As the proliferation of digital computational systems continue to expand, increasingly complex technologies emerge, including those regarding large, enterprise-wide, information storage and retrieval systems. Within this study, we examine four contemporary enterprise storage technologies. Our examination of these technologies is presented with an overview of the technological features of each offering and then followed with a discussion of the impact of these technologies on digital forensics methods, particularly regarding forensic data acquisition. We offer a general opinion concerning a recommended data acquisition method when faced with the task of obtaining a forensic image of data contained within these technologies, we discuss limitations of our study, and lastly, we suggest areas in which additional research would benefit the field of digital forensics.


Bigelow, S. J., & Hawkins, J. (2008, September). data deduplication (Intelligent compression or single-instance storage). Retrieved May 26, 2011, from SearchStorage.com: http://searchstorage.techtarget.com/definition/datadeduplication

Carlton, G. H. (2007). A Protocol for the Forensic Data Acquisition of Personal Computer Workstations. (Doctoral dissertation). (UMI No. 3251043) .

Carlton, G. H., & Zhou, H. (in press). A survey of cloud computing from a digital forensics perspective. International Journal of Interdisciplinary Telecommunications and Networking .

EMC Corporation. (2011). EMC Symmetrix VMAX Virtual Provisioning Space Reclamation and Application Considerations.

EMC Corporation. (2006). EMC Virtual LUN Technology, A Detailed Review.

Feresten, P., Freeman, L., & Woods, M. (2011). The NetApp Virtual Storage Tier. NetApp.

Floyer, D. (2009, October 9). Thin Provisioning. Retrieved May 30, 2011, from wikibon.org: http://wikibon.org/wiki/v/Thin_provisioning

Freeman, L., & NetApp. (2009). Looking Beyond the Hype: Evaluating Data Deduplication Solutions.

Guidance Software. (2011). EnCase Legal Journal. Hernandez, N. (2011, 5 25). EMC Technnology Consultant. (J. Matsumoto, Interviewer)

Jooss, R. (2008). Technical Report: Thin provisioing in a NetApp SAN or IP SAN Enterprise Environment. Network Appliance Inc.

Lessing, M., & von Solms, B. (2008). Live Forensic Acquisition as Alternative to Traditional Forensic Processes. Mannheim, Germany.

Mohay, G. (2005). Technical challenges and directions for digital forensics. First international workshop on systematic approaches to digital forensic engineering (pp. 155-161). Taipei, Taiwan: IEEE.

Valacich, J., & Schneider, C. (2010). Information Systems Today, Managing in the Digital World (4th ed.). Upper Saddle River, NJ: Prentice Hall.





To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.