logo

Report on Cloud Storage Forensics

   

Added on  2020-05-11

14 Pages3009 Words117 Views
Running head: CLOUD STORAGE FORENSICSCloud Storage ServicesName of the StudentName of the UniversityAuthor’s notes
Report on Cloud Storage Forensics_1
1CLOUD STORAGE FORENSICSTable of ContentsIntroduction......................................................................................................................................2Analysis...........................................................................................................................................2Cloud Forensics............................................................................................................................2Use of Cloud Forensics.................................................................................................................3Tools and Methodologies.............................................................................................................4Findings...........................................................................................................................................6Conclusion.......................................................................................................................................8References........................................................................................................................................9Glossary.........................................................................................................................................11Appendices....................................................................................................................................12Appendix 1..................................................................................................................................12Appendix 2..................................................................................................................................12Appendix 3..................................................................................................................................13
Report on Cloud Storage Forensics_2
2CLOUD STORAGE FORENSICSIntroductionIn this era of ICT, smartphones have become an important part of the life of the people. Cloud storage applications are gaining importance as it allows the users to gain access to their own information from any location and at any time. Mobile phones play a significant role in assisting the criminals to commit any criminal act (Poisel, Malzer & Tjoa, 2013). These mobile devices act as evidence in the investigations of cyber crimes as well as traditional crimes. MEGAis a cloud app that can be used in place of Google Drive and Dropbox (Daryabar, Dehghantanha & Choo, 2017). This forensics report examines a scenario on cloud storage forensics. It focuses on the MEGA cloud app case study. It gives a brief overview of the concept of cloud forensics along with its usage. It analyzes a real life scenario called MEGA case study and tries to find out what modifications to the metadata during the process of downloading and uploading process might affect the preservation of evidences on an android as well as iOS platforms. This report also discusses about the findings and gives the result of the analysis. AnalysisCloud ForensicsCloud forensics can be considered to be an application of the digital forensics. This field combines the concept of cloud computing with digital forensics. Digital forensics applies scienceto identify, collect, examines and analyzes data while maintaining its integrity (De Marco, Kechadi & Ferrucci, 2013). Cloud computing on the other hand is an IT paradigm that deals withallowing users to get access to shared resources over the Internet on the basis of their demand.
Report on Cloud Storage Forensics_3
3CLOUD STORAGE FORENSICSCloud forensics is a part of network forensics. There are three main dimensions of cloud forensics called technical, legal as well as organizational dimension. The cloud storage platform services that are used, mainly the mobile applications have the ability to leave behind trace or information that can be useful in any civil or criminal litigation. Organizations consist of internal as well as external staffs that play a major role in the process of digital forensics (Ruan & Carthy, 2012). The investigators play the most significant role in forensics. They have high knowledge about forensic capabilities. IT professionals are alsoinvolved in assisting the investigators in identifying any crime activity. Legal advisors also play a crucial role in cloud forensics. Use of Cloud ForensicsCloud forensics has various usages like:Investigation: It can be used for investigating crime as well as policy violation in a cloud environment. It can be useful in providing evidences to the court (Ruan et al., 2013).Troubleshooting: Data files can be located physically and virtually in the cloud environment.Log monitoring: It assists in auditing and regulatory compliance (Thorpe et al., 2013).Data Recovery: It helps to recover data that has been deleted in an accidental manner. It also helps to recover encrypted data.
Report on Cloud Storage Forensics_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Storage Forensics - PDF
|14
|2994
|68

Digital Forensic: An Overview of the Application, Tools, and Future
|12
|572
|328

Use of Digital Forensic Framework in Cloud Computing Investigations
|4
|725
|217

Use of Digital Forensic Framework in Cloud Computing Investigations
|5
|671
|452

Digital Forensics : Assignment
|18
|5256
|724

Digital Forensic Technology: Evidence Recovery and Future Challenges
|8
|2390
|82