2015 International Conference on Computing, Networking and Communications (ICNC) 2015
DOI: 10.1109/iccnc.2015.7069509
|View full text |Cite
|
Sign up to set email alerts
|

Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…The problem arises when the CSPs are not willing to provide the information reside in their premises. They may be reluctant to give out permission to access their multi‐tenant environment . A good reason for not doing so is the fear that these are going to be used against their companies.…”
Section: Cloud Forensic Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…The problem arises when the CSPs are not willing to provide the information reside in their premises. They may be reluctant to give out permission to access their multi‐tenant environment . A good reason for not doing so is the fear that these are going to be used against their companies.…”
Section: Cloud Forensic Challengesmentioning
confidence: 99%
“…En‐Case and Accessdata FTK tools were also used to acquire evidence, and the results were successful, but authors do not recommend them because too much trust is required. On the other hand, tools such as Internet Evidence Finder, and F‐Response make use of relevant extensions to recover various cloud and social network related artifacts . Dykstra et al designed and implemented a management plane forensic toolkit in a private instantiation of the OpenStack cloud platform (IaaS), which is called Forensic Open‐Stack Tools—It consists of three new forensic tools, and it provides trustworthy forensic acquisition of virtual disks, API logs, and guest firewall logs.…”
Section: Cloud Forensic Solutionsmentioning
confidence: 99%
“…This can potentially increase the time, cost and difficulty associated with a forensic investigation. From a technical standpoint, the fact that a single file can be split into a number of data blocks that are then stored on different remote nodes adds another layer of complexity thereby making traditional digital forensic tools redundant [Chen et al, 2015, Almulla et al, 2013. Additionally, the Cloud Service Providers (CSP) and their user base must be taken into consideration.…”
Section: Emerging Cloud Computing or Cloud Forensic Challengesmentioning
confidence: 99%
“…The problem arises when the CSPs are not willing to provide data and information about an incident (Freet et al, 2015). They may be reluctant to give out permission to access their multi-tenant environment (Chen et al, 2015). A good reason for not doing so is the fear that these are going to be used against their companies.…”
Section: Identification Stagementioning
confidence: 99%
“…En-Case and Accessdata FTK tools were also used to acquire evidence and the results were successful, but authors do not recommend them because too much trust is required. On the other hand, tools such as Internet Evidence Finder (IEF) and F-Response make use of relevant extensions to recover various cloud and social network related artifacts (Chen et al, 2015). (Dykstra and Sherman, 2013) designed and implemented a management plane forensic toolkit in a private instantiation of the OpenStack cloud platform (IaaS), which is called Forensic Open-Stack Tools (FROST).…”
Section: Forensic Toolsmentioning
confidence: 99%