Satrya, Gandeva Bayu
School of Computing, Telkom University

Published : 2 Documents Claim Missing Document
Claim Missing Document

Found 2 Documents

Digital Forensics Study of a Cloud Storage Client: A Dropbox Artifact Analysis Satrya, Gandeva Bayu
CommIT (Communication and Information Technology) Journal Vol 13, No 2 (2019): CommIT Vol. 13 No. 2 Tahun 2019
Publisher : Bina Nusantara University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21512/commit.v13i2.5781


The rapid development of cloud storage technology paired with the prevalence of smartphone usage presents wide-ranging challenges for digital forensics practitioners. Data are more easily uploaded and shared between multiple devices and across multiple platforms. So, the process has increased the opportunities for criminality. Criminality undertaken in cloud computing can be directly seen on logs stored on the cloud storage server, which records user activity. However, because of user privacy protection, these logs cannot be easily used as evidence in court. This issue emphasizes the need for a reliable means of identifying, acquiring, and preserving evidential data from the client-side. This study identifies the data artifacts of a user accessing Dropbox via smartphone (Android Lollipop and Android Nougat). The data are from performing several common activities such as installing, signing up, uploading, downloading, sharing, and others. About 14 artifacts are identified by documenting the Dropbox client database changing contents as these activities are carried out. This study increases knowledge of the artifacts that are leftover by Dropbox client on Android smartphones. The results propose this comparing and analyzing method can be used by digital forensics investigators in carrying out investigations and cyberlaw practitioners as guidance in criminal cases.
A Security Analysis on OpenSIPS Satrya, Gandeva Bayu; Nicovandia, Muhammad Caesara
IJAIT (International Journal of Applied Information Technology) Vol 3 No 02 (2019)
Publisher : School of Applied Science, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25124/ijait.v3i02.2503


IP Telephony, Internet Telephony, Digital Phone or often also called VoIP (Voice Over Internet Protocol) is a technology that allows long-distance voice conversations with the Internet. The increasing number of VoIP users and other IP-based multimedia streaming services naturally raises security issues. Many users are likely to lose their privacy in communication. To overcome this security problem a security system must be implemented. Implementing a security system will use VPN Gateway using SSL and TLS encryption on the VoIP server. The VPN Gateway method is used to build a private network so that only certain users can use the private network. The TLS method is used to secure a user signaling session to the server. From the test results obtained that the VoIP server that uses VPN Gateway and TLS on the server can overcome the attacks e.g., eavesdropping, attacking authentication, teardown session, and denial of service.