메뉴 건너뛰기




Volumn , Issue , 2013, Pages 211-233

Calm before the storm: The challenges of cloud computing in digital forensics

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; CLOUD COMPUTING; COMPUTER CRIME; DIGITAL STORAGE; ELECTRONIC CRIME COUNTERMEASURES; INFORMATION MANAGEMENT; VIRTUAL REALITY;

EID: 84944034810     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-4006-1.ch015     Document Type: Chapter
Times cited : (12)

References (54)
  • 1
    • 79960257802 scopus 로고    scopus 로고
    • Cryptography goes to the cloud
    • In Proceedings of the STA Workshops: IWCS and STAVE on Secure and Trust Computing, Data Management, and Applications, Loutraki, Greece
    • Agudo, I., Nuñez, D., Giammatteo, G., Rizomiliotis, P., & Lambrinoudakis, C. (2011). Cryptography goes to the cloud. In Proceedings of the STA Workshops: IWCS and STAVE on Secure and Trust Computing, Data Management, and Applications, Loutraki, Greece (Vol. 187).
    • (2011) , vol.187
    • Agudo, I.1    Nuñez, D.2    Giammatteo, G.3    Rizomiliotis, P.4    Lambrinoudakis, C.5
  • 2
    • 84871176517 scopus 로고    scopus 로고
    • Zeus BotNet Controller
    • Retrieved February 2, 2012
    • Amazon Web Services. (2009). Zeus BotNet Controller. Amazon Security Bulletin. Retrieved February 2, 2012, from http://aws.amazon.com/security/security-bulletins/zeus-botnet-controller/
    • (2009) Amazon Security Bulletin
  • 3
    • 84944032202 scopus 로고    scopus 로고
    • Amazon Cloud- Front - Developer Guide
    • Retrieved February 2, 2012
    • Amazon Web Services. (2010). Amazon Cloud- Front - Developer Guide. Retrieved February 2, 2012, from http://s3.amazonaws.com/awsdocs/CF/latest/cf_dg.pdf
    • (2010)
  • 4
    • 33745186968 scopus 로고    scopus 로고
    • Good practice guide for computer-based electronic evidence
    • February 2, 2012
    • Association of Chief Police Officers, & 7Safe. (2007). Good practice guide for computer-based electronic evidence. Retrieved February 2, 2012, from http://www.7safe.com/electronic_evidence/ACPO_guidelines_computer_evidence.pdf
    • (2007)
  • 5
    • 84925266018 scopus 로고    scopus 로고
    • The enhanced digital investigation process. Paper presented at the Digital Forensic Research Workshop
    • Baltimore, MD.
    • Baryamureeba, V., & Tushabe, F. (2004). The enhanced digital investigation process. Paper presented at the Digital Forensic Research Workshop, Baltimore, MD.
    • (2004)
    • Baryamureeba, V.1    Tushabe, F.2
  • 9
    • 77950653648 scopus 로고    scopus 로고
    • Hide and seek in the cloud
    • Blumenthal, M. S. (2010). Hide and seek in the cloud. IEEE Security & Privacy, 8(2), 57-58. doi:10.1109/MSP.2010.70.
    • (2010) IEEE Security & Privacy, , vol.8 , Issue.2 , pp. 57-58
    • Blumenthal, M.S.1
  • 10
    • 84871134713 scopus 로고    scopus 로고
    • Cloud computing: eDiscovery issues and other risk
    • February 2, 2012
    • Butler, C. W., Heckman, C., & Thorp, A. (2010). Cloud computing: eDiscovery issues and other risk. Retrieved February 2, 2012, from http://www.orrick.com/fileupload/2740.pdf
    • (2010)
    • Butler, C.W.1    Heckman, C.2    Thorp, A.3
  • 12
    • 63149105878 scopus 로고    scopus 로고
    • An eventbased digital forensic investigation framework
    • Paper presented at the Digital Forensic Research Workshop, Baltimore, MD.
    • Carrier, B., & Spafford, E. H. (2004). An eventbased digital forensic investigation framework. Paper presented at the Digital Forensic Research Workshop, Baltimore, MD.
    • (2004)
    • Carrier, B.1    Spafford, E.H.2
  • 13
    • 80053156184 scopus 로고    scopus 로고
    • The cost of cyber crime. A Detica Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office
    • February 2, 2012
    • Detica. (2011, February). The cost of cyber crime. A Detica Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office. Retrieved February 2, 2012, from http://www.cabinetoffice.gov.uk/sites/default/files/resources/the-cost-of-cyber-crimefull-report.pdf
    • (2011)
  • 14
    • 84944040573 scopus 로고    scopus 로고
    • Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. Official Journal of the European Union
    • Retrieved February 2, 2012
    • European Union. (2006). Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC. Official Journal of the European Union, 15(4). Retrieved February 2, 2012, from http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2006:105:0054:0063:EN:PDF
    • (2006) , vol.15 , Issue.4
  • 15
    • 84455197882 scopus 로고    scopus 로고
    • IDC Predictions 2011: Welcome to the New Mainstream (International Data Corporation White Paper, Doc No. 225878)
    • February 2, 2012
    • Gens, F. (2010). IDC Predictions 2011: Welcome to the New Mainstream (International Data Corporation White Paper, Doc No. 225878). Retrieved February 2, 2012, from http://www.idc.com/research/viewdocsynopsis.jsp?containerId=225878
    • (2010)
    • Gens, F.1
  • 16
    • 21644437974 scopus 로고    scopus 로고
    • The Google file system. In Proceedings of the 19th ACM Symposium on Operating Systems Principles
    • Bolton Landing, NY.
    • Ghemawat, S., Gobioff, H., & Leung, S. T. (2003). The Google file system. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY.
    • (2003)
    • Ghemawat, S.1    Gobioff, H.2    Leung, S.T.3
  • 17
    • 84871179314 scopus 로고    scopus 로고
    • Google apps messaging and collaboration products
    • 2, 2012
    • Google. (2010). Google apps messaging and collaboration products. Retrieved February 2, 2012, from http://static.googleusercontent.com/external_content/untrusted_dlcp/www.google. com/en//a/help/intl/en-GB/admins/pdf/ds_gsa_ apps_whitepaper_0207.pdf
    • (2010)
  • 18
    • 84871127804 scopus 로고    scopus 로고
    • Message security for Google Apps: Administration guide
    • Retrieved February 2, 2012
    • Google. (2011). Message security for Google Apps: Administration guide. Retrieved February 2, 2012, from https://ac-s9.postini.com/help/ admin_msd/administration_msd.pdf
    • (2011)
  • 19
    • 84871161943 scopus 로고    scopus 로고
    • Web-based email, calendar, and documents for teams
    • Retrieved February 2, 2012
    • Google Apps. (2011). Web-based email, calendar, and documents for teams. Retrieved February 2, 2012, from http://www.google.com/apps/intl/en/business/index.html
    • (2011)
  • 20
    • 68949135999 scopus 로고    scopus 로고
    • Validation and verification of computer forensic software tools-Searching function
    • Guo, Y., Slay, J., & Beckett, J. (2009). Validation and verification of computer forensic software tools-Searching function. Digital Investigation, 6, 12-22. doi:10.1016/j.diin.2009.06.015.
    • (2009) Digital Investigation, , vol.6 , pp. 12-22
    • Guo, Y.1    Slay, J.2    Beckett, J.3
  • 21
    • 79551525376 scopus 로고    scopus 로고
    • The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation
    • Hunton, P. (2011). The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation. Computer Law & Security Report, 27(1), 61-67. doi:10.1016/j.clsr.2010.11.001.
    • (2011) Computer Law & Security Report, , vol.27 , Issue.1 , pp. 61-67
    • Hunton, P.1
  • 22
    • 33746255206 scopus 로고    scopus 로고
    • FORZA - Digital forensics investigation framework that incorporate legal issues
    • Ieong, R. S. C. (2006). FORZA - Digital forensics investigation framework that incorporate legal issues. Digital Investigation, 3, 29-36. doi:10.1016/j.diin.2006.06.004.
    • (2006) Digital Investigation, , vol.3 , pp. 29-36
    • Ieong, R.S.C.1
  • 24
    • 84871158912 scopus 로고    scopus 로고
    • SMB cloud adoption study Dec 2010 - Global Report: What will be the impact of cloud services on SMBs in the next 3 years?
    • Retrieved February 2, 2012
    • Kazarian, B., & Hanlon, B. (2011). SMB cloud adoption study Dec 2010 - Global Report: What will be the impact of cloud services on SMBs in the next 3 years? Retrieved February 2, 2012, from http://www.microsoft.com/Presspass/presskits/commsector/docs/SMBStudy_032011.pdf
    • (2011)
    • Kazarian, B.1    Hanlon, B.2
  • 26
    • 0038027865 scopus 로고    scopus 로고
    • Computer forensics: Incident response essentials
    • Reading, MS: Addison-Wesley
    • Kruse, I., Warren, G., & Jay, G. (2001). Computer forensics: Incident response essentials. Reading, MS: Addison-Wesley.
    • (2001)
    • Kruse, I.1    Warren, G.2    Jay, G.3
  • 27
    • 79960511333 scopus 로고    scopus 로고
    • Cloud security - A comprehensive guide to secure cloud computing
    • New York, NY: John Wiley & Sons
    • Krutz, R. R., & Vines, R. (2010). Cloud security - A comprehensive guide to secure cloud computing. New York, NY: John Wiley & Sons.
    • (2010)
    • Krutz, R.R.1    Vines, R.2
  • 28
    • 84944058712 scopus 로고    scopus 로고
    • Computer Evidence v
    • Daubert: The coming conflict. West Lafayette, IN USA: Purdue University, Center for Education and Research in Information Assurance and Security
    • Marsico, C. V. (2004). Computer Evidence v. Daubert: The coming conflict. West Lafayette, IN USA: Purdue University, Center for Education and Research in Information Assurance and Security.
    • (2004)
    • Marsico, C.V.1
  • 29
    • 79959322079 scopus 로고    scopus 로고
    • Cloud application logging for forensics. In Proceedings of the ACM Symposium on Applied Computing
    • Marty, R. (2011). Cloud application logging for forensics. In Proceedings of the ACM Symposium on Applied Computing, TaiChung, Taiwan (pp. 178-184).
    • (2011) TaiChung, Taiwan , pp. 178-184
    • Marty, R.1
  • 30
    • 77954051808 scopus 로고    scopus 로고
    • The NIST definition of cloud computing. Cambridge, MA: National Institute of Standards and Technology
    • Retrieved February 2, 2012
    • Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. Cambridge, MA: National Institute of Standards and Technology. Retrieved February 2, 2012, from http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
    • (2011)
    • Mell, P.1    Grance, T.2
  • 31
    • 82455175178 scopus 로고    scopus 로고
    • An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines
    • Owen, P., & Thomas, P. (2011). An analysis of digital forensic examinations: Mobile devices versus hard disk drives utilising ACPO & NIST guidelines. Digital Investigation, 8(2), 135-140. doi:10.1016/j.diin.2011.03.002.
    • (2011) Digital Investigation, , vol.8 , Issue.2 , pp. 135-140
    • Owen, P.1    Thomas, P.2
  • 32
    • 0038027863 scopus 로고    scopus 로고
    • A road map for digital forensic research - Report from the First Digital Forensic Research Workshop (DFRWS)
    • Utica, NY: Digital Forensic Research Workshop
    • Palmer, G. (2001). A road map for digital forensic research - Report from the First Digital Forensic Research Workshop (DFRWS). Utica, NY: Digital Forensic Research Workshop.
    • (2001)
    • Palmer, G.1
  • 33
    • 84883551624 scopus 로고    scopus 로고
    • Digital triage forensics: Processing the digital crime scene
    • Burlington, MA: Syngress
    • Pearson, S., & Watson, R. (2010). Digital triage forensics: Processing the digital crime scene. Burlington, MA: Syngress.
    • (2010)
    • Pearson, S.1    Watson, R.2
  • 34
    • 84869161782 scopus 로고    scopus 로고
    • Forecast: Public cloud services, worldwide and regions, industry sectors, 2009-2014
    • Stamford, CT: Gartner, Retrieved February 2, 2012
    • Pring, B., Brown, R. H., Leong, L., Biscotti, F., Couture, A. W., & Lheureux, B. J.Liu, V. K. (2010). Forecast: Public cloud services, worldwide and regions, industry sectors, 2009-2014.Stamford, CT: Gartner. Retrieved February 2, 2012, from http://www.gartner.com/id=1378513
    • (2010)
    • Pring, B.1    Brown, R.H.2    Leong, L.3    Biscotti, F.4    Couture, A.W.5    Lheureux, B.J.6    Liu, V.K.7
  • 38
    • 33745203008 scopus 로고    scopus 로고
    • Next-generation digital forensics
    • Richard, G., & Roussev, V. (2006). Next-generation digital forensics. Communications of the ACM, 49(2), 76-80. doi:10.1145/1113034.1113074.
    • (2006) Communications of the ACM, , vol.49 , Issue.2 , pp. 76-80
    • Richard, G.1    Roussev, V.2
  • 40
    • 77950559014 scopus 로고    scopus 로고
    • Intrusion detection in the cloud. In Proceedings of the Eighth IEEE International Conference on Dependable
    • Roschke, S., Cheng, F., & Meinel, C. (2009). Intrusion detection in the cloud. In Proceedings of the Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China (pp. 729-734).
    • (2009) Autonomic and Secure Computing, Chengdu, China , pp. 729-734
    • Roschke, S.1    Cheng, F.2    Meinel, C.3
  • 42
    • 85032558983 scopus 로고    scopus 로고
    • Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. In Proceedings of the 6th Annual Conference of the ADFSL Conference on Digital Forensics
    • Ruan, K., Baggili, I., Carthy, J., & Kechadi, T. (2011). Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. In Proceedings of the 6th Annual Conference of the ADFSL Conference on Digital Forensics, Security and Law, Richmond, VA.
    • (2011) Security and Law, Richmond, VA.
    • Ruan, K.1    Baggili, I.2    Carthy, J.3    Kechadi, T.4
  • 44
    • 84944059724 scopus 로고    scopus 로고
    • The future of cloud computing: Opportunities for European cloud computing beyond 2010. European Commission Information and Society Theme - Expert Group Report
    • February 2, 2012
    • Schubert, L., Jeffery, K., & Neidecker-Lutz, B. (2010). The future of cloud computing: Opportunities for European cloud computing beyond 2010. European Commission Information and Society Theme - Expert Group Report. Retrieved February 2, 2012, from http://cordis.europa.eu/fp7/ict/ssai/docs/cloud-report-final.pdf
    • (2010)
    • Schubert, L.1    Jeffery, K.2    Neidecker-Lutz, B.3
  • 45
    • 3042731402 scopus 로고    scopus 로고
    • The challenges of large computer evidence cases
    • Sommer, P. (2004). The challenges of large computer evidence cases. Digital Investigation, 1(1), 16-17. doi:10.1016/j.diin.2004.01.005.
    • (2004) Digital Investigation, , vol.1 , Issue.1 , pp. 16-17
    • Sommer, P.1
  • 48
    • 84977625579 scopus 로고    scopus 로고
    • The admissibility of expert evidence in criminal proceedings in England and Wales - A new approach to the determination of evidentiary reliability (Consultation Paper No. 190)
    • Retrieved February 2, 2012
    • The Law Commission. (2009). The admissibility of expert evidence in criminal proceedings in England and Wales - A new approach to the determination of evidentiary reliability (Consultation Paper No. 190). Retrieved February 2, 2012, from http://www.justice.gov.uk/lawcommission/ docs/cp190_Expert_Evidence:Consultation.pdf
    • (2009)
  • 49
    • 77957962695 scopus 로고    scopus 로고
    • Open Cloud manifesto
    • Retrieved February 2, 2012
    • The Open Cloud Manifesto Consortium. (2009). Open Cloud manifesto. Retrieved February 2, 2012, from http://www.opencloudmanifesto.org/ Open%20Cloud%20Manifesto.pdf
    • (2009)
  • 50
    • 19844366707 scopus 로고    scopus 로고
    • Computer forensics: Computer crime scene investigation
    • (2nd ed.). Hingham, MA: Charles River Media.
    • Vacca, J. R. (2005). Computer forensics: Computer crime scene investigation (2nd ed.). Hingham, MA: Charles River Media.
    • (2005)
    • Vacca, J.R.1
  • 51
    • 77954931494 scopus 로고    scopus 로고
    • Intrusion detection for grid and cloud computing
    • Vieira, K., Schulter, A., Westphall, C., & Westphall, C. (2010). Intrusion detection for grid and cloud computing. IT Professional, 12(4), 38-43. doi:10.1109/MITP.2009.89.
    • (2010) IT Professional, , vol.12 , Issue.4 , pp. 38-43
    • Vieira, K.1    Schulter, A.2    Westphall, C.3    Westphall, C.4
  • 52
    • 78651078141 scopus 로고    scopus 로고
    • Using a local search warrant to acquire evidence stored overseas via the Internet
    • Proceedings of the 6th IFIP WG 11.9 International Conference on Advances in Digital Forensics VI, Hong Kong
    • Wang, K. (2010). Using a local search warrant to acquire evidence stored overseas via the Internet. In Proceedings of the 6th IFIP WG 11.9 International Conference on Advances in Digital Forensics VI, Hong Kong (pp. 37-48).
    • (2010) , pp. 37-48
    • Wang, K.1
  • 53
    • 84979802564 scopus 로고    scopus 로고
    • Foundations of computer forensics: A technology for the fight against computer crime
    • Wang, Y., Cannady, J., & Rosenbluth, J. (2005). Foundations of computer forensics: A technology for the fight against computer crime. Computer Law & Security Report, 21(2), 119-127. doi:10.1016/j.clsr.2005.02.007.
    • (2005) Computer Law & Security Report, , vol.21 , Issue.2 , pp. 119-127
    • Wang, Y.1    Cannady, J.2    Rosenbluth, J.3
  • 54
    • 84871136555 scopus 로고    scopus 로고
    • Amazon EC2 now available in Europe
    • Retrieved February 2, 2012
    • Wauters, R. (2008). Amazon EC2 now available in Europe. Retrieved February 2, 2012, from http:// techcrunch.com/2008/12/10/amazon-ec2-nowavailable- in-europe/
    • (2008)
    • Wauters, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.