Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques

Digital Investigation - Tập 9 - Trang S90-S98 - 2012
Josiah Dykstra1, Alan T. Sherman1
1Cyber Defense Lab, Department of CSEE, University of Maryland, Baltimore County (UMBC), 1000 Hilltop Circle, Baltimore, MD 21250, USA

Tóm tắt

Từ khóa


Tài liệu tham khảo

Amazon Web Services, 2011

Casey, 2004

Conover, 2008, Code injection from the hypervisor: removing the need for in-guest agents

Dolan-Gabitt, 2011

Dykstra, 2011, Understanding issues in cloud forensics: two hypothetical case studies, 191

Dykstra, 2011, Understanding issues in cloud forensics: two hypothetical case studies, Journal of Network Forensics, 3, 19

Eucalyptus, 2011

Federal CIO Council, 2011

Garfinkel, 2006, Forensic feature extraction and cross-drive analysis, Digital Investigation, 3, 71, 10.1016/j.diin.2006.06.007

Garfinkel, 2003, A virtual machine introspection based architecture for intrusion detection, 191

Giobbi, 2007

Guidance Software, 2011, EnCase Legal Journal

Heiser, 2009

Krautheim FJ. Building trust into utility cloud computing. Ph.D. thesis; Department of Electrical Engineering and Computer Science, University of Maryland, Baltimore County; Baltimore, Maryland; 2010.

Krautheim, 2010, Trusted virtual environment module: managing trust in cloud computing, 211

LibVMI, 2011

Nance, 2009, Investigating the implications of virtual machine introspection for digital forensics, 1024

National Institute of Standards and Technology, 2003

National Institute of Standards and Technology, 2004

National Institute of Standards and Technology, 2008

National Institute of Standards and Technology, 2009

National Institute of Standards and Technology, 2011

Ruan, 2011, Cloud forensics: an overview

Santana, 2009

Santos, 2009, Towards trusted cloud computing

Sato, 2010, A cloud trust model in a security aware cloud, 121

SCMagazine, 2011, Best computer forensic tool, SCMagazine

Shields, 2011, A system for the proactive, continuous, and efficient collection of digital forensic evidence, vol. 8, S3

Taylor, 2011, Forensic investigation of cloud computing systems, Network Security, 2011, 4, 10.1016/S1353-4858(11)70024-1

Terremark, 2009

United States Code, 1994