Skip to content
VuFind
Advanced
  • Investigation model for locati...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
Investigation model for locating data remnants on cloud storage
QR Code

Investigation model for locating data remnants on cloud storage

Cloud storage services allow users to store their data online and remotely access, maintain, manage, and back up their data from anywhere through the Internet. Although this storage is helpful, it challenges digital forensic investigators and practitioners in collecting, identifying, acquiring, and...

Full description

Bibliographic Details
Main Authors: Khalid, Abdulrahman, Ahmed, Abdulghani Ali, Mohammed, Muamer N.
Format: Conference or Workshop Item
Language:English
English
Published: Springer Nature Switzerland 2019
Subjects:
QA76 Computer software
Online Access:http://umpir.ump.edu.my/id/eprint/24829/
http://umpir.ump.edu.my/id/eprint/24829/1/22.%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf
http://umpir.ump.edu.my/id/eprint/24829/2/22.1%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/24829/
http://umpir.ump.edu.my/id/eprint/24829/1/22.%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf
http://umpir.ump.edu.my/id/eprint/24829/2/22.1%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf

Similar Items

  • Locating and collecting cybercrime evidences on cloud storage: review
    by: Ahmed, Abdulghani Ali, et al.
    Published: (2017)
  • Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
    by: Ahmed, Abdulghani Ali, et al.
    Published: (2018)
  • The importance of monitoring cloud computing: An intensive review
    by: Fahad, Ahmed Mohammed, et al.
    Published: (2017)
  • Retrieving and identifying remnants of artefacts on local devices using Sync.com cloud
    by: Ahmed, Abdulghani Ali, et al.
    Published: (2024)
  • Review of access control mechanisms in cloud computing
    by: Muhammad Rizwan, Ghori, et al.
    Published: (2018)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips