Cloud signature: An application to detect cloud-computing applications artifacts

Jeremy Koppen, University of Rhode Island

Abstract

During the process of investigating a computing device, law enforcement officers must analyze the device for any data that may be of evidentiary value. With the emergence of cloud-computing, the data may no longer be present on the physical device, but the data may exist on a remote server. Currently, there are no existing tools that are capable of detecting the presence of cloud-computing applications on seized devices. The lack of tools to support the presence of cloud-computing applications could mean that data with evidentiary value is not being detected. ^ This thesis project designed and implemented a prototype tool that automatically detects the presence of supported cloud-computing based applications, and then interprets the data so that it can be presented to a law enforcement officer in a format that facilitates their forming a warrant to the cloud service provider for the evidence.^

Subject Area

Computer Science

Recommended Citation

Jeremy Koppen, "Cloud signature: An application to detect cloud-computing applications artifacts" (2012). Dissertations and Master's Theses (Campus Access). Paper AAI1508259.
http://digitalcommons.uri.edu/dissertations/AAI1508259

Share

COinS