Shariatia, M, Dehghantanha, A and Choo, K-WR 2015, 'SugarSync forensic analysis' , Australian Journal of Forensic Sciences, 48 (1) , pp. 95-117.
- Published Version
Restricted to Repository staff only
Download (1MB) | Request a copy
Cloud storage services are popular with both individuals and businesses as they offer cost-effective, large capacity storage and multi-functional services on a wide range of devices such as personal computers (PCs), Mac computers, and smart mobile devices (e.g. iPhones). However, cloud services have also been known to be exploited by criminals, and digital forensics in the cloud remains a challenge, partly due to the diverse range of cloud services and devices that can be used to access such services. Using SugarSync (a popular cloud storage service) as a case study, research was undertaken to determine the types and nature of volatile and non-volatile data that can be recovered from Windows 8, Mac OS X 10.9, Android 4 and iOS 7 devices when a user has carried out different activities such as upload and download of files and folders. We then document the various digital artefacts that could be recovered from the respective devices.
|Uncontrolled Keywords:||cloud forensic; SugarSync; digital forensics; cloud storage forensic|
|Schools:||Schools > School of Computing, Science and Engineering
Schools > School of Computing, Science and Engineering > Salford Innovation Research Centre (SIRC)
|Journal or Publication Title:||Australian Journal of Forensic Sciences|
|Publisher:||Taylor & Francis|
|Depositing User:||Dr. Ali Dehghantanha|
|Date Deposited:||27 Apr 2015 11:17|
|Last Modified:||19 Jan 2016 15:26|
Actions (login required)
|Edit record (repository staff only)|