage based on Provenance Scheme","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-03","publish_status":"0","recid":"4151","relation_version_is_last":true,"title":["Forensics Investigation System for Cloud Storage based on Provenance Scheme"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T03:30:46.074336+00:00"}