Simulasi Analisis Bukti Digital Pada Layanan Cloud Computing Menggunakan Metode NIST 800-86

 (*)Irfan Helmi Mail (Universitas Siliwangi, Indonesia)
 Nur Widiyasono (Universitas Siliwangi, Indonesia)
 Rohmat Gunawan (Universitas Siliwangi, —)

(*) Corresponding Author

Abstract

Ease and support for cloud-based data storage It has supported an increase in the number of cloud services. The increasing number of uses for cloud services also increases the number of digital-based criminal actions related to the addition of facilities to cloud services. The cloud service feature designed to store data to support the smooth running of business processes can be misused by criminal assistance to store crime data. Accurate digital evidence is one way to prove a digital crime, which can then be used as supporting evidence in the trial. This study discusses the analysis of digital evidence from a cloud service. The analysis process using the NIST 800-86 method is carried out on digital evidence from 5 previously prepared scenarios related to the use of cloud service features that use being misused. Data acquisition techniques use the method of direct acquisition and physical imaging to obtain digital evidence. The experimental results showed that after scenario 1 and scenario 3, information on the file name and directory of the paths downloaded by client 1 and client 2 were obtained with information on the IP address, mac address, user name, password and time stamp. After scenario 2, digital evidence has been obtained that contains information on the name and location of the folder on the cloud server. After scenario 4, information on the name of the file and the shared folder is successfully obtained, equipped with client information that has the right to access the files and folders. After scenario 5, information about the file name and directory of the file path is successfully obtained.

Full Text:

PDF


Article Metrics

Abstract view : 628 times
PDF - 464 times

References

NIST (National Institute of Standards and Technology), “The attached DRAFT document ( provided here for HISTORICAL purposes ) has been superseded by the following publication”, 2012.

M. S. Asyaky, “Analisis dan Perbandingan Bukti Digital Aplikasi Instant Messenger Pada Android,” vol. 3, pp. 220-231, 2019.

M. Lessing and Van, S. B., “Live forensic acquisition as alternative to traditional forensic processes”, 2016.

N. Widiyasono, I. Riadi, and A. Luthfi, “Investigasi, Penerapan Metode ADAM Pada Proses Computing, Layanan Private Cloud,” 2016.

I. Febrian, E. Kurdiat, N. Widiyasono, and H. Mubarok, “Analisis Proses Investigasi Dekstop PC Yang Terhubung Layanan Private Cloud,” vol. 2, pp. 221–230, 2016.

P. Yakub, “Network Forensic Pada Jaringan Berbasis Awan,” Mei 2017.

A. Yudhana, R. Umar, and A. Ahmadi, “Akuisisi Data Forensik Google Drive Pada Android Dengan Metode National Institute of Justice ( NIJ ),” vol. X, no. X, pp. 8–13.

R. Umar, I. Riadi, and G. M. Zamroni, “Mobile Forensic Tools Evaluation for Digital Crime Investigation,” vol. 8, no. 3, pp. 949–955, 2018.

A. Aziz, Muhammad, “Analisis Forensik Line Messenger Berbasis Web Menggunakan Framework National Institute Of Justice (NIJ),” in Seminar Nasional Informatika. Yogyakarta, 2018.

Furht, Borko and Armando Escalante, “Handbook of Cloud Computing,” New York : Springer, 2010.

Hendri, “Analisis Resiko Implementasi Teknologi Cloud Computing Pada Infrastruktur Saas (Software As A Service),” vol. 8, pp. 32-40, 2013

H. Lovell, W. Maxwell and C. Wolf, “DCA Global Reality: Governmental Access to Data in the Cloud A comparative analysis of ten international jurisdictions,” Hogan Lovell White papers.13, 2012.

Howard, John D, “An Analysis Of Security Incidents On The Internet 1989 – 1995,” PhD thesis, Engineering and Public Policy, Carnegie Mellon University. 1997

I. Riadi and I. Anshori, “Analisis Bukti Digital Facebook Messenger Menggunakan Metode NIST,” vol. 3, pp. 13-21, 2018.

R. Imam, “Analisis Forensik Bukti Digital Pada Frozen Solid State Drive Dengan Metode National Institute Of Standards And Technology (NIST) “,Vol. 2, pp. 33-40, 2017.

R. Tri, “Live Forensik Untuk Analisa Anti Forensik Pada Web Browser Studi Kasus Browzar,” vol. 1, pp. 32-38, 2018.

Wardhana, Indrawata. “Membangun Owncloud Cloud Storage,” IAIN, 2016.

Yudhana, Anton. 2018. “Analisis Bukti Digital Facebook Messenger Menggunakan Metode NIST,” Vol. 3, pp. 13-21, 2018.

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 JURNAL MEDIA INFORMATIKA BUDIDARMA





JURNAL MEDIA INFORMATIKA BUDIDARMA
STMIK Budi Darma
Secretariat: Sisingamangaraja No. 338 Telp 061-7875998
Email: mib.stmikbd@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.