Digital droplets: Microsoft SkyDrive forensic data remnants

Future Generation Computer Systems - Tập 29 - Trang 1378-1394 - 2013
Darren Quick1, Kim-Kwang Raymond Choo1
1Information Assurance Research Group, Advanced Computing Research Centre, University of South Australia, Mawson Lakes Campus, Mawson Lakes Boulevard, Mawson Lakes SA 5095, Australia

Tài liệu tham khảo

P. Mell, T. Grance, The NIST definition of cloud computing: recommendations of the National Institute, NIST Special Publication 800-145, 2011. USGAO, Information technology reform: progress made but future cloud computing efforts should be better planned’, 2012. Available at: http://www.gao.gov/assets/600/592249.pdf. S. Kleynhans, The new PC Era-the personal cloud, Gartner Inc., 2012. Available at: http://www.gartner.com/resId=1890215. S. Sinofsky, Windows 8 Launch, 2012. Available at:http://www.microsoft.com/en-us/news/Speeches/2012/10-25Windows8.aspx. Mason, 2011, Digital evidence and ‘cloud’ computing, Computer Law and Security Review, 27, 524, 10.1016/j.clsr.2011.07.005 Reilly, 2011, Cloud computing: pros and cons for computer forensic investigations, International Journal of Multimedia and Image Processing, 1, 26, 10.20533/ijmip.2042.4647.2011.0004 D. Birk, C. Wegener, Technical issues of forensic investigatinos in cloud computing environments, in: Proceedings of 6th International Workshop on Systematic Approaches to Digital Forensic Engineering, IEEE/SADFE, Oakland, CA, USA, 2011, pp. 1–10. AGIMO, Cloud computing strategic direction paper: opportunities and applicability for use by the Australian Government, 2011. W3Counter, Browser statistics July 2012, 2012. Available at: http://www.w3counter.com/globalstats.php?year=2012&month=7. ACPO, Good practice guidelines for computer based evidence v4.0, 2006. Available at: www.7safe.com/electronic_evidence. NIJ, Electronic Crime Scene Investigation: A Guide for First Responders, second ed., 2008. Available at: http://www.nij.gov/pubs-sum/219941.htm. B. Klimt, Y. Yang, Introducing the Enron corpus, in: First Conference on Email and Anti-Spam, CEAS, 2004. USDoD, DoD 5220.22-M-Sup 1, National Industrial Security Program Operating Manual Supplement, 1995. Available at: http://www.dtic.mil/whs/directives/corres/pdf/522022MSup1.pdf. NIST, NIST computer forensic tool testing, 2012. Available at: http://www.cftt.nist.gov/disk_imaging.htm. F. McClain, Dropbox Forensics, updated 31 May 2011, Forensic Focus, 2011. Available at: http://www.forensicfocus.com/dropbox-forensics. H. Chung, J. Park, S. Lee, C. Kang, Digital forensic investigation of cloud storage services, Digital Investigation. 2012. Available at: http://www.sciencedirect.com/science/article/pii/S1742287612000400. Microsoft, How NTFS reserves space for its Master File Table (MFT), 2008. Available at: http://support.microsoft.com/kb/174619. Microsoft, What is the prefetch folder? 2012. Available at: http://windows.microsoft.com/en-AU/windows-vista/What-is-the-prefetch-folder. Microsoft, Shortcuts: frequently asked questions’, 2012. Available at: http://windows.microsoft.com/en-us/windows-vista/Shortcuts-frequently-asked-questions. L. Mueller, Windows 7 Forensics—Part IV—Thumbcache˙*.db’, 2010. Available at: http://www.forensickb.com/2010/01/windows-7-forensics-part-iv.html. Taylor, 2011, Forensic investigation of cloud computing systems, Network Security, 2011, 4, 10.1016/S1353-4858(11)70024-1 J. Laugesen, Y. Yuan, What factors contributed to the success of Apple’s iPhone? in: Mobile Business and 2010 Ninth Global Mobility Roundtable, ICMB-GMR, 2010 Ninth International Conference on IEEE, 2010, pp. 91–99. M. Zhu, Mobile cloud computing: implications to smartphone forensic procedures and methodologies, AUT University, 2011. SAI, HB 171-2003 Guidelines for the management of IT evidence, Standards Australia, Sydney, Australia, 2003. A. Duffy, Faraday Bag testing in a reverberation chamber—a preliminary study, 2010. Available at: http://www.faradaybag.com/faraday-bag-testing/demontfort-university-faraday-bag-testing.html.