CFaaS: bilaterally agreed evidence collection
Tóm tắt
Từ khóa
Tài liệu tham khảo
Group, (2014) N.C.C.F.S.W., NIST Cloud Computing Forensic Science Challenges (Draft NISTIR 8006)
Moussa, A.N., N. Binti Ithnin, and O.A. Miaikil (2014) Conceptual forensic readiness framework for infrastructure as a service consumers. In Systems, Process and Control (ICSPC), 2014 IEEE Conference on. IEEE
Hay B, Nance K (2008) Forensics examination of volatile system data using virtual introspection. ACM SIGOPS Operating Systems Review 42(3):74–82
Birk, D. and C. Wegener (2011) Technical issues of forensic investigations in cloud computing environments. In Systematic Approaches to Digital Forensic Engineering (SADFE), 2011 IEEE Sixth International Workshop on. IEEE
Dykstra J, Sherman AT (2012) Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digit Investig 9:S90–S98
Zawoad S, Hasan R (2013) Cloud forensics: a meta-study of challenges, approaches, and open problems. arXiv preprint arXiv 1302:6312
Zawoad S, Hasan R, Grimes J (2015) LINCS: towards building a trustworthy litigation hold enabled cloud storage system. Digit Investig 14:S55–S67
Ruan K et al (2013) Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results. Digit Investig 10(1):34–43
Gebhardt T, Reiser HP (2013) Network Forensics for Cloud Computing. In Distributed Applications and Interoperable Systems. Spring
Pichan A, Lazarescu M, Soh ST (2015) Cloud forensics: technical challenges, solutions and comparative analysis. Digit Investig 13:38–57
Alqahtany S et al (2015) A forensic acquisition and analysis system for IaaS. Clust Comput:1–15
Damshenas, M., et al (2012) Forensics investigation challenges in cloud computing environments. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. IEEE
Ruan K, et al (2011), Cloud forensics, in Advances in digital forensics VII, Springer, Dordrecht. p. 35–46
Hay, B., K. Nance, and M. Bishop (2011) Storm clouds rising: security challenges for IaaS cloud computing. In System Sciences (HICSS), 2011 44th Hawaii International Conference on. IEEE
Guo, H., B. Jin, and T. Shang (2011) Forensic investigations in cloud environments. In Computer Science and Information Processing (CSIP), 2012 International Conference on. IEEE
Roussev V, Quates C, Martell R (2013) Real-time digital forensics and triage. Digit Investig 10(2):158–167
Kohn MD, Eloff MM, Eloff JH (2013) Integrated digital forensic process model. Computers & Security 38:103–115
Reith M, Carr C, Gunsch G (2002) An examination of digital forensic models. International Journal of Digital Evidence 1(3):1–12
Palmer, G (2001) A road map for digital forensic research. in First Digital Forensic Research Workshop, Utica, New York.
Carrier B, Spafford EH (2003) Getting physical with the digital investigation process. International Journal of digital evidence 2(2):1–20
Baryamureeba, V. and F. Tushabe (2004) The enhanced digital investigation process model. In Proceedings of the Fourth Digital Forensic Research Workshop. Citeseer
Beebe NL, Clark JG (2005) A hierarchical, objectives-based framework for the digital investigations process. Digit Investig 2(2):147–167
Kent K et al (2006) Guide to integrating forensic techniques into incident response. NIST Special Publication:800–886
Selamat SR, Yusof R, Sahib S (2008) Mapping process of digital forensic investigation framework. International Journal of Computer Science and Network Security 8(10):163–169
Cohen FB (2010) Fundamentals of digital forensic evidence. In: Handbook of Information and Communication Security. Springer, Dordrecht, pp 789–808
Valjarevic, A. and H.S. Venter (2012) Harmonised digital forensic investigation process model. in Information Security for South Africa (ISSA), 2012. IEEE
Martini B, Choo K-KR (2012) An integrated conceptual digital forensic framework for cloud computing. Digit Investig 9(2):71–80
Zawoad, S., R. Hasan, and A. Skjellum (2015) OCF: An Open Cloud Forensics Model for Reliable Digital Forensics. In Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on.IEEE
Ferguson-Boucher, K. and B (2012) Endicott-Popovsky, Forensic Readiness in the Cloud (FRC): Integrating Records Management Cybercrime and Cloud Forensics: Applications for Investigation Processes: Applications for Investigation Processes, p. 105
Endicott-Popovsky B, Frincke DA, Taylor CA (2007) A theoretical framework for organizational network forensic readiness. Journal of Computers 2(3):1–11
Trenwith, P.M. and H.S. Venter (2013) Digital forensic readiness in the cloud. in Information Security for South Africa, 2013. IEEE
De Marco, L., F. Ferrucci, and T. Kechadi (2014) Reference architecture for a cloud forensic readiness system.
De Marco, L., et al (2014) Formalization of SLAs for Cloud Forensic Readiness. in Proc. ICCSM Conference.
Makutsoane, M.P. and A. Leonard (2014) A conceptual framework to determine the digital forensic readiness of a Cloud Service Provider. In Management of Engineering & Technology (PICMET), 2014 Portland International Conference on. IEEE
Federici C (2014) Cloud data imager: a unified answer to remote acquisition of cloud storage areas. Digit Investig 11(1):30–42
Oestreicher K (2014) A forensically robust method for acquisition of iCloud data. Digit Investig 11:S106–S113
Cahyani NDW et al (2016) Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study. Concurrency and Computation, Practice and Experience
Anwar, F. and Z. Anwar (2011) Digital forensics for eucalyptus. in Frontiers of Information Technology (FIT), 2011. IEEE
Marturana, F., G. Me, and S. Tacconi (2012) A case study on digital forensics in the cloud. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on. IEEE
Quick D, Choo K-KR (2013) Dropbox analysis: data remnants on user machines. Digit Investig 10(1):3–18
Quick D, Choo K-KR (2013) Digital droplets: Microsoft SkyDrive forensic data remnants. Futur Gener Comput Syst 29(6):1378–1394
Quick D, Choo K-KR (2014) Google drive: forensic analysis of data remnants. J Netw Comput Appl 40:179–193
Shariati, M., et al., (2015) Ubuntu one investigation: detecting evidences on client machines.
Cho C, Chin S, Chung KS (2012) Cyber forensic for hadoop based cloud system. International Journal of Security and its Applications 6(3):83–90
Chung H et al (2012) Digital forensic investigation of cloud storage services. Digit Investig 9(2):81–95
Spyridopoulos, T. and V. Katos (2012) Data Recovery Strategies for Cloud Environments Cybercrime and Cloud Forensics: Applications for Investigation Processes: Applications for Investigation Processes,: p. 251
Martini B, Choo K-KR (2013) Cloud storage forensics: own cloud as a case study. Digit Investig 10(4):287–299
Martini B, Choo K-KR (2014) Distributed filesystem forensics: XtreemFS as a case study. Digit Investig 11(4):295–313
Thethi, N. and A. Keane. Digital forensics investigations in the cloud. In Advance Computing Conference (IACC), 2014 IEEE International. 2014. IEEE
Daryabar F, Dehghantanha A, Choo K-KR (2016) Cloud storage forensics: MEGA as a case study. Australian Journal of Forensic Sciences:1–14
Martini, B. and K.-K.R. Choo. Remote programmatic vCloud forensics: a six-step collection process and a proof of concept. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on. 2014. IEEE
McKemmish, R., What is forensic computing? 1999: Australian Institute of Criminology Canberra
Povar D, Geethakumari G (2014) A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment, in Security in Computing and Communications. Springer, Dordrecht, pp 341–352
Ab Rahman NH, Choo K-KR (2015) A survey of information security incident handling in the cloud. Computers & Security 49:45–69
Ab Rahman N, Choo K (2015) Integrating digital forensic practices in cloud incident handling: A conceptual cloud incident handling model. Cloud Security EcosystemR
Ab Rahman, N.H., N.D.W. Cahyani, and K.K.R. Choo (2016) Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurrency and Computation: Practice and Experience
Ab Rahman NH et al (2016) Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Computing 3(1):50–59
Simou, S., et al (2015) Towards the Development of a Cloud Forensics Methodology: A Conceptual Model. In Advanced Information Systems Engineering Workshops. Spring
Yan, C (2011) Cybercrime forensic system in cloud computing. In Image Analysis and Signal Processing (IASP), 2011 International Conference on. IEEE
Delport, W., M. Köhn, and M.S (2011) Olivier. Isolating a cloud instance for a digital forensic investigation. in ISSA.
Marty, R (2011) Cloud application logging for forensics. In Proceedings of the 2011 ACM Symposium on Applied Computing. ACM
Dykstra J, Sherman AT (2013) Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform. Digit Investig 10:S87–S95
Zawoad, S., A.K. Dutta, and R. Hasan (2013) SecLaaS: secure logging-as-a-service for cloud forensics. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM
Patrascu A, Patriciu V-V (2015) Logging for cloud computing forensic systems. International Journal of Computers Communications & Control 10(2):222–229
Molina-Jimenez, C., N. Cook, and S. Shrivastava (2008) On the feasibility of bilaterally agreed accounting of resource consumption. In Service-Oriented Computing–ICSOC 2008 Workshops. Spring
Van Oorschot PC (2003) Revisiting software protection, in Information Security. Springer, Dordrecht, pp 1–13
Adolph M, Sutherland E, Levin A (2009) Distributed computing: utilities, grids & clouds. International Telecommunication Union-Technology Watch Report 9
Cook, N., S. Shrivastava, and S. Wheater (2002) Distributed object middleware to support dependable information sharing between organisations. In Dependable Systems and Networks, 2002. DSN 2002. Proceedings. International Conference on. IEEE
Robinson, P., N. Cook, and S. Shrivastava (2005) Implementing fair non-repudiable interactions with web services. In EDOC Enterprise Computing Conference, 2005 Ninth IEEE International. IEEE