482
Views
33
CrossRef citations to date
0
Altmetric
Papers

SugarSync forensic analysis

, &
Pages 95-117 | Received 05 Oct 2014, Accepted 26 Jan 2015, Published online: 08 Apr 2015

References

  • Best Cloud Storage Providers and Reviews Online. 2014. [Cited 10 May 2014]. Available from: http://www.top10cloudstorage.com/
  • Chung H, Park J, Lee S, Kang C. Digital forensic investigation of cloud storage services. Digital Invest. 2012;9(2):81–95. doi:10.1016/j.diin.2012.05.015.
  • Galante J, Kharif OAP. Sony network breach shows Amazon cloud’s appeal for hackers. Bloomberg: 2011 [cited 10 May 2014]. Available from: http://www.bloomberg.com/news/2011-05-15/sony-attack-shows-amazon-s-cloud-service-lures-hackers-at-pennies-an-hour.html
  • Grispos G, Storer T, Glisson WB. Calm before the storm: the challenges of cloud. Int Jnl Dig Crime and For 4(2):28–48, 2012.
  • Hale JS. Amazon cloud drive forensic analysis. Digital Invest. 2013;10(3):259–265. doi:10.1016/j.diin.2013.04.006.
  • Hooper C, Martini B, Choo K-KR. Cloud computing and its implications for cybercrime investigations in Australia. Comput Law Security Rev. 2013;29(2):152–163. doi:10.1016/j.clsr.2013.01.006.
  • Martini B, Choo K-KR. An integrated conceptual digital forensic framework for cloud computing. Digital Invest. 2012;9(2):71–80. doi:10.1016/j.diin.2012.07.001.
  • Martini B, Choo K-KR. Cloud storage forensics: ownCloud as a case study. Digital Invest. 2013;10(4):287–299. doi:10.1016/j.diin.2013.08.005.
  • Quick D, Martini B, Choo K-K. Forensics, cloud storage. Syngress; 2014 Waltham, MA, USA.
  • Quick D, Choo K-KR. Digital droplets: Microsoft SkyDrive forensic data remnants. Future Gener Comp Sy. 2013;29(6):1378–1394. doi:10.1016/j.future.2013.02.001.
  • Quick D, Choo K-KR. Dropbox analysis: data remnants on user machines. Digital Invest. 2013;10(1):3–18. doi:10.1016/j.diin.2013.02.003.
  • Quick D, Choo K-KR. Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata? Digital Invest. 2013;10(3):266–277. doi:10.1016/j.diin.2013.07.001.
  • Quick D, Choo K-KR. Google drive: forensic analysis of data remnants. J Network Comput Appl. 2014;40:179–193. doi:10.1016/j.jnca.2013.09.016.
  • Ruan K, Carthy J, Kechadi T, Crosbie M. Cloud Forensics. IFIP Advances in Information and Communication Technology. 2011;35–46. doi:10.1007/978-3-642-24212-0_3.
  • Kleynhans S. The new PC era: the personal cloud. Gartner. 2012 [cited 2014 May 10]. Available from: http://www.gartner.com/newsroom/id/1947315
  • Thethi N, Keane A. Digital forensics investigations in the cloud. IEEE International Advance Computing Conference (IACC). 2014; 1475–1480. doi:10.1109/IAdCC.2014.6779543.
  • Choo KKR. Cloud computing: challenges and future directions. Trends Issues Crime Crim justice. 2010;400:1–6.
  • Martini B, Choo KKR. Distributed filesystem forensics: XtreemFS as a case study. Digital Investigation. 2014a;11(4):295–313.10.1016/j.diin.2014.08.002
  • Martini B, Choo KKR. Remote programmatic vcloud forensics. Proceedings of 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications; 2014b September; TrustCom 2014.‏
  • Choo K-KR. Legal issues in the cloud. IEEE Cloud Comput Mag. 2014;1(1):94–96.10.1109/MCC.2014.14
  • National Institute of Standards and Technology. NIST Cloud Computing Forensic Science Challenges. NIST draft NISTIR 8006; 2014.
  • Martini B, Choo KKR. Cloud forensic technical challenges and solutions: a snapshot. IEEE Cloud Comput Mag. 2014c;1(4):20–25.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.