Abstract
Cloud storage forensics is an active research area, and this is unsurprising due to the increasing popularity of cloud storage services (e.g., Dropbox, Google Drive, and iCloud). Existing research generally focuses on public cloud forensics (e.g., client device forensics), rather than private cloud forensics (e.g., both client and server forensics). In this paper, we aim to address the gap by proposing a framework for forensics investigations of private cloud storage services. The proposed framework elaborates on procedures and artefact categories integral to the collection, preservation, analysis, and presentation of key evidential data from both client and server environments. Using the proposed framework to guide the investigation of Seafile, a popular open-source private cloud storage service, we demonstrate the types of client and server side artefacts that can be forensically recovered.
| Original language | English |
|---|---|
| Title of host publication | Handbook of Big Data and IoT Security |
| Publisher | Springer International Publishing |
| Pages | 73-127 |
| Number of pages | 55 |
| ISBN (Electronic) | 9783030105433 |
| ISBN (Print) | 9783030105426 |
| DOIs | |
| State | Published - 1 Jan 2019 |
| Externally published | Yes |
Bibliographical note
Publisher Copyright:© Springer Nature Switzerland AG 2019.
Keywords
- Cloud server forensics
- Cloud storage forensics
- Digital forensics
- Forensic science
- Private cloud investigation
- Seafile forensics
ASJC Scopus subject areas
- General Computer Science
Fingerprint
Dive into the research topics of 'Private Cloud Storage Forensics: Seafile as a Case Study'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver