These benefits can also be exploited by malicious users to carry out illegal activities. The easy accessibility of stored data on the cloud storage with the use of wide range of digital devices offers both the economic and technical opportunities to its subscribers. Furthermore, forensic tools meant for Btrfs investigation must be augmented to support automated forensic analysis of possible hidden data in boot sector, file slack, volume slack and mount-point directories, MAC-DTS forgery, and sparse files. Based on our findings, even a corrupt Btrfs volume could contain remnants of deletion of small files, hidden data in reserved locations and magic string forgery. These include making it difficult to securely wipe files, disallowing hiding data in reserved locations of the file system data structures, and so on. The experimental results suggest that Btrfs offers strong hurdles to many anti-forensic attacks. This paper covers this gap by analysing the forensics value of Btrfs and its robustness against anti-forensics activities. However, the potential of Btrfs for forensics examination and its resistance to anti-forensic activities was not investigated before. The Linux B-tree file system (Btrfs) offers a paradigm shift in file system design by providing simple administration, end-to-end data integrity, and immense scalability without loss of performance. File systems are at the spotlight of almost every forensic investigation. Berdasarkan hasil penelitian dengan live forensik dengan akuisisi dan analisis memori RAM, bukti digital dapat dideteksi dan didapatkan bukti digital berupa file dokumen yang didapatkan dari sebuah tautan yang digunakan untuk berbagi file.Īnti-forensic techniques aim to prevent, hinder or corrupt the forensic process of evidence acquisition, its analysis, and/or its admissibility. Penelitian ini dilakukan melalui sebuah simulasi atas skenario kasus penggunaan cloud kemudian dilakukan tahapan-tahapan dalam proses investigasi dari metode digital forensik yang meliputi acquisition, examination, analysis dan conclusion. Dalam penelitian ini dilakukan penelitian cloud storage forensik dari layanan Adrive. Cloud forensik tetap menjadi kendala dan tantangan bagi investigator dikarenakan setiap penyedia cloud memiliki arsitektur yang berbeda sehingga diperlukan investigasi yang berbeda dalam melakukan cloud forensik. Kejahatan cyber akan semakin beraneka macam dan memungkinkan pelaku kejahatan akan berinovasi dengan adanya cloud. Disamping beberapa kemudahan dan kenyaman dalam menggunakan cloud, menimbulkan masalah baru yaitu cybercrime. Cloud computing juga menjadi salah satu teknologi yang cepat berkembang dan transformatif. Overall the study concludes that security of Cubby is far better than IDrive.Įra revolusi industri 4.0 yang serba digital seperti sekarang ini, teknologi cloud tidak bisa dilepaskan dalam kehidupan kita. As a result, interesting locations were identified from where security vulnerabilities and other short comings were exposed. The study aims to possibly help the investigative process by scrutinizing cloud storage applications namely: Cubby and IDrive.
#Sugarsync download mac android
This paper has addressed the above-mentioned problem as per NIST methodology bit-by-bit image(s) of android phone is analyzed for exploring the containers for retrieving important artifacts of user activities. So, it is important for forensic practitioners to match their pace with technological advancements. This makes them an important potential container of evidence during the investigation. Cloud storage applications are attracting user's attention rapidly and will continue enjoying this ever increasing popularity in the near future as well. Because of widespread applications of users' interest, the dependency on the mobile devices has increased.
Advancement in technology allows people to access the data through smartphones regardless of the time and place.