Private Cloud Storage Forensics: Seafile as a Case Study

  • Yee Yang Teing
  • , Sajad Homayoun
  • , Ali Dehghantanha
  • , Kim Kwang Raymond Choo
  • , Reza M. Parizi
  • , Mohammad Hammoudeh
  • , Gregory Epiphaniou

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

11 Scopus citations

Abstract

Cloud storage forensics is an active research area, and this is unsurprising due to the increasing popularity of cloud storage services (e.g., Dropbox, Google Drive, and iCloud). Existing research generally focuses on public cloud forensics (e.g., client device forensics), rather than private cloud forensics (e.g., both client and server forensics). In this paper, we aim to address the gap by proposing a framework for forensics investigations of private cloud storage services. The proposed framework elaborates on procedures and artefact categories integral to the collection, preservation, analysis, and presentation of key evidential data from both client and server environments. Using the proposed framework to guide the investigation of Seafile, a popular open-source private cloud storage service, we demonstrate the types of client and server side artefacts that can be forensically recovered.

Original languageEnglish
Title of host publicationHandbook of Big Data and IoT Security
PublisherSpringer International Publishing
Pages73-127
Number of pages55
ISBN (Electronic)9783030105433
ISBN (Print)9783030105426
DOIs
StatePublished - 1 Jan 2019
Externally publishedYes

Bibliographical note

Publisher Copyright:
© Springer Nature Switzerland AG 2019.

Keywords

  • Cloud server forensics
  • Cloud storage forensics
  • Digital forensics
  • Forensic science
  • Private cloud investigation
  • Seafile forensics

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Private Cloud Storage Forensics: Seafile as a Case Study'. Together they form a unique fingerprint.

Cite this