Handbook of Big Data and IoT Security 2019
DOI: 10.1007/978-3-030-10543-3_5
|View full text |Cite
|
Sign up to set email alerts
|

Private Cloud Storage Forensics: Seafile as a Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 74 publications
0
3
0
Order By: Relevance
“…Seafile, like NextCloud, is an open-source cloud server that can be used to store data where it is not popular like NextCloud, but has the same services and features that other cloud storage providers can offer [6,20] . In this precise research study, it is demonstrated how efficient Seafile is compared to NextCloud.…”
Section: Cloud Storage Comparisonmentioning
confidence: 99%
“…Seafile, like NextCloud, is an open-source cloud server that can be used to store data where it is not popular like NextCloud, but has the same services and features that other cloud storage providers can offer [6,20] . In this precise research study, it is demonstrated how efficient Seafile is compared to NextCloud.…”
Section: Cloud Storage Comparisonmentioning
confidence: 99%
“…SeaFile service is considered an open-source cloud storage service, defects have been discovered on the server and the client that can be restored legally, by specifying the client's synchronization, encryption, file and data management for authentication and forensic analysis, by creating eight virtual accounts for the role of clients and administrators and assigning an emoji and a unique name For each user account [6].The test consists of two VM workstations for servers, three virtual machines for clients, an iOS device and an Android device that have been restored to factory settings, and VMware was used to host the VMware Fusion Professional version 7.0.0 on a MacBook Pro with a Mac OSX Mavericks 10.9.5 system with Intel i7 2.6GHz processor specifications quickly. With a 16 GB main memory, virtual drives have been used because the use of physical devices to perform the procedures is tiring in terms of copying, scanning and reinstallation, as the virtual machine offers an acceptable error rate through the use of restore points in the event of unacceptable results, in addition to using Physical mobile devices instead of the emulator for the ineffectiveness of the emulator because it deletes some of the features of these devices and provides unsatisfactory results, using devices with few spaces to save time and effort in analyzing snapshots, in addition to breaking the protection of mobile devices to access the main system of portable devices (root).The test resulted in the fact that the private cloud is important to users and medium and small enterprises, but it is not without flaws in terms of forensicsSeaFile.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The exponential growth of the Internet interconnections has led to a significant growth of break-in attacks that can exploit vulnerabilities that exist within the applications, or in the operating system, on the mobile device [20][21][22]. Additionally, any attack on the cellular network can compromise the integrity of information; attacks such as International Mobile Subscriber Identity (IMSI) catchers [23], which feign man-in-the-middle attacks, can target user sensitive information, e.g., locate cellular phones, intercept communication content like text messages and phone calls.…”
Section: An Overview Of MCC Authentication Protocolsmentioning
confidence: 99%