Preview

“Box Analysis” – Data Remnants on User Machines

Powerful Essays
Open Document
Open Document
8046 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
“Box Analysis” – Data Remnants on User Machines
“Box Analysis” – Data Remnants on User Machines

By
TP030662 – Fahad Nasir Dalwai
TP027308 – Ahmed Izhan
TP023019 – Dhaavan Satchi
UC3F1402 IT { ISS, FC }

Module: CT017 - Data Recovery

Supervised by Dr. ALI DEHGHANTANHA

May 2014
Table of Contents

List of Figures

List of Tables

ABSTRACT

Cloud computing is a new computing paradigm that has attracted many computer users, business, and government agencies and can potentially store a large amount of data. Cloud computing has brought lot of advantages especially in ubiquitous service where everybody can access computer services through the internet. With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, Internet services and also networks. Data storage has been recognized as one of the main concerns in the field of information technology in the past decades due to the security of the data; hence a vast amount of quantity of efforts has been made in the area of distributed storage security. But in the era of rapid-growth in technology, with the various types of cloud storage computing available, it makes it easier for hackers to hack into anything with good penetration knowledge towards criminal activities. The retrieval of digital evidence form cloud storage services can a big challenge in a digital forensic investigation, due to the privacy issues, lack of knowledge on location digital evidences, and legal or jurisdictional boundaries. Box is one of the popular cloud storage services, providing users a very cost-effective with a free version, ability to access, store, collaborate, disseminate data and also managing data the easier way. Using Box as a case study, artifacts were identified that are likely to remain after the use of cloud storage, in the context of a series of experiments; on Windows 8.1, an Android and also on Apple iPhone, and the potential access point(s) for digital forensics examiners to



References: 1) [1] History of Cloud Computing. 2014. History od Cloud Computing. [ONLINE] Available at http://www.eci.com/cloudforum/c;oud-computing-history.html. [Accessed: 12 May 2014]. 2) [2] J.Rittinghouse,J.Ransome, Cloud Computing: Implementation, Management, and Security, 2009 . 3) [3] Prasanta GogoiB, Borah,D K Bhattacharyya, Anomaly Detection Analysis of Intrusion Data using Supervised & Unsupervised Approach, Journal of AICIT, AICIT, vol.5, no.1, pp.95-111, 2010. 4) [4]. AWS, “Amazon web services,” , [Accessed July 5th, 2012]. 5) [5]. R. Marty, “Cloud application logging for forensics,” in In proceedings of the 2011 ACM Symposium on Applied Computing. ACM, 2011, pp. 178–184. 6) [6]. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 199–212. 7) [7]. D. Birk and C. Wegener, “Technical issues of forensic investigations in cloud computing environments,” Systematic Approaches to Digital Forensic Engineering, 2011. 8) [8]. J. Vacca, Computer forensics: computer crime scene investigation. Delmar Thomson Learning, 2005, vol. 1. 9) UC Berkeley Enron Email Analysis. (2014) [Online] Available from: http://bailando.sims.berkeley.edu/enron_email.html. [Accessed: 14th April 2014] 10) box. (2014) Your Hard Drive in the Cloud. [Online] Available from: https://www.box.com/personal/store-files-online/. [Accessed: 15th May 2014]

You May Also Find These Documents Helpful

  • Best Essays

    With the unprecedented growth and spread of information, there is no wonder why large Information Technology companies have been investing in the “cloud”. To expand, when referring to Cloud Computing, this means to access and store information not stored with in your computer whether it be public, private, or hybrid cloud computing. In technological terms, the server you are accessing is somewhere else and therefore, the information and tools you are using are “up in the clouds” but more so stored in another server space. However, whether you are paying for services through software, total usage, or free usage (hence the types of cloud services) Cloud Computing seems to be everywhere. Yet, it is important to recognize what is to gain by using cloud computing from big businesses to individual users and what are some risky moves when utilizing cloud storage over the Internet. Hence, the content of this paper will discuss the pros and cons of cloud computing and where cloud computing is headed in todays online society.…

    • 1307 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Anth Media Analysis

    • 1543 Words
    • 7 Pages

    Houck, M. M., & Siegal, J. A. (2010). Fundamentals of Forensic Science (2 ed.). Burlington: Elsevier.…

    • 1543 Words
    • 7 Pages
    Better Essays
  • Better Essays

    CCJS321 Project 2

    • 1909 Words
    • 5 Pages

    Soloman, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics JumpStart, Second Edition. Retrieved from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=41065…

    • 1909 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Csi Effect

    • 1232 Words
    • 5 Pages

    References: * forensics. (n.d.) The American Heritage® Dictionary of the English Language, Fourth Edition. (2003). Retrieved January 24 2012 from http://www.thefreedictionary.com/forensics…

    • 1232 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    "Computer forensics is the specialized practice of investigating computer media for the purpose of discovering and analyzing available, deleted, or "hidden" information that may serve as useful evidence in a legal matter. " (Steen, Hassell 2004)…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    S. Farrell, “Portable Storage and Data Loss,” Internet Computing, IEEE, vol. 12, no. 3, pp. 90-93, 2008.…

    • 3339 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Rose, C. (2011). A Break In The Cloud? The Reality of Cloud Computing. International Journal of Management & Information Systems, 15(4), 59-63.…

    • 2131 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    are offered via a service called the Infrastructure as a Service (IaaS), where a CSC can…

    • 13362 Words
    • 54 Pages
    Powerful Essays
  • Best Essays

    computing has been increasing for some time and the maturity of the market is steadily growing. Security is the question most…

    • 4191 Words
    • 17 Pages
    Best Essays