Battling the digital forensic backlog through data deduplication

M Scanlon - 2016 sixth international conference on innovative …, 2016 - ieeexplore.ieee.org
In recent years, technology has become truly pervasive in everyday life. Technological
advancement can be found in many facets of life, including personal computers, mobile …

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study

YY Teing, A Dehghantanha, KKR Choo… - Computers & Electrical …, 2017 - Elsevier
Cloud computing can be generally regarded as the technology enabler for Internet of Things
(IoT). To ensure the most effective collection of evidence from cloud-enabled IoT …

CloudMe forensics: A case of big data forensic investigation

YY Teing, A Dehghantanha… - … : Practice and Experience, 2018 - Wiley Online Library
The significant increase in the volume, variety, and velocity of data complicates cloud
forensic efforts, and such (big) evidential data will, at some point, become too …

Overview of the forensic investigation of cloud services

J Farina, M Scanlon, NA Le-Khac… - … Reliability and Security, 2015 - ieeexplore.ieee.org
Cloud Computing is a commonly used, yet ambiguous term, which can be used to refer to a
multitude of differing dynamically allocated services. From a law enforcement and forensic …

Forensic investigation of cooperative storage cloud service: Symform as a case study

YY Teing, A Dehghantanha, KKR Choo… - Journal of forensic …, 2017 - Wiley Online Library
Researchers envisioned Storage as a Service (StaaS) as an effective solution to the
distributed management of digital data. Cooperative storage cloud forensic is relatively new …

Forensics investigation of openflow-based SDN platforms

MK Pandya, S Homayoun, A Dehghantanha - Cyber Threat Intelligence, 2018 - Springer
Abstract Software Defined Networking (SDN) is an increasingly common implementation for
virtualization of networking functionalities. Although security of SDNs has been investigated …

Greening cloud-enabled big data storage forensics: Syncany as a case study

YY Teing, A Dehghantanha, KKR Choo… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
The pervasive nature of cloud-enabled big data storage solutions introduces new
challenges in the identification, collection, analysis, preservation, and archiving of digital …

Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service

M Scanlon, J Farina, MT Kechadi - Computers & Security, 2015 - Elsevier
High availability is no longer just a business continuity concern. Users are increasingly
dependant on devices that consume and produce data in ever increasing volumes. A …

An investigation into peer-to-peer network security using wireshark

A Musa, A Abubakar, UA Gimba… - 2019 15th …, 2019 - ieeexplore.ieee.org
Peer-to-peer networks' ability to be used as the primary vector of delivery in a highly
sensitive environment poses many dangers. The impacts of the hazards on security can be …

Private cloud storage forensics: Seafile as a case study

YY Teing, S Homayoun, A Dehghantanha… - Handbook of Big Data …, 2019 - Springer
Cloud storage forensics is an active research area, and this is unsurprising due to the
increasing popularity of cloud storage services (eg, Dropbox, Google Drive, and iCloud) …