CFaaS: bilaterally agreed evidence collection

Ahmed Nour Moussa1, Norafida Ithnin1, Anazida Zainal1
1Faculty of Computing, Universiti Teknologi Malaysia, Skudai, Johor, Malaysia

Tóm tắt

Từ khóa


Tài liệu tham khảo

Group, (2014) N.C.C.F.S.W., NIST Cloud Computing Forensic Science Challenges (Draft NISTIR 8006)

Moussa, A.N., N. Binti Ithnin, and O.A. Miaikil (2014) Conceptual forensic readiness framework for infrastructure as a service consumers. In Systems, Process and Control (ICSPC), 2014 IEEE Conference on. IEEE

Hay B, Nance K (2008) Forensics examination of volatile system data using virtual introspection. ACM SIGOPS Operating Systems Review 42(3):74–82

Birk, D. and C. Wegener (2011) Technical issues of forensic investigations in cloud computing environments. In Systematic Approaches to Digital Forensic Engineering (SADFE), 2011 IEEE Sixth International Workshop on. IEEE

Dykstra J, Sherman AT (2012) Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digit Investig 9:S90–S98

Zawoad S, Hasan R (2013) Cloud forensics: a meta-study of challenges, approaches, and open problems. arXiv preprint arXiv 1302:6312

Zawoad S, Hasan R, Grimes J (2015) LINCS: towards building a trustworthy litigation hold enabled cloud storage system. Digit Investig 14:S55–S67

Ruan K et al (2013) Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results. Digit Investig 10(1):34–43

Gebhardt T, Reiser HP (2013) Network Forensics for Cloud Computing. In Distributed Applications and Interoperable Systems. Spring

Pichan A, Lazarescu M, Soh ST (2015) Cloud forensics: technical challenges, solutions and comparative analysis. Digit Investig 13:38–57

Alqahtany S et al (2015) A forensic acquisition and analysis system for IaaS. Clust Comput:1–15

Damshenas, M., et al (2012) Forensics investigation challenges in cloud computing environments. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. IEEE

Ruan K, et al (2011), Cloud forensics, in Advances in digital forensics VII, Springer, Dordrecht. p. 35–46

Hay, B., K. Nance, and M. Bishop (2011) Storm clouds rising: security challenges for IaaS cloud computing. In System Sciences (HICSS), 2011 44th Hawaii International Conference on. IEEE

Guo, H., B. Jin, and T. Shang (2011) Forensic investigations in cloud environments. In Computer Science and Information Processing (CSIP), 2012 International Conference on. IEEE

Roussev V, Quates C, Martell R (2013) Real-time digital forensics and triage. Digit Investig 10(2):158–167

Kohn MD, Eloff MM, Eloff JH (2013) Integrated digital forensic process model. Computers & Security 38:103–115

Reith M, Carr C, Gunsch G (2002) An examination of digital forensic models. International Journal of Digital Evidence 1(3):1–12

Palmer, G (2001) A road map for digital forensic research. in First Digital Forensic Research Workshop, Utica, New York.

Carrier B, Spafford EH (2003) Getting physical with the digital investigation process. International Journal of digital evidence 2(2):1–20

Baryamureeba, V. and F. Tushabe (2004) The enhanced digital investigation process model. In Proceedings of the Fourth Digital Forensic Research Workshop. Citeseer

Beebe NL, Clark JG (2005) A hierarchical, objectives-based framework for the digital investigations process. Digit Investig 2(2):147–167

Kent K et al (2006) Guide to integrating forensic techniques into incident response. NIST Special Publication:800–886

Selamat SR, Yusof R, Sahib S (2008) Mapping process of digital forensic investigation framework. International Journal of Computer Science and Network Security 8(10):163–169

Cohen FB (2010) Fundamentals of digital forensic evidence. In: Handbook of Information and Communication Security. Springer, Dordrecht, pp 789–808

Valjarevic, A. and H.S. Venter (2012) Harmonised digital forensic investigation process model. in Information Security for South Africa (ISSA), 2012. IEEE

Martini B, Choo K-KR (2012) An integrated conceptual digital forensic framework for cloud computing. Digit Investig 9(2):71–80

Quick D, Martini B, Choo R (2013) Cloud storage forensics. Syngress, Waltham

Zawoad, S., R. Hasan, and A. Skjellum (2015) OCF: An Open Cloud Forensics Model for Reliable Digital Forensics. In Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on.IEEE

Ferguson-Boucher, K. and B (2012) Endicott-Popovsky, Forensic Readiness in the Cloud (FRC): Integrating Records Management Cybercrime and Cloud Forensics: Applications for Investigation Processes: Applications for Investigation Processes, p. 105

Endicott-Popovsky B, Frincke DA, Taylor CA (2007) A theoretical framework for organizational network forensic readiness. Journal of Computers 2(3):1–11

Sibiya, G., et al (2013) Digital forensic readiness in a cloud environment. in AFRICON, 2013. IEEE

Trenwith, P.M. and H.S. Venter (2013) Digital forensic readiness in the cloud. in Information Security for South Africa, 2013. IEEE

De Marco, L., F. Ferrucci, and T. Kechadi (2014) Reference architecture for a cloud forensic readiness system.

De Marco, L., et al (2014) Formalization of SLAs for Cloud Forensic Readiness. in Proc. ICCSM Conference.

Makutsoane, M.P. and A. Leonard (2014) A conceptual framework to determine the digital forensic readiness of a Cloud Service Provider. In Management of Engineering & Technology (PICMET), 2014 Portland International Conference on. IEEE

Federici C (2014) Cloud data imager: a unified answer to remote acquisition of cloud storage areas. Digit Investig 11(1):30–42

Oestreicher K (2014) A forensically robust method for acquisition of iCloud data. Digit Investig 11:S106–S113

Cahyani NDW et al (2016) Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study. Concurrency and Computation, Practice and Experience

Anwar, F. and Z. Anwar (2011) Digital forensics for eucalyptus. in Frontiers of Information Technology (FIT), 2011. IEEE

Marturana, F., G. Me, and S. Tacconi (2012) A case study on digital forensics in the cloud. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on. IEEE

Hale JS (2013) Amazon cloud drive forensic analysis. Digit Investig 10(3):259–265

Quick D, Choo K-KR (2013) Dropbox analysis: data remnants on user machines. Digit Investig 10(1):3–18

Quick D, Choo K-KR (2013) Digital droplets: Microsoft SkyDrive forensic data remnants. Futur Gener Comput Syst 29(6):1378–1394

Quick D, Choo K-KR (2014) Google drive: forensic analysis of data remnants. J Netw Comput Appl 40:179–193

Shariati, M., et al., (2015) Ubuntu one investigation: detecting evidences on client machines.

Cho C, Chin S, Chung KS (2012) Cyber forensic for hadoop based cloud system. International Journal of Security and its Applications 6(3):83–90

Chung H et al (2012) Digital forensic investigation of cloud storage services. Digit Investig 9(2):81–95

Spyridopoulos, T. and V. Katos (2012) Data Recovery Strategies for Cloud Environments Cybercrime and Cloud Forensics: Applications for Investigation Processes: Applications for Investigation Processes,: p. 251

Martini B, Choo K-KR (2013) Cloud storage forensics: own cloud as a case study. Digit Investig 10(4):287–299

Martini B, Choo K-KR (2014) Distributed filesystem forensics: XtreemFS as a case study. Digit Investig 11(4):295–313

Thethi, N. and A. Keane. Digital forensics investigations in the cloud. In Advance Computing Conference (IACC), 2014 IEEE International. 2014. IEEE

Daryabar F, Dehghantanha A, Choo K-KR (2016) Cloud storage forensics: MEGA as a case study. Australian Journal of Forensic Sciences:1–14

Martini, B. and K.-K.R. Choo. Remote programmatic vCloud forensics: a six-step collection process and a proof of concept. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on. 2014. IEEE

McKemmish, R., What is forensic computing? 1999: Australian Institute of Criminology Canberra

Povar D, Geethakumari G (2014) A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment, in Security in Computing and Communications. Springer, Dordrecht, pp 341–352

Ab Rahman NH, Choo K-KR (2015) A survey of information security incident handling in the cloud. Computers & Security 49:45–69

Ab Rahman N, Choo K (2015) Integrating digital forensic practices in cloud incident handling: A conceptual cloud incident handling model. Cloud Security EcosystemR

Ab Rahman, N.H., N.D.W. Cahyani, and K.K.R. Choo (2016) Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurrency and Computation: Practice and Experience

Ab Rahman NH et al (2016) Forensic-by-design framework for cyber-physical cloud systems. IEEE Cloud Computing 3(1):50–59

Simou, S., et al (2015) Towards the Development of a Cloud Forensics Methodology: A Conceptual Model. In Advanced Information Systems Engineering Workshops. Spring

Yan, C (2011) Cybercrime forensic system in cloud computing. In Image Analysis and Signal Processing (IASP), 2011 International Conference on. IEEE

Delport, W., M. Köhn, and M.S (2011) Olivier. Isolating a cloud instance for a digital forensic investigation. in ISSA.

Marty, R (2011) Cloud application logging for forensics. In Proceedings of the 2011 ACM Symposium on Applied Computing. ACM

Dykstra J, Sherman AT (2013) Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform. Digit Investig 10:S87–S95

Zawoad, S., A.K. Dutta, and R. Hasan (2013) SecLaaS: secure logging-as-a-service for cloud forensics. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM

Patrascu A, Patriciu V-V (2015) Logging for cloud computing forensic systems. International Journal of Computers Communications & Control 10(2):222–229

Molina-Jimenez, C., N. Cook, and S. Shrivastava (2008) On the feasibility of bilaterally agreed accounting of resource consumption. In Service-Oriented Computing–ICSOC 2008 Workshops. Spring

Van Oorschot PC (2003) Revisiting software protection, in Information Security. Springer, Dordrecht, pp 1–13

Adolph M, Sutherland E, Levin A (2009) Distributed computing: utilities, grids & clouds. International Telecommunication Union-Technology Watch Report 9

Cook, N., S. Shrivastava, and S. Wheater (2002) Distributed object middleware to support dependable information sharing between organisations. In Dependable Systems and Networks, 2002. DSN 2002. Proceedings. International Conference on. IEEE

Robinson, P., N. Cook, and S. Shrivastava (2005) Implementing fair non-repudiable interactions with web services. In EDOC Enterprise Computing Conference, 2005 Ninth IEEE International. IEEE

Cook N, Robinson P, Shrivastava SK (2006) Design and implementation of web services middleware to support fair non-repudiable interactions. International Journal of Cooperative Information Systems 15(04):565–597