메뉴 건너뛰기




Volumn 7465 LNCS, Issue , 2012, Pages 593-608

Discussion on the challenges and opportunities of cloud forensics

Author keywords

Cloud Forensics; digital forensics; evidence

Indexed keywords

COMPLEX TASK; COMPUTING ENVIRONMENTS; COMPUTING POWER; DIGITAL FORENSIC; DIGITAL INVESTIGATION; DIGITAL INVESTIGATORS; DYNAMIC NATURE; EVIDENCE; SCIENTIFIC DEVELOPMENT;

EID: 84865663006     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32498-7_45     Document Type: Conference Paper
Times cited : (16)

References (67)
  • 4
    • 85028466658 scopus 로고    scopus 로고
    • Hadoop - mapreduce (2011), http://hadoop.apache.org/mapreduce
    • (2011) Mapreduce
  • 9
    • 79960257802 scopus 로고    scopus 로고
    • Cryptography Goes to the Cloud
    • Lee, C., Seigneur, J.-M., Park, J.J., Wagner, R.R. (eds.) STA 2011 Workshops. Springer, Heidelberg
    • Agudo, I., Nuñez, D., Giammatteo, G., Rizomiliotis, P., Lambrinoudakis, C.: Cryptography Goes to the Cloud. In: Lee, C., Seigneur, J.-M., Park, J.J., Wagner, R.R. (eds.) STA 2011 Workshops. CCIS, vol. 187, pp. 190-197. Springer, Heidelberg (2011)
    • (2011) CCIS , vol.187 , pp. 190-197
    • Agudo, I.1    Nuñez, D.2    Giammatteo, G.3    Rizomiliotis, P.4    Lambrinoudakis, C.5
  • 10
    • 38149024127 scopus 로고    scopus 로고
    • Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module
    • Nam, K.-H., Rhee, G. (eds.) ICISC 2007. Springer, Heidelberg
    • Ando, R., Kadobayashi, Y., Shinoda, Y.: Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 131-143. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4817 , pp. 131-143
    • Ando, R.1    Kadobayashi, Y.2    Shinoda, Y.3
  • 11
    • 85019514248 scopus 로고    scopus 로고
    • Green cloud computing: Balancing energy in processing, storage, and transport
    • Baliga, J., Ayre, R.W.A., Hinton, K., Tucker, R.S.: Green cloud computing: Balancing energy in processing, storage, and transport. Proceedings of the IEEE 99(1), 149-167 (2011)
    • (2011) Proceedings of the IEEE , vol.99 , Issue.1 , pp. 149-167
    • Baliga, J.1    Ayre, R.W.A.2    Hinton, K.3    Tucker, R.S.4
  • 12
    • 85013744824 scopus 로고    scopus 로고
    • Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments
    • Syngress/Elsevier
    • Barrett, D., Kipper, G.: Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments. Syngress Media, Syngress/Elsevier (2010), http://books.google.at/books?id=QXF1kKX2za8C
    • (2010) Syngress Media
    • Barrett, D.1    Kipper, G.2
  • 13
    • 84943526145 scopus 로고    scopus 로고
    • Digital forensic research: The good, the bad and the unaddressed
    • Peterson, G., Shenoi, S. (eds.) Springer, Boston
    • Beebe, N., Beebe, N.: Digital forensic research: The good, the bad and the unaddressed. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics V. IFIP AICT, vol. 306, pp. 17-36. Springer, Boston (2009)
    • (2009) Advances in Digital Forensics V. IFIP AICT , vol.306 , pp. 17-36
    • Beebe, N.1    Beebe, N.2
  • 15
  • 17
    • 77950555514 scopus 로고    scopus 로고
    • Guidelines for evidence collection and archiving
    • Best Current Practice
    • Brezinski, D., Killalea, T.: Guidelines for evidence collection and archiving. RFC 3227 (Best Current Practice) (2002)
    • (2002) RFC , vol.3227
    • Brezinski, D.1    Killalea, T.2
  • 23
    • 79961049729 scopus 로고    scopus 로고
    • Distributed forensics and incident response in the enterprise
    • Cohen, M., Bilby, D., Caronni, G.: Distributed forensics and incident response in the enterprise. Digital Investigation 8(suppl.), S101-S110 (2011)
    • (2011) Digital Investigation , vol.8 , Issue.SUPPL.
    • Cohen, M.1    Bilby, D.2    Caronni, G.3
  • 27
    • 82455199242 scopus 로고    scopus 로고
    • Storage and exchange formats for digital evidence
    • standards, professionalization and quality in digital forensics
    • Flaglien, A.O., Mallasvik, A., Mustorp, M., Arnes, A.: Storage and exchange formats for digital evidence. Digital Investigation 8(2), 122-128 (2011); standards, professionalization and quality in digital forensics
    • (2011) Digital Investigation , vol.8 , Issue.2 , pp. 122-128
    • Flaglien, A.O.1    Mallasvik, A.2    Mustorp, M.3    Arnes, A.4
  • 29
    • 77955374828 scopus 로고    scopus 로고
    • Digital forensics research: The next 10 years
    • the Proceedings of the Tenth Annual DFRWS Conference
    • Garfinkel, S.L.: Digital forensics research: The next 10 years. Digital Investigation 7(suppl. 1), S64-S73 (2010); the Proceedings of the Tenth Annual DFRWS Conference
    • (2010) Digital Investigation , vol.7 , Issue.SUPPL. 1
    • Garfinkel, S.L.1
  • 35
    • 84865623158 scopus 로고    scopus 로고
    • December accessed: December 30, 2011
    • Kazarian, B., Hanlon, B.: SMB Cloud Adoption Study,- Global Report (December 2010), http://www.microsoft.com/Presspass/presskits/commsector/docs/ SMBStudy 032011.pdf (accessed: December 30, 2011)
    • (2010) SMB Cloud Adoption Study,- Global Report
    • Kazarian, B.1    Hanlon, B.2
  • 41
    • 84865645084 scopus 로고    scopus 로고
    • online; Status: January 09, 2012
    • Sandia National Laboratories: Libvmi (2011), http://vmitools.sandia.gov/ libvmi.html (online; Status: January 09, 2012)
    • (2011) Libvmi
  • 45
    • 60649097606 scopus 로고    scopus 로고
    • Cerias tech report 2005-17, Center for Education and Research in Information Assurance and Security, Purdue University
    • Marsico, C.V.: Computer evidence v. daubert: The coming conflict. Cerias tech report 2005-17, Center for Education and Research in Information Assurance and Security, Purdue University (2005)
    • (2005) Computer Evidence V. Daubert: The Coming Conflict
    • Marsico, C.V.1
  • 46
    • 79959322079 scopus 로고    scopus 로고
    • Cloud application logging for forensics
    • Chu, W.C., Wong, W.E., Palakal, M.J., Hung, C.C. (eds.) ACM
    • Marty, R.: Cloud application logging for forensics. In: Chu, W.C., Wong, W.E., Palakal, M.J., Hung, C.C. (eds.) Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), pp. 178-184. ACM (2011)
    • (2011) Proceedings of the 2011 ACM Symposium on Applied Computing (SAC) , pp. 178-184
    • Marty, R.1
  • 47
    • 80053048376 scopus 로고    scopus 로고
    • Digital evidence and "cloud" computing
    • Mason, S., George, E.: Digital evidence and "cloud" computing. Computer Law & Security Review 27(5), 524-528 (2011)
    • (2011) Computer Law & Security Review , vol.27 , Issue.5 , pp. 524-528
    • Mason, S.1    George, E.2
  • 54
    • 33745203008 scopus 로고    scopus 로고
    • Next-generation digital forensics
    • Richard, G.G., Roussev, V.: Next-generation digital forensics. Communications of the ACM 49, 76-80 (2006), http://doi.acm.org/10.1145/1113034. 1113074
    • (2006) Communications of the ACM , vol.49 , pp. 76-80
    • Richard, G.G.1    Roussev, V.2
  • 62
    • 79954589576 scopus 로고    scopus 로고
    • Forensic investigation of cloud computing systems
    • Taylor, M., Haggerty, J., Gresty, D., Lamb, D.: Forensic investigation of cloud computing systems. Network Security 2011(3), 4-10 (2011)
    • (2011) Network Security , vol.2011 , Issue.3 , pp. 4-10
    • Taylor, M.1    Haggerty, J.2    Gresty, D.3    Lamb, D.4
  • 63
    • 78651078141 scopus 로고    scopus 로고
    • Using a local search warrant to acquire evidence stored overseas via the internet
    • Chow, K.P., Shenoi, S. (eds.) Springer, Boston
    • Wang, K.: Using a local search warrant to acquire evidence stored overseas via the internet. In: Chow, K.P., Shenoi, S. (eds.) Advances in Digital Forensics VI. IFIP AICT, vol. 337, pp. 37-48. Springer, Boston (2010), http://dx.doi.org/10.1007/978-3-642-15506-2-3
    • (2010) Advances in Digital Forensics VI. IFIP AICT , vol.337 , pp. 37-48
    • Wang, K.1
  • 64
    • 84979802564 scopus 로고    scopus 로고
    • Foundations of computer forensics: A technology for the fight against computer crime
    • Wang, Y., Cannady, J., Rosenbluth, J.: Foundations of computer forensics: A technology for the fight against computer crime. Computer Law & Security Review 21(2), 119-127 (2005)
    • (2005) Computer Law & Security Review , vol.21 , Issue.2 , pp. 119-127
    • Wang, Y.1    Cannady, J.2    Rosenbluth, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.