메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Cloud Forensics: A Review of Challenges, Solutions and Open Problems

Author keywords

Cloud Computing; Cloud Forensics challenges; Cloud Forensics Solutions; Digital Forensics; Digital Investigation

Indexed keywords

CLOUD COMPUTING; DIGITAL FORENSICS;

EID: 84941062481     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CLOUDCOMP.2015.7149635     Document Type: Conference Paper
Times cited : (41)

References (42)
  • 2
    • 84941089783 scopus 로고    scopus 로고
    • Dropbox, word press used As cloud cover in new APT attacks
    • [Online]. [Accessed: 28-Jan- 2015]
    • K. Higgings, "Dropbox, Word Press Used As Cloud Cover In New APT Attacks," Dark reading, 2013. [Online]. Available: http://www.darkreading.com/attacksbreaches/dropbox-wordpress-used-as-cloud-cover-innew-apt-attacks/d/d-id/1140098? [Accessed: 28-Jan- 2015].
    • (2013) Dark Reading
    • Higgings, K.1
  • 3
    • 84875587046 scopus 로고    scopus 로고
    • Cloud computing and its implications for cybercrime investigations in Australia
    • Apr.
    • C. Hooper, B. Martini, and K.-K. R. Choo, "Cloud computing and its implications for cybercrime investigations in Australia," Comput. Law Secur. Rev., vol. 29, no. 2, pp. 152-163, Apr. 2013.
    • (2013) Comput. Law Secur. Rev. , vol.29 , Issue.2 , pp. 152-163
    • Hooper, C.1    Martini, B.2    Choo, K.-K.R.3
  • 6
    • 84891060892 scopus 로고    scopus 로고
    • Digital forensics in the cloud
    • no. October
    • S. Zawoad and R. Hasan, "Digital Forensics in the Cloud," Cross Talk, no. October, pp. 17-20, 2013.
    • (2013) Cross Talk , pp. 17-20
    • Zawoad, S.1    Hasan, R.2
  • 8
    • 84886473304 scopus 로고    scopus 로고
    • Beyond digital forensics. A cloud computing perspective over incident response and reporting
    • A. Patrascu and V. Patriciu, "Beyond Digital Forensics. A Cloud Computing Perspective Over Incident Response and Reporting," Applied Computational Intelligence and Informatics (SACI), 2013, pp. 455-460.
    • (2013) Applied Computational Intelligence and Informatics (SACI) , pp. 455-460
    • Patrascu, A.1    Patriciu, V.2
  • 9
    • 84957103995 scopus 로고    scopus 로고
    • Cloud computing reference architecture and its forensic implications: A preliminary analysis
    • K. Ruan and J. Carthy, "Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary Analysis," Digit. Forensics Cyber Crime, pp. 1-21, 2013.
    • (2013) Digit. Forensics Cyber Crime , pp. 1-21
    • Ruan, K.1    Carthy, J.2
  • 10
    • 84865625452 scopus 로고    scopus 로고
    • Technical challenges of forensic investigations in cloud computing environments
    • D. Birk, "Technical Challenges of Forensic Investigations in Cloud Computing Environments," Workshop on Cryptography and Security in Clouds, 2011, pp. 1-6.
    • (2011) Workshop on Cryptography and Security in Clouds , pp. 1-6
    • Birk, D.1
  • 13
    • 84874571410 scopus 로고    scopus 로고
    • Cloud computing□: Pros and cons for computer forensic investigations
    • D. Reilly, C. Wren, and T. Berry, "Cloud Computing□: Pros and Cons for Computer Forensic Investigations," Int. J. Multimed. Image Process., vol. 1, no. 1, pp. 26-34, 2011.
    • (2011) Int. J. Multimed. Image Process. , vol.1 , Issue.1 , pp. 26-34
    • Reilly, D.1    Wren, C.2    Berry, T.3
  • 19
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • Nov.
    • B. Martini and K.-K. R. Choo, "An integrated conceptual digital forensic framework for cloud computing," Digit. Investig., vol. 9, no. 2, pp. 71-80, Nov. 2012.
    • (2012) Digit. Investig. , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 21
    • 84881295724 scopus 로고    scopus 로고
    • Design and implementation of FROST: Digital forensic tools for the open stack cloud computing platform
    • Aug.
    • J. Dykstra and A. T. Sherman, "Design and implementation of FROST: Digital forensic tools for the Open Stack cloud computing platform," Digit. Investig., vol. 10, pp. S87-S95, Aug. 2013.
    • (2013) Digit. Investig. , vol.10 , pp. S87-S95
    • Dykstra, J.1    Sherman, A.T.2
  • 24
    • 79954589576 scopus 로고    scopus 로고
    • Forensic investigation of cloud computing systems
    • Mar.
    • M. Taylor, J. Haggerty, D. Gresty, and D. Lamb, "Forensic investigation of cloud computing systems," Netw. Secur., vol. 2011, no. 3, pp. 4-10, Mar. 2011.
    • (2011) Netw. Secur. , vol.2011 , Issue.3 , pp. 4-10
    • Taylor, M.1    Haggerty, J.2    Gresty, D.3    Lamb, D.4
  • 25
    • 84898291010 scopus 로고    scopus 로고
    • Designing a forensic-enabling cloud ecosystem
    • USA: IGI Global
    • K. Ruan, "Designing a Forensic-Enabling Cloud Ecosystem," in Cybercrime and cloud forensics, USA: IGI Global, 2013, pp. 331-344.
    • (2013) Cybercrime and Cloud Forensics , pp. 331-344
    • Ruan, K.1
  • 26
    • 84941111698 scopus 로고    scopus 로고
    • Hack the cloud: Ethical hacking and cloud forensics
    • USA: IGI Global
    • M. Crosbie, "Hack the Cloud: Ethical Hacking and Cloud Forensics," in Cybercrime and cloud forensics, USA: IGI Global, 2013, p. 17.
    • (2013) Cybercrime and Cloud Forensics , pp. 17
    • Crosbie, M.1
  • 27
    • 84877838084 scopus 로고    scopus 로고
    • Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results
    • Mar.
    • K. Ruan, J. Carthy, T. Kechadi, and I. Baggili, "Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results," Digit. Investig., vol. 10, no. 1, pp. 34-43, Mar. 2013.
    • (2013) Digit. Investig. , vol.10 , Issue.1 , pp. 34-43
    • Ruan, K.1    Carthy, J.2    Kechadi, T.3    Baggili, I.4
  • 29
    • 84864596423 scopus 로고    scopus 로고
    • Acquiring forensic evidence from infrastructure-as-A-service cloud computing: Exploring and evaluating tools, trust, and techniques
    • Aug.
    • J. Dykstra and A. T. Sherman, "Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques," Digit. Investig., vol. 9, pp. S90-S98, Aug. 2012.
    • (2012) Digit. Investig. , vol.9 , pp. S90-S98
    • Dykstra, J.1    Sherman, A.T.2
  • 30
    • 84904009352 scopus 로고    scopus 로고
    • Isolating a cloud instance for a digital forensic
    • W. Delport, M. S. Olivier, and M. Kohn, "Isolating a Cloud Instance for a Digital Forensic," in ISSA, 2011.
    • (2011) ISSA
    • Delport, W.1    Olivier, M.S.2    Kohn, M.3
  • 31
    • 84941046451 scopus 로고    scopus 로고
    • Digital provenance: Enabling secure data forensics in cloud computing
    • Oct.
    • J. Li, X. Chen, Q. Huang, and D. S. Wong, "Digital provenance: Enabling secure data forensics in cloud computing," Futur. Gener. Comput. Syst., Oct. 2013.
    • (2013) Futur. Gener. Comput. Syst.
    • Li, J.1    Chen, X.2    Huang, Q.3    Wong, D.S.4
  • 37
    • 77955574175 scopus 로고    scopus 로고
    • Digital evidence in cloud computing systems
    • May.
    • M. Taylor, J. Haggerty, D. Gresty, and R. Hegarty, "Digital evidence in cloud computing systems," Comput. Law Secur. Rev., vol. 26, no. 3, pp. 304-308, May 2010.
    • (2010) Comput. Law Secur. Rev. , vol.26 , Issue.3 , pp. 304-308
    • Taylor, M.1    Haggerty, J.2    Gresty, D.3    Hegarty, R.4
  • 38
    • 84941075486 scopus 로고    scopus 로고
    • Computer investigations
    • [Online]
    • M. Kumar, "Computer Investigations," The Hacker News, 2011. [Online]. Available: http://thehackernews.com/2011/09/offline-windowsanalysis-and-data.html.
    • (2011) The Hacker News
    • Kumar, M.1
  • 39
    • 84899127115 scopus 로고    scopus 로고
    • Regenerating cloud attack scenarios using LVM2 based system snapshots for forensic analysis
    • G. Geethakumari and A. Belorkar, "Regenerating Cloud Attack Scenarios using LVM2 based System Snapshots for Forensic Analysis," Int. J. Cloud Comput. Serv. Sci., vol. 1, no. 3, pp. 134-141, 2012.
    • (2012) Int. J. Cloud Comput. Serv. Sci. , vol.1 , Issue.3 , pp. 134-141
    • Geethakumari, G.1    Belorkar, A.2
  • 42
    • 84941122102 scopus 로고    scopus 로고
    • Cybercrime and cloud forensics
    • K. Ruan, Ed. USA: IGI Global
    • J. Dykstra, "Cybercrime and Cloud Forensics," in Cybercrime and cloud forensics, K. Ruan, Ed. USA: IGI Global, 2013, pp. 156-185.
    • (2013) Cybercrime and Cloud Forensics , pp. 156-185
    • Dykstra, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.