Cloud signature: An application to detect cloud-computing applications artifacts
During the process of investigating a computing device, law enforcement officers must analyze the device for any data that may be of evidentiary value. With the emergence of cloud-computing, the data may no longer be present on the physical device, but the data may exist on a remote server. Currently, there are no existing tools that are capable of detecting the presence of cloud-computing applications on seized devices. The lack of tools to support the presence of cloud-computing applications could mean that data with evidentiary value is not being detected. ^ This thesis project designed and implemented a prototype tool that automatically detects the presence of supported cloud-computing based applications, and then interprets the data so that it can be presented to a law enforcement officer in a format that facilitates their forming a warrant to the cloud service provider for the evidence.^
"Cloud signature: An application to detect cloud-computing applications artifacts"
Dissertations and Master's Theses (Campus Access).