{"created":"2020-09-01T15:40:12.414063+00:00","id":5040,"links":{},"metadata":{"_buckets":{"deposit":"fdd13985-04c5-48b4-9621-7f07e3408335"},"_deposit":{"id":"5040","owners":[],"pid":{"revision_id":0,"type":"recid","value":"5040"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/5040","sets":["1582963302567:1597824273898"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"HDFS based Private Cloud Storage Forensics","subitem_1551255648112":"en"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"The demand for cloud computing isincreasing because of the popularity of digitaldevices and the wide use of internet. That makesmalicious users to make crimes. Therefore a studyof digital forensics investigations of cloud storageis necessary. Hadoop Distributed File System(HDFS) has been widely adopted to build cloudstorage as it provides reliable storage and highthroughput access. In this paper, HDFS basedprivate cloud storage is implemented,and digitalforensic framework is proposed which expands oncurrent methodologies. This framework is appliedfor conducting the forensics investigation of cloudstorage. Experiments on private cloud storage areconducted and highlighted a lot of usefulinformation that can be found by analyzingartifacts left by Cloud Storage clients (PC/Smartphone).The case study of the crime of acompany’s staff for the specification document ofbanking system and examination of crime reportsconcerning with cloud storage are presented."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-07-18"}],"displaytype":"preview","filename":"32_PDFsam_PSC_final proof.pdf","filesize":[{"value":"110 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/5040/files/32_PDFsam_PSC_final proof.pdf"},"version_id":"b6121cc4-640a-4687-9286-d6139b7127ae"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"Eighth Local Conference on Parallel and Soft Computing","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"Thin, Phyu Phyu"},{"subitem_authors_fullname":"Thein, Thandar"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Article"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2017-12-27"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/934"},"item_title":"HDFS based Private Cloud Storage Forensics","item_type_id":"21","owner":"1","path":["1597824273898"],"publish_date":"2019-07-18","publish_status":"0","recid":"5040","relation_version_is_last":true,"title":["HDFS based Private Cloud Storage Forensics"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2021-12-13T02:46:44.897017+00:00"}