Towards the Development of a Neo4j Tool for Cloud Client Forensics

Abstract:

This article proposes the development of open-source client forensic artefacts’ knowl- edgebase that uses Neo4j as the graph database which allows for the prompt location of eviden- tial artefacts. The authors ran experiments to identify artefacts created when the commonly used devices are used to access some cloud storage services. For each artefact, the knowledgebase contains the cloud storage service accessed, the device and the platform used, the activity that generated it, a description of the created artefacts, and the event/activity making the object. The authors conclude that the developed prototype can enhance the investigation process by timely identifying artefacts that may be used to prove usage of a cloud storage service.


AUTHORS

Photo of Rose Shumba

Computer Science Department Bowie State University, Bowie, Maryland, 
United States

Rose Shumba is the Chair and Professor for the Computer Science Department at Bowie State University. Before joining Bowie State University, she was a Professor in the Cyber Science Department at the USNA. Professor Shumba’s research interests include secure software engineering, IoT and security, cloud forensics, mobile forensics, software validation, and verification gender and computer science/cyber security. She is a member of NIST Cloud Computing Working Group (WG), IFIP WG 11.9, on Digital Forensics, ACM Special Interest Group in Computer Science Education, and the American Educational Research Association (AERA).

 

Photo of Joram Ngwenya

Ivy School of Business, Supply Chain and Information Systems Department Iowa State University Ames, Iowa 
United States

Joram Ngwenya is an Assistant Teaching Professor in the Ivy College of Business, department of Information Systems and Business Analytics at Iowa State University of Science and Technology. He is a Neo4j Certified Professional.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com