Preview

“Box Analysis” – Data Remnants on User Machines

Powerful Essays
Open Document
Open Document
8046 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
“Box Analysis” – Data Remnants on User Machines
“Box Analysis” – Data Remnants on User Machines

By
TP030662 – Fahad Nasir Dalwai
TP027308 – Ahmed Izhan
TP023019 – Dhaavan Satchi
UC3F1402 IT { ISS, FC }

Module: CT017 - Data Recovery

Supervised by Dr. ALI DEHGHANTANHA

May 2014
Table of Contents

List of Figures

List of Tables

ABSTRACT

Cloud computing is a new computing paradigm that has attracted many computer users, business, and government agencies and can potentially store a large amount of data. Cloud computing has brought lot of advantages especially in ubiquitous service where everybody can access computer services through the internet. With cloud computing, there is no need of physical hardware or servers that will support the company’s computer system, Internet services and also networks. Data storage has been recognized as one of the main concerns in the field of information technology in the past decades due to the security of the data; hence a vast amount of quantity of efforts has been made in the area of distributed storage security. But in the era of rapid-growth in technology, with the various types of cloud storage computing available, it makes it easier for hackers to hack into anything with good penetration knowledge towards criminal activities. The retrieval of digital evidence form cloud storage services can a big challenge in a digital forensic investigation, due to the privacy issues, lack of knowledge on location digital evidences, and legal or jurisdictional boundaries. Box is one of the popular cloud storage services, providing users a very cost-effective with a free version, ability to access, store, collaborate, disseminate data and also managing data the easier way. Using Box as a case study, artifacts were identified that are likely to remain after the use of cloud storage, in the context of a series of experiments; on Windows 8.1, an Android and also on Apple iPhone, and the potential access point(s) for digital forensics examiners to



References: 1) [1] History of Cloud Computing. 2014. History od Cloud Computing. [ONLINE] Available at http://www.eci.com/cloudforum/c;oud-computing-history.html. [Accessed: 12 May 2014]. 2) [2] J.Rittinghouse,J.Ransome, Cloud Computing: Implementation, Management, and Security, 2009 . 3) [3] Prasanta GogoiB, Borah,D K Bhattacharyya, Anomaly Detection Analysis of Intrusion Data using Supervised & Unsupervised Approach, Journal of AICIT, AICIT, vol.5, no.1, pp.95-111, 2010. 4) [4]. AWS, “Amazon web services,” , [Accessed July 5th, 2012]. 5) [5]. R. Marty, “Cloud application logging for forensics,” in In proceedings of the 2011 ACM Symposium on Applied Computing. ACM, 2011, pp. 178–184. 6) [6]. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in Proceedings of the 16th ACM conference on Computer and communications security. ACM, 2009, pp. 199–212. 7) [7]. D. Birk and C. Wegener, “Technical issues of forensic investigations in cloud computing environments,” Systematic Approaches to Digital Forensic Engineering, 2011. 8) [8]. J. Vacca, Computer forensics: computer crime scene investigation. Delmar Thomson Learning, 2005, vol. 1. 9) UC Berkeley Enron Email Analysis. (2014) [Online] Available from: http://bailando.sims.berkeley.edu/enron_email.html. [Accessed: 14th April 2014] 10) box. (2014) Your Hard Drive in the Cloud. [Online] Available from: https://www.box.com/personal/store-files-online/. [Accessed: 15th May 2014]

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    CCJS321 Project 2

    • 1909 Words
    • 5 Pages

    Soloman, M. G., Rudolph, K., Tittel, E., Broom, N., & Barrett, D. (2011). Computer Forensics JumpStart, Second Edition. Retrieved from http://common.books24x7.com.ezproxy.umuc.edu/toc.aspx?bookid=41065…

    • 1909 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The career of a computer Forensics Investigator is that of a specially trained professional who works with various law enforcement agencies as well as private firms to retrieve information from computers and other types of data storage devices. Computers and equipment can often be damaged externally as well as internally corrupted by hacking or viruses. The Computer Forensics Investigator is most well-known for working within the law enforcement industry. They can also be tasked to test the security of a private company 's information systems. The Investigator should have an excellent knowledge of all aspects of the computer including hard drives, networking, and encryption. The Computer Forensics Investigator recovers and examines data from computers and other electronic storage devices in order to use the data as evidence in criminal prosecutions. Following data retrieval, the Investigator writes up technical reports detailing how the computer evidence was discovered and all of the steps taken during the retrieval process. Patience and willingness to work long hours are qualities that are well suited for this profession.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    "Computer forensics is the specialized practice of investigating computer media for the purpose of discovering and analyzing available, deleted, or "hidden" information that may serve as useful evidence in a legal matter. " (Steen, Hassell 2004)…

    • 333 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Csi Effect

    • 1232 Words
    • 5 Pages

    References: * forensics. (n.d.) The American Heritage® Dictionary of the English Language, Fourth Edition. (2003). Retrieved January 24 2012 from http://www.thefreedictionary.com/forensics…

    • 1232 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Digital Forensics

    • 1724 Words
    • 7 Pages

    The digital age has brought many advantages to individuals and businesses alike since it started. However, it has also brought a whole host of problems with it as well. More people can tap into to technology for fraudulent or criminal means, which has, of course, made business far more vulnerable than it ever has been before. This is why the idea of using digital forensics in the corporate sector has become more and more prevalent over the past few years.…

    • 1724 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Computer Forensics

    • 504 Words
    • 3 Pages

    The growing capability of computers and applications as well as the ever increasing level of interconnectivity and information sharing has made it easier for persons with malicious intent to use computers to plan terrorism attacks, conduct intellectual property theft, credit card fraud and hack computer systems to gain access to confidential information. The sophisticated nature of these crimes has seen the growing need for experts in computer forensics.…

    • 504 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    The traditional era of computing involves the use of software, hardware and storage to achieve the required computational service whereas cloud computing has isolated the services from resources (networks, storage, servers). The required…

    • 3339 Words
    • 14 Pages
    Best Essays
  • Powerful Essays

    Rose, C. (2011). A Break In The Cloud? The Reality of Cloud Computing. International Journal of Management & Information Systems, 15(4), 59-63.…

    • 2131 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    are offered via a service called the Infrastructure as a Service (IaaS), where a CSC can…

    • 13362 Words
    • 54 Pages
    Powerful Essays
  • Best Essays

    computing has been increasing for some time and the maturity of the market is steadily growing. Security is the question most…

    • 4191 Words
    • 17 Pages
    Best Essays