Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study On Bittorent Sync
|Title:||Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study On Bittorent Sync||Authors:||Kechadi, Tahar
|Permanent link:||http://hdl.handle.net/10197/6575||Date:||20-Sep-2014||Online since:||2015-05-19T16:39:53Z||Abstract:||File synchronization services such as Dropbox, Google Drive, Microsoft OneDrive, Apple iCloud, etc., are becoming increasingly popular in today’s always-connected world. A popular alternative to the aforementioned services is BitTorrent Sync. This is a decentralized/cloudless file synchronization service and is gaining significant popularity among Internet users with privacy concerns over where their data is stored and who has the ability to access it. The focus of this paper is the remote recovery of digital evidence pertaining to files identified as being accessed or stored on a suspect’s computer or mobile device. A methodology for the identification, investigation, recovery and verification of such remote digital evidence is outlined. Finally, a proof-of-concept remote evidence recovery from BitTorrent Sync shared folder highlighting a number of potential scenarios for the recovery and verification of such evidence||Funding Details:||Science Foundation Ireland||Type of material:||Conference Publication||Publisher:||Association of Digital Forensics, Security and Law||Journal:||Journal of Digital Forensics, Security and Law||Volume:||9||Issue:||2||Start page:||85||End page:||99||Copyright (published version):||2014 ADFSL||Keywords:||Machine learning; Statistics; Digital evidence; Remote evidence recovery; BitTorrent sync; Mobile device forensics||Other versions:||http://ojs.jdfsl.org/index.php/jdfsl/article/view/266||Language:||en||Status of Item:||Peer reviewed||Conference Details:||6th International Conference on Digital Forensics and Cyber Crime (ICDF2C 2014), New Haven, Connecticut, United States, 18-20 September 2014|
|Appears in Collections:||Computer Science Research Collection|
Insight Research Collection
Show full item record
Page view(s) 5053
This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.