Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "6dd7b58d-61cd-417a-a383-2d71747af48c"}, "_deposit": {"id": "4503", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4503"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4503", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Investigation of Android Device for Discovering Hadoop Cloud Storage Artifacts", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Hadoop Cloud Storage has been embraced byboth individuals and organizations as it can offercost-effective, large capacity storage and multifunctionalservices on a wide range of device. It isfast raising popularity to access Hadoop Cloudservices via Android device. The widespread usage ofHadoop Cloud Storage could create the environmentthat is potentially conducive to malicious activitiesand illegal operations. Thus, the investigation ofHadoop Cloud presents the emerging challenge forthe digital forensic community. Extracting residualartifacts from the cloud server is potentially difficultdue to privacy policies followed by cloud providers.The attached Android device may store usefulartifacts to investigate the illegal usages of HadoopCloud Storage. This paper utilizes ClouderaDistribution Hadoop (CDH); a popular HadoopCloud Storage. This paper conducts a preliminaryinvestigation to locate and extract the residualartifacts from Android device that has accessed theCDH Cloud. The extracted artifacts can assist theforensic examiners in real world Hadoop Cloudforensics. The crime scenario which is extended theForensic Copra’s crime case is examined under theguide of CDH Forensic Investigation Framework."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "Android Device"}, {"interim": "CDH"}, {"interim": "Criminal Activity"}, {"interim": "Forensic Investigation"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-03"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "50-57.pdf", "filesize": [{"value": "290 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 290000.0, "url": {"url": "https://meral.edu.mm/record/4503/files/50-57.pdf"}, "version_id": "4e9e000d-f168-41bc-90f4-4b021f8e6859"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Sixteenth International Conferences on Computer Applications(ICCA 2018)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Oo, Myat Nandar"}, {"subitem_authors_fullname": "Thein, Thandar"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2018-02-22"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/243"}, "item_title": "Investigation of Android Device for Discovering Hadoop Cloud Storage Artifacts", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004503", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-03"}, "publish_date": "2019-07-03", "publish_status": "0", "recid": "4503", "relation": {}, "relation_version_is_last": true, "title": ["Investigation of Android Device for Discovering Hadoop Cloud Storage Artifacts"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Investigation of Android Device for Discovering Hadoop Cloud Storage Artifacts

http://hdl.handle.net/20.500.12678/0000004503
http://hdl.handle.net/20.500.12678/0000004503
a6e9cdfc-e023-455c-950f-53b27b01bb7b
6dd7b58d-61cd-417a-a383-2d71747af48c
None
Preview
Name / File License Actions
50-57.pdf 50-57.pdf (290 Kb)
Publication type
Article
Upload type
Publication
Title
Title Investigation of Android Device for Discovering Hadoop Cloud Storage Artifacts
Language en
Publication date 2018-02-22
Authors
Oo, Myat Nandar
Thein, Thandar
Description
Hadoop Cloud Storage has been embraced byboth individuals and organizations as it can offercost-effective, large capacity storage and multifunctionalservices on a wide range of device. It isfast raising popularity to access Hadoop Cloudservices via Android device. The widespread usage ofHadoop Cloud Storage could create the environmentthat is potentially conducive to malicious activitiesand illegal operations. Thus, the investigation ofHadoop Cloud presents the emerging challenge forthe digital forensic community. Extracting residualartifacts from the cloud server is potentially difficultdue to privacy policies followed by cloud providers.The attached Android device may store usefulartifacts to investigate the illegal usages of HadoopCloud Storage. This paper utilizes ClouderaDistribution Hadoop (CDH); a popular HadoopCloud Storage. This paper conducts a preliminaryinvestigation to locate and extract the residualartifacts from Android device that has accessed theCDH Cloud. The extracted artifacts can assist theforensic examiners in real world Hadoop Cloudforensics. The crime scenario which is extended theForensic Copra’s crime case is examined under theguide of CDH Forensic Investigation Framework.
Keywords
Android Device, CDH, Criminal Activity, Forensic Investigation
Identifier http://onlineresource.ucsy.edu.mm/handle/123456789/243
Journal articles
Sixteenth International Conferences on Computer Applications(ICCA 2018)
Conference papers
Books/reports/chapters
Thesis/dissertations
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 14:57:57.909447
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL