logo

Cloud Storage Forensics - PDF

14 Pages2994 Words68 Views
   

Added on  2020-05-11

Cloud Storage Forensics - PDF

   Added on 2020-05-11

ShareRelated Documents
Running head: CLOUD STORAGE FORENSICS
Cloud Storage Services
Name of the Student
Name of the University
Author’s notes
Cloud Storage Forensics - PDF_1
1CLOUD STORAGE FORENSICS
Table of Contents
Introduction......................................................................................................................................2
Analysis...........................................................................................................................................2
Brief Overview of Cloud Forensics...........................................................................................2
Cloud Forensics Usage..............................................................................................................3
Methodologies and Tools..........................................................................................................4
Findings...........................................................................................................................................6
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
Glossary.........................................................................................................................................11
Appendices....................................................................................................................................12
Appendix 1...............................................................................................................................12
Appendix 2...............................................................................................................................12
Appendix 3...............................................................................................................................13
Cloud Storage Forensics - PDF_2
2CLOUD STORAGE FORENSICS
Introduction
Smartphones play a significant role in this generation. Almost everyone in this generation
uses smartphones for the purpose of communicating with others and also carries out several other
works. Smartphones consists of cloud applications that can be used for storage purposes. This
facilitates the users to access their own data whenever required. Criminals have started to use
these smartphones for carrying out illegal and criminal activities (Poisel, Malzer & Tjoa, 2013).
The mobile devices that have been used by the criminals can be used for the purpose of
investigating any traditional or cyber crime. MEGA is considered to be a cloud application that
can store data just like Dropbox and Google Drive (Daryabar, Dehghantanha & Choo, 2017).
This report examines and analyzes a scenario that is based on cloud forensics. This report
is based on the case study of the MEGA cloud application. It discusses about the cloud forensics
concepts. It also discusses about the various usages of cloud forensics. This report critically
analyzes the case study of MEGA app and attempts to find out the type of modification of the
metadata that will take place when the file will be uploaded and downloaded. It also tries to find
out how will the evidences that are present on an iOS and an android platform gets affected. This
report also discusses the findings of the analysis.
Analysis
Brief Overview of Cloud Forensics
Cloud forensics forms a part of digital forensics. This field is the combination of cloud
computing along with the field of digital forensics. In digital forensics, data is identified,
collected, examined and analyzed for the purpose of preserving its integrity and value (De
Cloud Storage Forensics - PDF_3
3CLOUD STORAGE FORENSICS
Marco, Kechadi & Ferrucci, 2013). In cloud computing, users are allowed to share resources
over the web depending on their demand by paying the price as per their usage. Cloud forensics
can be considered to be a sub part of the network forensics. Cloud forensics has three dimensions
called legal, technical and organizational dimension. Mobile phones often use cloud storage
services. Mobile applications are able to store data and leave a trace of criminal activities. This
can be helpful for the purpose of investigating any criminal act. It also plays a major role in
criminal litigation as well as civil litigation.
An organizational structure consists of several types of staffs like internal and external
employees and staffs. These staffs play a major role in digital forensic processes (Ruan &
Carthy, 2012). Investigators are the most important and significant staff that participate in the
process of digital forensics. They are highly qualified and experienced individuals who are
capable of investigating a criminal activity by using the capabilities of forensics. IT professionals
also play a major role in the process of investigation. They assist the investigators and help them
when the knowledge of information technology is required. Another main role in the process of
digital forensics is played by the legal advisors. These professionals help in identifying the
criminals.
Cloud Forensics Usage
There are several usages of cloud forensics. Some of them are as follows:
Investigation: This is the most important usage of cloud forensics. Crimes can be
investigated in the cloud environments by using cloud forensics. If there is any violation of
policy then that can also be investigated by taking the help of cloud storage forensics (Ruan et
al., 2013). Cloud forensics will help to gather evidences for presenting it in the court.
Cloud Storage Forensics - PDF_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on Cloud Storage Forensics
|14
|3009
|117

Digital Forensics : Assignment
|18
|5256
|724

Computer Forensic: Discovering Evidence from Mobile Phone in Digital Forensics
|10
|2394
|388

Digital Forensics Literature Review 2022
|9
|2368
|18

Use of Digital Forensic Framework in Cloud Computing Investigations
|4
|725
|217

Use of Digital Forensic Framework in Cloud Computing Investigations
|5
|671
|452