What's Next, Cloud? A Forensic Framework for Analyzing Self-Hosted Cloud Storage Solutions
- URL: http://arxiv.org/abs/2510.21246v2
- Date: Wed, 29 Oct 2025 18:31:56 GMT
- Title: What's Next, Cloud? A Forensic Framework for Analyzing Self-Hosted Cloud Storage Solutions
- Authors: Michael Külper, Jan-Niclas Hilgert, Frank Breitinger, Martin Lambertz,
- Abstract summary: Self-hosted cloud storage platforms like Nextcloud are gaining popularity among individuals and organizations seeking greater control over their data.<n>Despite Nextcloud's widespread use, it has received limited attention in forensic research.<n>We propose an extended forensic framework that incorporates device monitoring and leverages cloud APIs for structured, repeatable evidence acquisition.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Self-hosted cloud storage platforms like Nextcloud are gaining popularity among individuals and organizations seeking greater control over their data. However, this shift introduces new challenges for digital forensic investigations, particularly in systematically analyzing both client and server components. Despite Nextcloud's widespread use, it has received limited attention in forensic research. In this work, we critically examine existing cloud storage forensic frameworks and highlight their limitations. To address the gaps, we propose an extended forensic framework that incorporates device monitoring and leverages cloud APIs for structured, repeatable evidence acquisition. Using Nextcloud as a case study, we demonstrate how its native APIs can be used to reliably access forensic artifacts, and we introduce an open-source acquisition tool that implements this approach. Our framework equips investigators with a more flexible method for analyzing self-hosted cloud storage systems, and offers a foundation for further development in this evolving area of digital forensics.
Related papers
- Cloud Investigation Automation Framework (CIAF): An AI-Driven Approach to Cloud Forensics [0.0]
We introduce the Cloud Investigation Automation Framework (CIAF), a framework that systematically investigates cloud forensic logs.<n>CIAF standardizes user inputs through semantic validation, eliminating ambiguity and ensuring consistency in log interpretation.<n>Results show significant improvement in ransomware detection, achieving precision, recall, and F1 scores of 93 percent.
arXiv Detail & Related papers (2025-10-01T03:05:47Z) - Cloud Digital Forensic Readiness: An Open Source Approach to Law Enforcement Request Management [0.4972323953932129]
Cloud Forensics presents a multi-jurisdictional challenge that may undermines the success of digital forensic investigations.<n>The growing volumes of domiciled and foreign law enforcement (LE) requests, the latency and complexity of formal channels for crossborder data access are challenging issues.<n>We propose an abstract architecture for a Cloud Law Enforcement Requests Management System (CLERMS)
arXiv Detail & Related papers (2025-07-05T22:06:42Z) - CloudLens: Modeling and Detecting Cloud Security Vulnerabilities [15.503757553097387]
Cloud computing services provide scalable and cost-effective solutions for data storage, processing, and collaboration.<n>Access control misconfigurations are often the primary driver for cloud attacks.<n>A planner generates attacks to identify such vulnerabilities in the cloud.
arXiv Detail & Related papers (2024-02-16T03:28:02Z) - Exploring Security Practices in Infrastructure as Code: An Empirical
Study [54.669404064111795]
Cloud computing has become popular thanks to the widespread use of Infrastructure as Code (IaC) tools.
scripting process does not automatically prevent practitioners from introducing misconfigurations, vulnerabilities, or privacy risks.
Ensuring security relies on practitioners understanding and the adoption of explicit policies, guidelines, or best practices.
arXiv Detail & Related papers (2023-08-07T23:43:32Z) - GAIA Search: Hugging Face and Pyserini Interoperability for NLP Training
Data Exploration [97.68234051078997]
We discuss how Pyserini can be integrated with the Hugging Face ecosystem of open-source AI libraries and artifacts.
We include a Jupyter Notebook-based walk through the core interoperability features, available on GitHub.
We present GAIA Search - a search engine built following previously laid out principles, giving access to four popular large-scale text collections.
arXiv Detail & Related papers (2023-06-02T12:09:59Z) - Distributed intelligence on the Edge-to-Cloud Continuum: A systematic
literature review [62.997667081978825]
This review aims at providing a comprehensive vision of the main state-of-the-art libraries and frameworks for machine learning and data analytics available today.
The main simulation, emulation, deployment systems, and testbeds for experimental research on the Edge-to-Cloud Continuum available today are also surveyed.
arXiv Detail & Related papers (2022-04-29T08:06:05Z) - Unsupervised Point Cloud Representation Learning with Deep Neural
Networks: A Survey [104.71816962689296]
Unsupervised point cloud representation learning has attracted increasing attention due to the constraint in large-scale point cloud labelling.
This paper provides a comprehensive review of unsupervised point cloud representation learning using deep neural networks.
arXiv Detail & Related papers (2022-02-28T07:46:05Z) - Auto-Split: A General Framework of Collaborative Edge-Cloud AI [49.750972428032355]
This paper describes the techniques and engineering practice behind Auto-Split, an edge-cloud collaborative prototype of Huawei Cloud.
To the best of our knowledge, there is no existing industry product that provides the capability of Deep Neural Network (DNN) splitting.
arXiv Detail & Related papers (2021-08-30T08:03:29Z) - Privacy Inference Attacks and Defenses in Cloud-based Deep Neural
Network: A Survey [22.706623721832486]
Cloud computing providers offer the cloud-based Deep Neural Network as an out-of-the-box service.
This survey presents the most recent findings of privacy attacks and defenses appeared in cloud-based neural network services.
A new theory, called cloud-based ML privacy game, is extracted from the recently published literature to provide a deep understanding of state-of-the-art research.
arXiv Detail & Related papers (2021-05-13T13:45:28Z) - Anomaly Detection in a Large-scale Cloud Platform [9.283888139549067]
Cloud computing is ubiquitous: more and more companies are moving the workloads into the Cloud.
Service providers need to monitor the quality of their ever-growing offerings effectively.
We designed and implemented an automated monitoring system for the IBM Cloud Platform.
arXiv Detail & Related papers (2020-10-21T12:58:36Z) - A Privacy-Preserving Distributed Architecture for
Deep-Learning-as-a-Service [68.84245063902908]
This paper introduces a novel distributed architecture for deep-learning-as-a-service.
It is able to preserve the user sensitive data while providing Cloud-based machine and deep learning services.
arXiv Detail & Related papers (2020-03-30T15:12:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.