2015
DOI: 10.1016/j.cose.2015.05.003
|View full text |Cite
|
Sign up to set email alerts
|

Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service

Abstract: High availability is no longer just a business continuity concern. Users are increasingly dependant on devices that consume and produce data in ever in- One option is BitTorrent Sync, a cloudless synchronisation utility provides data availability and redundancy. This utility replicates files stored in shares to remote peers with access controlled by keys and permissions. While lacking the economies brought about by scale, complete control over data access has made this a popular solution. The ability to replic… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
2
1

Relationship

3
6

Authors

Journals

citations
Cited by 20 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…Functionality such as this can greatly help towards the elimination of duplicated efforts in the analysis of content. • Using the proposed deduplication system can also greatly expedite the acquisition of digital evidence from hashbased file-synchronisation services, such as BitTorrent Sync or Syncthing [10,6]. Given that these tools rely on frequent hashing to determine when a synchronisation is required, those same hashes can be used for artefact acquisition and elimination purposes.…”
Section: A Future Workmentioning
confidence: 99%
“…Functionality such as this can greatly help towards the elimination of duplicated efforts in the analysis of content. • Using the proposed deduplication system can also greatly expedite the acquisition of digital evidence from hashbased file-synchronisation services, such as BitTorrent Sync or Syncthing [10,6]. Given that these tools rely on frequent hashing to determine when a synchronisation is required, those same hashes can be used for artefact acquisition and elimination purposes.…”
Section: A Future Workmentioning
confidence: 99%
“…The third party systems, particularly the cloud computing, though have the benefits of scalability, security, cost reduction, portability, higher flexibility, and availability, are faced with serious security issues (Bachlechner et al, 2014;Karadsheh, 2012). Concerns were raised over unauthorised access to third party cloud based systems, causing large scale exposure of organizational private data (Scanlon, Farina, & Kechadi, 2015). Thus, the need for due diligence in the selection of a trusted cloud service provider (Tang & Liu, 2015) and the establishment of appropriate security policies, service level agreement and compliance for enhancing cloud security (Karadsheh, 2012).…”
Section: Security In Third-party Systemsmentioning
confidence: 99%
“…The investigation of intercepted/wiretapped data can be classified into two objects, voice and network data [1]. This paper will focus on in-tercepted network data, which is a necessary source of evidence for a range of crimes, e.g., child abuse material distribution [4], cloud hosted services [1], industrial espionage [5], dead drops [5,6], malicious software distribution [6], instant messaging [7], piracy [8], illegal content distribution [6], etc. A problem arises for non-technical detectives as it is very difficult to interpret the network data.…”
Section: Introductionmentioning
confidence: 99%