Analisis Forensik Aplikasi Dropbox Pada Android Menggunakan Metode NIST
Sari
Teks Lengkap:
PDFReferensi
W. F. Hsien, C. C. Yang, and M. S. Hwang, “A survey of public auditing for secure data storage in cloud computing,” IJ Network Security, vol. 18,no. 1, pp. 133–142, 2016.
M. A. Khan, “A survey of security issues for cloud computing,” Journal of Network and Computer Applications, vol. 71, pp. 11–29, 2016.
H. Chung, J. Park, S. Lee, and C. Kang, “Digital forensic investigation of cloud storage services,” Digital Investigation, vol. 9, no. 2, pp. 81–95, 2012.
D. C. Chou, “Cloud computing risk and audit issues,” Computer Standards & Interfaces, vol. 42, pp. 137–142, 2015.
M. Muchmore. The best cloud storage and filesharing services for 2019. Accessed: 2019-07-07.[Online]. Available: https://bit.ly/2XUlAfq
S. Mitroff. OneDrive, Dropbox, Google Drive and Box: Which cloud storage service is right for you? Accessed: 2019-07-07. [Online]. Available: https://cnet.co/2emAPbD
L. Caviglione, S. Wendzel, and W. Mazurczyk, “The future of digital forensics: Challenges and the road ahead,” IEEE Security Privacy, vol. 15, no. 6, pp. 12–17, 2017.
E. A. Vincze, “Challenges in digital forensics,” Police Practice and Research, vol. 17, no. 2, pp.183–194, 2016.
G. B. Satrya, A. A. Nasrullah, and S. Y. Shin, “Identifying artefact on Microsoft OneDrive client to support Android forensics,” International Journal of Electronic Security and Digital Forensics, vol. 9, no. 3, pp. 269–291, 2017.
R. McKemmish, “When is digital evidence forensically sound?” in IFIP International Conference on Digital Forensics, Kyoto, Japan, Jan. 28–30, 2008, pp. 3–15.
Dropbox. Company info. Accessed: 2019-07-07. [Online]. Available www.dropbox.com
A. Pichan, M. Lazarescu, and S. T. Soh, “Cloud forensics: Technical challenges, solutions and comparative analysis,” Digital Investigation, vol. 13, pp. 38–57, 2015.
F. Daryabar, A. Dehghantanha, and K.-K. R. Choo, “Cloud storage forensics: MEGA as a case study,” Australian Journal of Forensic Sciences, vol. 49, no. 3, pp. 344–357, 2017.
Y. Y. Teing, A. Dehghantanha, K.-K. R. Choo, T. Dargahi, and M. Conti, “Forensic investigation of cooperative storage cloud service: Symform as a case study,” Journal of Forensic Sciences, vol. 62, no. 3, pp. 641–654, 2017.
V. Roussev and S. McCulley, “Forensic analysis of cloud-native artifacts,” Digital Investigation, vol. 16, pp. S104–S113, 2016.
C. Stelly and V. Roussev, “SCARF: A containerbased approach to cloud-scale digital forensic processing,” Digital Investigation, vol. 22, pp. S39–S47, 2017.
Kurniawan et al., 2017. Implementasi Algoritma AES dalam Mengenkripsi Berkas Terintegrasi dengan Layanan Cloud Storage Berbasis Android. [Online] Tersedia:http://seminar.iaii.or.id/index.php/SISFOTEK/article/view/84/73.
H. M. Wolfe, “Web Solutions and Technologies After the Hack”, presented at ICE Conference, 2003.
S. Basamh, H. A. Qudaih and J. B. Ibrahim, "An Overview on Cyber Security Awareness in Muslim Countries," International Journal of Information and Communication Technology Research, vol. 4, no. 1, pp. 21-24, 2014.
Refbacks
- Saat ini tidak ada refbacks.