Distributed filesystem forensics: XtreemFS as a case study

Digital Investigation - Tập 11 - Trang 295-313 - 2014
Ben Martini1, Kim-Kwang Raymond Choo1
1University of South Australia, GPO Box 2471, Adelaide, SA 5001, Australia

Tài liệu tham khảo

Almulla, 2013, Cloud forensics: a research perspective, 66 BabuDB Beath, 2012, Finding value in the information explosion, MIT Sloan Manag Rev, 53, 18 Beyer, 2012 Birk, 2011, Technical issues of forensic investigations in cloud computing environments, 1 Butler, 2013, IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: an Australian perspective, Secur J, 10.1057/sj.2013.29 Casonato, 2013 Ceph, 2014 Cho, 2012, Cyber forensic for hadoop based cloud system, Int J Secur Its Appl, 6, 83 Chonka, 2012, Detecting and mitigating hx-dos attacks against cloud web services, 429 Choo, 2010, Cloud computing: challenges and future directions, Trends Issues Crime Crim Justice, 400, 1 Chua Chung, 2012, Digital forensic investigation of cloud storage services, Digit Investig, 9, 81, 10.1016/j.diin.2012.05.015 Contrail Dukaric, 2013, Towards a unified taxonomy and architecture of cloud frameworks, Future Gener Comput Syst, 29, 1196, 10.1016/j.future.2012.09.006 Dykstra, 2013, Forensic collection of electronic evidence from infrastructure-as-a-service cloud computing, Richmond J Law Technol, XIX, 1 Dykstra, 2013, Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform, Digit Investig, 10, S87, 10.1016/j.diin.2013.06.010 Enke, 2012, Handling big data in astronomy and astrophysics: rich structured queries on replicated cloud data with XtreemFS, Datenbank-Spektrum, 12, 173, 10.1007/s13222-012-0099-1 Federici, 2014, Cloud data imager: a unified answer to remote acquisition of cloud storage areas, Digit Investig, 11, 30, 10.1016/j.diin.2014.02.002 Fraunhofer Gellman, 2013, Inner workings of a top-secret spy program, Wash Post Gluster, 2014, Write once, read everywhere – Gluster, Red Hat Greenwald, 2013, The top secret rules that allow NSA to use US data without a warrant, Guard Hale, 2013, Amazon cloud drive forensic analysis, Digit Investig, 10, 259, 10.1016/j.diin.2013.04.006 Hay, 2011, Storm clouds rising: security challenges for IaaS cloud computing, 1 Hegarty, 2011, Forensic analysis of distributed service oriented computing platforms Hooper, 2013, Cloud computing and its implications for cybercrime investigations in Australia, Comput Law Secur Rev, 29, 152, 10.1016/j.clsr.2013.01.006 Info-communications Development Authority of Singapore, 2012, Big data, 1 Kent, 2006 Kielmann, 2010, XtreemOS: a sound foundation for cloud infrastructure and federations, 1 Kleineweber, 2014, QoS-aware storage virtualization for cloud file systems, 19 Krüger, 2014, Performance studies on distributed virtual screening, BioMed Res Int, 2014, 10.1155/2014/624024 Martini, 2012, An integrated conceptual digital forensic framework for cloud computing, Digit Investig, 9, 71, 10.1016/j.diin.2012.07.001 Martini, 2013, Cloud storage forensics: ownCloud as a case study, Digit Investig, 10, 287, 10.1016/j.diin.2013.08.005 Martini, 2014, Remote programmatic vCloud forensics: a six-step collection process and a proof of concept, 935 Marty, 2011, Cloud application logging for forensics, 178 McKemmish, 1999, What is forensic computing?, Trends Issues Crime Crim Justice, 118, 1 National Institute of Standards and Technology, 2011 Patel, 2013, An intrusion detection and prevention system in cloud computing: a systematic review, J Netw Comput Appl, 36, 25, 10.1016/j.jnca.2012.08.007 Petcu, 2013, Portable cloud applications—from theory to practice, Future Gener Comput Syst, 29, 1417, 10.1016/j.future.2012.01.009 Pierre, 2012, ConPaaS: a platform for hosting elastic cloud applications, IEEE Internet Comput, 16, 88, 10.1109/MIC.2012.105 Quick, 2014 Stender, 2012, XtreemFS—a file system for the cloud, 267 United States Foreign Intelligence Surveillance Court United States National Institute of Justice (US NIJ), 2004 United States National Intelligence Council XtreemFS Zatyko, 2012, The digital forensics cyber exchange principle, Forensic Mag, 13