The volume of personal information and data most Internet users find themselves amassing is ever increasing, and the fast pace of the modern world results in most people requiring instant access to their files. Millions of these users turn to cloud-based file synchronisation services, such as Dropbox, Microsoft SkyDrive, Apple iCloud and Google Drive, to enable "always-on" access to their most up-to-date data from any computer or mobile device with an Internet connection. The prevalence of recent articles regarding invasion of privacy issues and data protection breaches in the media has caused many to review their online personal data security practices. To provide an alternative to cloud-based file backup and synchronisation, BitTorrent Inc. released an alternative cloudless file backup and synchronisation service, named BitTorrent Sync in April 2013. BitTorrent Sync's popularity rose dramatically throughout 2013, reaching over two million active users by the end of the year. This paper outlines a number of scenarios where the network investigation of the service may prove invaluable as part of a digital forensic investigation. An investigation methodology is proposed outlining the required steps involved in retrieving digital evidence from the network and the results from a proof of concept investigation are presented.
[1]
B. Cohen,et al.
Incentives Build Robustness in Bit-Torrent
,
2003
.
[2]
Sangjin Lee,et al.
Digital forensic investigation of cloud storage services
,
2012,
Digit. Investig..
[3]
M. Tahar Kechadi,et al.
Digital Evidence Bag Selection for P2P Network Investigation
,
2014,
ArXiv.
[4]
Taieb Znati,et al.
Modeling Churn in P2P Networks
,
2007,
40th Annual Simulation Symposium (ANSS'07).
[5]
Robert Tappan Morris,et al.
Comparing the Performance of Distributed Hash Tables Under Churn
,
2004,
IPTPS.
[6]
Walid Dabbous,et al.
Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
,
2010,
LEET.
[7]
M. Tahar Kechadi,et al.
BitTorrent Sync: First Impressions and Digital Forensic Implications
,
2014,
Digit. Investig..
[8]
Robert Tappan Morris,et al.
Security Considerations for Peer-to-Peer Distributed Hash Tables
,
2002,
IPTPS.
[9]
Kim-Kwang Raymond Choo,et al.
Cloud storage forensics: ownCloud as a case study
,
2013,
Digit. Investig..
[10]
Mark Scanlon,et al.
A Week in the Life of the Most Popular BitTorrent Swarms
,
2010
.