Skip to main content
Top

2019 | OriginalPaper | Chapter

Private Cloud Storage Forensics: Seafile as a Case Study

Authors : Yee-Yang Teing, Sajad Homayoun, Ali Dehghantanha, Kim-Kwang Raymond Choo, Reza M. Parizi, Mohammad Hammoudeh, Gregory Epiphaniou

Published in: Handbook of Big Data and IoT Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud storage forensics is an active research area, and this is unsurprising due to the increasing popularity of cloud storage services (e.g., Dropbox, Google Drive, and iCloud). Existing research generally focuses on public cloud forensics (e.g., client device forensics), rather than private cloud forensics (e.g., both client and server forensics). In this paper, we aim to address the gap by proposing a framework for forensics investigations of private cloud storage services. The proposed framework elaborates on procedures and artefact categories integral to the collection, preservation, analysis, and presentation of key evidential data from both client and server environments. Using the proposed framework to guide the investigation of Seafile, a popular open-source private cloud storage service, we demonstrate the types of client and server side artefacts that can be forensically recovered.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference James Baldwin, Omar M. K. Alhawi, Simone Shaughnessy, Alex Akinbi, and Ali Dehghantanha. Emerging from the cloud: A bibliometric analysis of cloud forensics studies. In Advances in Information Security, pages 311–331. Springer International Publishing, 2018. doi: 10.1007/978-3-319-73951-9_16. URL https://doi.org/10.1007/978-3-319-73951-9_16. James Baldwin, Omar M. K. Alhawi, Simone Shaughnessy, Alex Akinbi, and Ali Dehghantanha. Emerging from the cloud: A bibliometric analysis of cloud forensics studies. In Advances in Information Security, pages 311–331. Springer International Publishing, 2018. doi: 10.1007/978-3-319-73951-9_16. URL https://​doi.​org/​10.​1007/​978-3-319-73951-9_​16.
2.
go back to reference Yee-Yang Teing, Ali Dehghantanha, and Kim-Kwang Raymond Choo. CloudMe forensics: A case of big data forensic investigation. Concurrency and Computation: Practice and Experience, 30 (5): e4277, jul 2017. doi: 10.1002/cpe.4277. URL https://doi.org/10.1002/cpe.4277. Yee-Yang Teing, Ali Dehghantanha, and Kim-Kwang Raymond Choo. CloudMe forensics: A case of big data forensic investigation. Concurrency and Computation: Practice and Experience, 30 (5): e4277, jul 2017. doi: 10.1002/cpe.4277. URL https://​doi.​org/​10.​1002/​cpe.​4277.
6.
go back to reference Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, and Laurence T Yang. Forensic investigation of p2p cloud storage services and backbone for IoT networks: BitTorrent sync as a case study. Computers & Electrical Engineering, 58: 350–363, feb 2017. doi: 10.1016/j.compeleceng.2016.08.020. URL https://doi.org/10.1016/j.compeleceng.2016.08.020. Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, and Laurence T Yang. Forensic investigation of p2p cloud storage services and backbone for IoT networks: BitTorrent sync as a case study. Computers & Electrical Engineering, 58: 350–363, feb 2017. doi: 10.1016/j.compeleceng.2016.08.020. URL https://​doi.​org/​10.​1016/​j.​compeleceng.​2016.​08.​020.
7.
go back to reference Opeyemi Osanaiye, Haibin Cai, Kim-Kwang Raymond Choo, Ali Dehghantanha, Zheng Xu, and Mqhele Dlodlo. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, 2016 (1), may 2016. doi: 10.1186/s13638-016-0623-3. URL https://doi.org/10.1186/s13638-016-0623-3. Opeyemi Osanaiye, Haibin Cai, Kim-Kwang Raymond Choo, Ali Dehghantanha, Zheng Xu, and Mqhele Dlodlo. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, 2016 (1), may 2016. doi: 10.1186/s13638-016-0623-3. URL https://​doi.​org/​10.​1186/​s13638-016-0623-3.
9.
go back to reference Opeyemi Osanaiye, Haibin Cai, Kim-Kwang Raymond Choo, Ali Dehghantanha, Zheng Xu, and Mqhele Dlodlo. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, 2016 (1), may 2016. doi: 10.1186/s13638-016-0623-3. URL https://doi.org/10.1186/s13638-016-0623-3. Opeyemi Osanaiye, Haibin Cai, Kim-Kwang Raymond Choo, Ali Dehghantanha, Zheng Xu, and Mqhele Dlodlo. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, 2016 (1), may 2016. doi: 10.1186/s13638-016-0623-3. URL https://​doi.​org/​10.​1186/​s13638-016-0623-3.
10.
go back to reference Opeyemi Osanaiye, Kim-Kwang Raymond Choo, and Mqhele Dlodlo. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications, 67: 147–165, may 2016. doi: 10.1016/j.jnca.2016.01.001. URL https://doi.org/10.1016/j.jnca.2016.01.001. Opeyemi Osanaiye, Kim-Kwang Raymond Choo, and Mqhele Dlodlo. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications, 67: 147–165, may 2016. doi: 10.1016/j.jnca.2016.01.001. URL https://​doi.​org/​10.​1016/​j.​jnca.​2016.​01.​001.
15.
go back to reference Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Tooska Dargahi, and Mauro Conti. Forensic investigation of cooperative storage cloud service: Symform as a case study. Journal of Forensic Sciences, 62 (3): 641–654, nov 2016. doi: 10.1111/1556-4029.13271. URL https://doi.org/10.1111/1556-4029.13271. Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Tooska Dargahi, and Mauro Conti. Forensic investigation of cooperative storage cloud service: Symform as a case study. Journal of Forensic Sciences, 62 (3): 641–654, nov 2016. doi: 10.1111/1556-4029.13271. URL https://​doi.​org/​10.​1111/​1556-4029.​13271.
17.
23.
24.
go back to reference Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, and Jian Weng. An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Transactions on Information Forensics and Security, 11 (11): 2401–2414, nov 2016. doi: 10.1109/tifs.2016.2573770. URL https://doi.org/10.1109/tifs.2016.2573770. Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, and Jian Weng. An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Transactions on Information Forensics and Security, 11 (11): 2401–2414, nov 2016. doi: 10.1109/tifs.2016.2573770. URL https://​doi.​org/​10.​1109/​tifs.​2016.​2573770.
25.
go back to reference Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Rongxing Lu, and Jian Weng. Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Transactions on Dependable and Secure Computing, 15 (1): 27–39, jan 2018. doi: 10.1109/tdsc.2016.2536601. URL https://doi.org/10.1109/tdsc.2016.2536601. Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Rongxing Lu, and Jian Weng. Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Transactions on Dependable and Secure Computing, 15 (1): 27–39, jan 2018. doi: 10.1109/tdsc.2016.2536601. URL https://​doi.​org/​10.​1109/​tdsc.​2016.​2536601.
32.
go back to reference Farid Daryabar and Ali Dehghantanha. A review on impacts of cloud computing and digital forensics. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2 (2), 2014. Farid Daryabar and Ali Dehghantanha. A review on impacts of cloud computing and digital forensics. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2 (2), 2014.
33.
go back to reference M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos, and A. Dehghantanha. An android cloud storage apps forensic taxonomy. In Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pages 285–305. Elsevier, 2017. doi: 10.1016/b978-0-12-805303-4.00015-0. URL https://doi.org/10.1016/b978-0-12-805303-4.00015-0. M. Amine Chelihi, A. Elutilo, I. Ahmed, C. Papadopoulos, and A. Dehghantanha. An android cloud storage apps forensic taxonomy. In Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, pages 285–305. Elsevier, 2017. doi: 10.1016/b978-0-12-805303-4.00015-0. URL https://​doi.​org/​10.​1016/​b978-0-12-805303-4.​00015-0.
34.
go back to reference Farid Daryabar, Ali Dehghantanha, Brett Eterovic-Soric, and Kim-Kwang Raymond Choo. Forensic investigation of OneDrive, box, GoogleDrive and dropbox applications on android and iOS devices. Australian Journal of Forensic Sciences, 48 (6): 615–642, mar 2016. doi: 10.1080/00450618.2015.1110620. URL https://doi.org/10.1080/00450618.2015.1110620. Farid Daryabar, Ali Dehghantanha, Brett Eterovic-Soric, and Kim-Kwang Raymond Choo. Forensic investigation of OneDrive, box, GoogleDrive and dropbox applications on android and iOS devices. Australian Journal of Forensic Sciences, 48 (6): 615–642, mar 2016. doi: 10.1080/00450618.2015.1110620. URL https://​doi.​org/​10.​1080/​00450618.​2015.​1110620.
38.
go back to reference Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Brett Eterovic-Soric, and Kim-Kwang Raymond Choo. Investigating social networking applications on smartphones detecting facebook, twitter, LinkedIn and google+ artefacts on android and iOS platforms. Australian Journal of Forensic Sciences, 48 (4): 469–488, aug 2015. doi: 10.1080/00450618.2015.1066854. URL https://doi.org/10.1080/00450618.2015.1066854. Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Brett Eterovic-Soric, and Kim-Kwang Raymond Choo. Investigating social networking applications on smartphones detecting facebook, twitter, LinkedIn and google+ artefacts on android and iOS platforms. Australian Journal of Forensic Sciences, 48 (4): 469–488, aug 2015. doi: 10.1080/00450618.2015.1066854. URL https://​doi.​org/​10.​1080/​00450618.​2015.​1066854.
39.
go back to reference Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, Mohd Taufik Abdullah, and Wee-Chiat Chai. A closer look at syncany windows and ubuntu clients’ residual artefacts. In Lecture Notes in Computer Science, pages 342–357. Springer International Publishing, 2016. doi: 10.1007/978-3-319-49145-5_34. URL https://doi.org/10.1007/978-3-319-49145-5_34. Yee-Yang Teing, Ali Dehghantanha, Kim-Kwang Raymond Choo, Zaiton Muda, Mohd Taufik Abdullah, and Wee-Chiat Chai. A closer look at syncany windows and ubuntu clients’ residual artefacts. In Lecture Notes in Computer Science, pages 342–357. Springer International Publishing, 2016. doi: 10.1007/978-3-319-49145-5_34. URL https://​doi.​org/​10.​1007/​978-3-319-49145-5_​34.
41.
go back to reference Ben Blakeley, Chris Cooney, Ali Dehghantanha, and Rob Aspin. Cloud storage forensic: hubiC as a case-study. In 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, nov 2015. doi: 10.1109/cloudcom.2015.24. URL https://doi.org/10.1109/cloudcom.2015.24. Ben Blakeley, Chris Cooney, Ali Dehghantanha, and Rob Aspin. Cloud storage forensic: hubiC as a case-study. In 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, nov 2015. doi: 10.1109/cloudcom.2015.24. URL https://​doi.​org/​10.​1109/​cloudcom.​2015.​24.
44.
45.
go back to reference Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud, and Solahuddin bin Shamsuddin. Forensics investigation challenges in cloud computing environments. In Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, jun 2012. doi: 10.1109/cybersec.2012.6246092. URL https://doi.org/10.1109/cybersec.2012.6246092. Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud, and Solahuddin bin Shamsuddin. Forensics investigation challenges in cloud computing environments. In Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, jun 2012. doi: 10.1109/cybersec.2012.6246092. URL https://​doi.​org/​10.​1109/​cybersec.​2012.​6246092.
49.
go back to reference Dominik Birk and Christoph Wegener. Technical issues of forensic investigations in cloud computing environments. In 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, may 2011. doi: 10.1109/sadfe.2011.17. URL https://doi.org/10.1109/sadfe.2011.17. Dominik Birk and Christoph Wegener. Technical issues of forensic investigations in cloud computing environments. In 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, may 2011. doi: 10.1109/sadfe.2011.17. URL https://​doi.​org/​10.​1109/​sadfe.​2011.​17.
52.
go back to reference Stavros Simou, Christos Kalloniatis, Evangelia Kavakli, and Stefanos Gritzalis. Cloud forensics: Identifying the major issues and challenges. In Matthias Jarke, John Mylopoulos, Christoph Quix, Colette Rolland, Yannis Manolopoulos, Haralambos Mouratidis, and Jennifer Horkoff, editors, Advanced Information Systems Engineering, pages 271–284, Cham, 2014. Springer International Publishing. ISBN 978-3-319-07881-6. Stavros Simou, Christos Kalloniatis, Evangelia Kavakli, and Stefanos Gritzalis. Cloud forensics: Identifying the major issues and challenges. In Matthias Jarke, John Mylopoulos, Christoph Quix, Colette Rolland, Yannis Manolopoulos, Haralambos Mouratidis, and Jennifer Horkoff, editors, Advanced Information Systems Engineering, pages 271–284, Cham, 2014. Springer International Publishing. ISBN 978-3-319-07881-6.
53.
go back to reference Mohsen Damshenas, Ali Dehghantanha, and Ramlan Mahmoud. A survey on digital forensics trends. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 3: 209–234, 2014. Mohsen Damshenas, Ali Dehghantanha, and Ramlan Mahmoud. A survey on digital forensics trends. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 3: 209–234, 2014.
55.
go back to reference Darren Quick and Kim-Kwang Raymond Choo. Data reduction and data mining framework for digital forensic evidence: Storage, intelligence, review and archive. Trends & Issues in Crime and Criminal Justice, 480: 1–11, 2014. Darren Quick and Kim-Kwang Raymond Choo. Data reduction and data mining framework for digital forensic evidence: Storage, intelligence, review and archive. Trends & Issues in Crime and Criminal Justice, 480: 1–11, 2014.
56.
go back to reference Lingjun Zhao, Lajiao Chen, Rajiv Ranjan, Kim-Kwang Raymond Choo, and Jijun He. Geographical information system parallelization for spatial big data processing: a review. Cluster Computing, 19 (1): 139–152, Mar 2016. ISSN 1573-7543. doi: 10.1007/s10586-015-0512-2. URL https://doi.org/10.1007/s10586-015-0512-2. Lingjun Zhao, Lajiao Chen, Rajiv Ranjan, Kim-Kwang Raymond Choo, and Jijun He. Geographical information system parallelization for spatial big data processing: a review. Cluster Computing, 19 (1): 139–152, Mar 2016. ISSN 1573-7543. doi: 10.1007/s10586-015-0512-2. URL https://​doi.​org/​10.​1007/​s10586-015-0512-2.
58.
64.
65.
go back to reference Ben Martini and Kim-Kwang Raymond Choo. Remote programmatic vCloud forensics: A six-step collection process and a proof of concept. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, sep 2014. doi: 10.1109/trustcom.2014.124. URL https://doi.org/10.1109/trustcom.2014.124. Ben Martini and Kim-Kwang Raymond Choo. Remote programmatic vCloud forensics: A six-step collection process and a proof of concept. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, sep 2014. doi: 10.1109/trustcom.2014.124. URL https://​doi.​org/​10.​1109/​trustcom.​2014.​124.
66.
76.
go back to reference Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, and Solahuddin bin Shamsuddin. Volatile memory acquisition using backup for forensic investigation. In Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, jun 2012. doi: 10.1109/cybersec.2012.6246108. URL https://doi.org/10.1109/cybersec.2012.6246108. Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, and Solahuddin bin Shamsuddin. Volatile memory acquisition using backup for forensic investigation. In Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE, jun 2012. doi: 10.1109/cybersec.2012.6246108. URL https://​doi.​org/​10.​1109/​cybersec.​2012.​6246108.
80.
go back to reference Karen Kent, Suzanne Chevalier, Timothy Grance, and Hung Dang. Sp 800-86. guide to integrating forensic techniques into incident response. Technical report, NIST, Gaithersburg, MD, United States, 2006. Karen Kent, Suzanne Chevalier, Timothy Grance, and Hung Dang. Sp 800-86. guide to integrating forensic techniques into incident response. Technical report, NIST, Gaithersburg, MD, United States, 2006.
82.
go back to reference Mark Scanlon, Jason Farina, and M-Tahar Kechadi. BitTorrent sync: Network investigation methodology. In 2014 Ninth International Conference on Availability, Reliability and Security. IEEE, sep 2014. doi: 10.1109/ares.2014.11. URL https://doi.org/10.1109/ares.2014.11. Mark Scanlon, Jason Farina, and M-Tahar Kechadi. BitTorrent sync: Network investigation methodology. In 2014 Ninth International Conference on Availability, Reliability and Security. IEEE, sep 2014. doi: 10.1109/ares.2014.11. URL https://​doi.​org/​10.​1109/​ares.​2014.​11.
83.
go back to reference Mark Scanlon, Jason Farina, Nhien-An Le-Khac, and M. Tahar Kechadi. Leveraging decentralization to extend the digital evidence acquisition window: Case study on bittorrent sync. CoRR, abs/1409.8486, 2014. URL http://arxiv.org/abs/1409.8486. Mark Scanlon, Jason Farina, Nhien-An Le-Khac, and M. Tahar Kechadi. Leveraging decentralization to extend the digital evidence acquisition window: Case study on bittorrent sync. CoRR, abs/1409.8486, 2014. URL http://​arxiv.​org/​abs/​1409.​8486.
85.
go back to reference Quang Do, Ben Martini, and Kim-Kwang Raymond Choo. Is the data on your wearable device secure? an android wear smartwatch case study. Software: Practice and Experience, 47 (3): 391–403, may 2016. doi: 10.1002/spe.2414. URL https://doi.org/10.1002/spe.2414. Quang Do, Ben Martini, and Kim-Kwang Raymond Choo. Is the data on your wearable device secure? an android wear smartwatch case study. Software: Practice and Experience, 47 (3): 391–403, may 2016. doi: 10.1002/spe.2414. URL https://​doi.​org/​10.​1002/​spe.​2414.
86.
go back to reference Nurul Hidayah Ab Rahman, Niken Dwi Wahyu Cahyani, and Kim-Kwang Raymond Choo. Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurrency and Computation: Practice and Experience, 29 (14): e3868, may 2016. doi: 10.1002/cpe.3868. URL https://doi.org/10.1002/cpe.3868. Nurul Hidayah Ab Rahman, Niken Dwi Wahyu Cahyani, and Kim-Kwang Raymond Choo. Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurrency and Computation: Practice and Experience, 29 (14): e3868, may 2016. doi: 10.1002/cpe.3868. URL https://​doi.​org/​10.​1002/​cpe.​3868.
87.
go back to reference Brian Carrier. Open source digital forensics tools: The legal argument, 2002. Brian Carrier. Open source digital forensics tools: The legal argument, 2002.
89.
go back to reference Niken Dwi Wahyu Cahyani, Ben Martini, and Kim-Kwang Raymond Choo. Using multimedia presentations to enhance the judiciary’s technical understanding of digital forensic concepts: An indonesian case study. In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, jan 2016. doi: 10.1109/hicss.2016.695. URL https://doi.org/10.1109/hicss.2016.695. Niken Dwi Wahyu Cahyani, Ben Martini, and Kim-Kwang Raymond Choo. Using multimedia presentations to enhance the judiciary’s technical understanding of digital forensic concepts: An indonesian case study. In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, jan 2016. doi: 10.1109/hicss.2016.695. URL https://​doi.​org/​10.​1109/​hicss.​2016.​695.
90.
go back to reference Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, and AKBP Muhammad Nuh Al-Azhar. Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study. Concurrency and Computation: Practice and Experience, 29 (14): e3855, may 2016. doi: 10.1002/cpe.3855. URL https://doi.org/10.1002/cpe.3855. Niken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, and AKBP Muhammad Nuh Al-Azhar. Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study. Concurrency and Computation: Practice and Experience, 29 (14): e3855, may 2016. doi: 10.1002/cpe.3855. URL https://​doi.​org/​10.​1002/​cpe.​3855.
91.
go back to reference Niken Dwi Wahyu Cahyani, Ben Martini, and Kim-Kwang Raymond Choo. Using multimedia presentations to enhance the judiciary’s technical understanding of digital forensic concepts: An indonesian case study. In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, jan 2016. doi: 10.1109/hicss.2016.695. URL https://doi.org/10.1109/hicss.2016.695. Niken Dwi Wahyu Cahyani, Ben Martini, and Kim-Kwang Raymond Choo. Using multimedia presentations to enhance the judiciary’s technical understanding of digital forensic concepts: An indonesian case study. In 2016 49th Hawaii International Conference on System Sciences (HICSS). IEEE, jan 2016. doi: 10.1109/hicss.2016.695. URL https://​doi.​org/​10.​1109/​hicss.​2016.​695.
92.
go back to reference Niken Dwi Wahyu Cahyani, Ben Martini, and Kim-Kwang Raymond Choo. Effectiveness of multimedia presentations in improving understanding of technical terminologies and concepts: a pilot study. Australian Journal of Forensic Sciences, 49 (1): 106–122, jan 2016. doi: 10.1080/00450618.2015.1128968. URL https://doi.org/10.1080/00450618.2015.1128968. Niken Dwi Wahyu Cahyani, Ben Martini, and Kim-Kwang Raymond Choo. Effectiveness of multimedia presentations in improving understanding of technical terminologies and concepts: a pilot study. Australian Journal of Forensic Sciences, 49 (1): 106–122, jan 2016. doi: 10.1080/00450618.2015.1128968. URL https://​doi.​org/​10.​1080/​00450618.​2015.​1128968.
Metadata
Title
Private Cloud Storage Forensics: Seafile as a Case Study
Authors
Yee-Yang Teing
Sajad Homayoun
Ali Dehghantanha
Kim-Kwang Raymond Choo
Reza M. Parizi
Mohammad Hammoudeh
Gregory Epiphaniou
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-10543-3_5

Premium Partner