메뉴 건너뛰기




Volumn 9, Issue SUPPL., 2012, Pages

Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques

Author keywords

Amazon EC2; Cloud computing; Cloud forensics; Computer security; Digital forensics; EnCase; FTK

Indexed keywords

CLOUD COMPUTING; COMPUTER CRIME; COMPUTER FORENSICS; DIGITAL FORENSICS; INFRASTRUCTURE AS A SERVICE (IAAS); LAWS AND LEGISLATION; SECURITY OF DATA;

EID: 84864596423     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2012.05.001     Document Type: Conference Paper
Times cited : (201)

References (31)
  • 1
    • 84864612664 scopus 로고    scopus 로고
    • Amazon Web Services [accessed 28.12.11]
    • Amazon Web Services AWS import/export 2011 Available at: http://aws.amazon.com/importexport/ [accessed 28.12.11]
    • (2011) AWS Import/export
  • 3
    • 84864632656 scopus 로고    scopus 로고
    • Code injection from the hypervisor: Removing the need for in-guest agents
    • [accessed 01.11.11]
    • M. Conover, and T. Chiueh Code injection from the hypervisor: removing the need for in-guest agents Proceedings of Blackhat USA 2008 [accessed 01.11.11]
    • (2008) Proceedings of Blackhat USA
    • Conover, M.1    Chiueh, T.2
  • 6
    • 84864612252 scopus 로고    scopus 로고
    • Understanding issues in cloud forensics: Two hypothetical case studies
    • J. Dykstra, and A.T. Sherman Understanding issues in cloud forensics: two hypothetical case studies Journal of Network Forensics 3 1 2011 19 31
    • (2011) Journal of Network Forensics , vol.3 , Issue.1 , pp. 19-31
    • Dykstra, J.1    Sherman, A.T.2
  • 7
    • 84864579108 scopus 로고    scopus 로고
    • Eucalyptus [accessed 01.11.11]
    • Eucalyptus Eucalyptus: the open source cloud platform 2011 Available at: http://open.eucalyptus.com/ [accessed 01.11.11]
    • (2011) Eucalyptus: The Open Source Cloud Platform
  • 9
    • 33745997324 scopus 로고    scopus 로고
    • Forensic feature extraction and cross-drive analysis
    • DOI 10.1016/j.diin.2006.06.007, PII S1742287606000697
    • S. Garfinkel Forensic feature extraction and cross-drive analysis Digital Investigation 3 2006 71 81 (Pubitemid 44066907)
    • (2006) Digital Investigation , vol.3 , Issue.SUPPL. , pp. 71-81
    • Garfinkel, S.L.1
  • 12
    • 84864632653 scopus 로고    scopus 로고
    • [accessed 21.09.11]
    • Guidance Software EnCase Legal Journal 2011 Available at: http://www.guidancesoftware.com/DocumentRegistration.aspx?did=1000017380 [accessed 21.09.11]
    • (2011) EnCase Legal Journal
    • Software, G.1
  • 13
  • 14
    • 80054727974 scopus 로고    scopus 로고
    • Ph.D. thesis; Department of Electrical Engineering and Computer Science, University of Maryland, Baltimore County; Baltimore, Maryland
    • Krautheim FJ. Building trust into utility cloud computing. Ph.D. thesis; Department of Electrical Engineering and Computer Science, University of Maryland, Baltimore County; Baltimore, Maryland; 2010.
    • (2010) Building Trust into Utility Cloud Computing
    • Krautheim, F.J.1
  • 18
    • 84864630401 scopus 로고    scopus 로고
    • National Institute of Standards and Technology [accessed 21.09.11]
    • National Institute of Standards and Technology Computer forensic tool testing (CFTT) project overview 2003 Available at: http://www.cftt.nist.gov/ project-overview.htm [accessed 21.09.11]
    • (2003) Computer Forensic Tool Testing (CFTT) Project Overview
  • 19
    • 48749114923 scopus 로고    scopus 로고
    • National Institute of Standards and Technology [accessed 21.09.11]
    • National Institute of Standards and Technology Digital data acquisition tool specification 2004 Available at: http://www.cftt.nist.gov/Pub-Draft-1-DDA- Require.pdf [accessed 21.09.11]
    • (2004) Digital Data Acquisition Tool Specification
  • 20
    • 84864631928 scopus 로고    scopus 로고
    • Institute Of Standards And Technology N. [accessed 21.09.11]
    • National Institute of Standards and Technology Test results for digital data acquisition tool: FTK imager 2.5.3.14 2008 Available at: http://www.ncjrs.gov/pdffiles1/nij/222982.pdf [accessed 21.09.11]
    • (2008) Test Results for Digital Data Acquisition Tool: FTK Imager 2.5.3.14
  • 21
    • 84864632302 scopus 로고    scopus 로고
    • National Institute of Standards and Technology [accessed 21.09.11]
    • National Institute of Standards and Technology Test results for digital data acquisition tool: EnCase 6.5 2009 Available at: http://www.ncjrs.gov/ pdffiles1/nij/228226.pdf [accessed 21.09.11]
    • (2009) Test Results for Digital Data Acquisition Tool: EnCase 6.5
  • 22
    • 77954051808 scopus 로고    scopus 로고
    • National Institute of Standards and Technology [accessed 08.01.12]
    • National Institute of Standards and Technology The NIST definition of cloud computing 2011 Available at: http://csrc.nist.gov/publications/nistpubs/ 800-145/SP800-145.pdf [accessed 08.01.12]
    • (2011) The NIST Definition of Cloud Computing
  • 24
    • 84864599653 scopus 로고    scopus 로고
    • [accessed 21.09.11]
    • M. Santana Cloud security: beyond the buzz 2009 Available at: http://www.linuxworldexpo.com/storage/10/documents/CI7%20Mario%20Santana.pdf [accessed 21.09.11]
    • (2009) Cloud Security: Beyond the Buzz
    • Santana, M.1
  • 25
    • 84929445167 scopus 로고    scopus 로고
    • Towards trusted cloud computing
    • [accessed 19.05.12]
    • N. Santos, K. Gummadi, and R. Rodrigues Towards trusted cloud computing Proceedings of USENIX HotCloud 2009 Available at: http://static.usenix.org/ events/hotcloud09/tech/full-papers/santos.pdf [accessed 19.05.12]
    • (2009) Proceedings of USENIX HotCloud
    • Santos, N.1    Gummadi, K.2    Rodrigues, R.3
  • 27
    • 84864632657 scopus 로고    scopus 로고
    • Best computer forensic tool
    • Scmagazine [accessed 01.11.11]
    • SCMagazine Best computer forensic tool SCMagazine 2011 [accessed 01.11.11]
    • (2011) SCMagazine
  • 29
    • 79954589576 scopus 로고    scopus 로고
    • Forensic investigation of cloud computing systems
    • M. Taylor, J. Haggerty, D. Gresty, and D. Lamb Forensic investigation of cloud computing systems Network Security 2011 3 2011 4 10
    • (2011) Network Security , vol.2011 , Issue.3 , pp. 4-10
    • Taylor, M.1    Haggerty, J.2    Gresty, D.3    Lamb, D.4
  • 30
    • 84864632658 scopus 로고    scopus 로고
    • Terremark [accessed 01.11.11]
    • Terremark Secure information services 2009 Available at: http://www.terremark.com/uploadedFiles/Services/Security-Services/TMRK- SIS-Gatefold2-4pagelayout-Screen.pdf [accessed 01.11.11]
    • (2009) Secure Information Services


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.