메뉴 건너뛰기




Volumn 29, Issue 14, 2017, Pages

Cloud incident handling and forensic-by-design: cloud storage as a case study

Author keywords

cloud computing; cloud storage forensics; digital forensics; forensic by design; incident handling; mobile forensics

Indexed keywords

CLOUD COMPUTING; COPYRIGHTS; DIGITAL FORENSICS; DIGITAL STORAGE; SECURITY OF DATA;

EID: 84971492452     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.3868     Document Type: Article
Times cited : (60)

References (43)
  • 1
    • 84928114546 scopus 로고    scopus 로고
    • CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances
    • Li B, Li J, Liu L. CloudMon: a resource-efficient IaaS cloud monitoring system based on networked intrusion detection system virtual appliances. Concurrency and Computation: Practice and Experience 2015; 27(8):1861–1885.
    • (2015) Concurrency and Computation: Practice and Experience , vol.27 , Issue.8 , pp. 1861-1885
    • Li, B.1    Li, J.2    Liu, L.3
  • 3
    • 84928750893 scopus 로고    scopus 로고
    • Cloud attack and risk assessment taxonomy
    • Juliadotter NV, Choo K-KR. Cloud attack and risk assessment taxonomy. IEEE Cloud Computing 2015; 2(1):14–20. doi:10.1109/MCC.2015.2.
    • (2015) IEEE Cloud Computing , vol.2 , Issue.1 , pp. 14-20
    • Juliadotter, N.V.1    Choo, K.-K.R.2
  • 5
    • 84916918767 scopus 로고    scopus 로고
    • A survey of information security incident handling in the cloud
    • Ab Rahman NH, Choo K-KR. A survey of information security incident handling in the cloud. Computer & Security 2015; 49:45–69. doi:10.1016/j.cose.2014.11.006.
    • (2015) Computer & Security , vol.49 , pp. 45-69
    • Ab Rahman, N.H.1    Choo, K.-K.R.2
  • 6
    • 85032429238 scopus 로고    scopus 로고
    • Kent K, Chevaliar S, Grance T, Dang H. Guide to integrating forensic techniques into incident response. Available from: http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf [20 November 2015].
  • 7
    • 85050883948 scopus 로고    scopus 로고
    • Integrating digital forensic practices in cloud incident handling: a conceptual cloud incident handling model
    • In, Ko R, Choo K-KR, (eds)., Syngress, an Imprint of Elsevier, Waltham, MA
    • Ab Rahman NH, Choo K-KR. Integrating digital forensic practices in cloud incident handling: a conceptual cloud incident handling model. In Cloud Security Ecosystem, Ko R, Choo K-KR (eds). Syngress, an Imprint of Elsevier: Waltham, MA, 2015; 383–400.
    • (2015) Cloud Security Ecosystem , pp. 383-400
    • Ab Rahman, N.H.1    Choo, K.-K.R.2
  • 9
    • 85032431259 scopus 로고    scopus 로고
    • Dropbox for Business Security. (Available from: https://www.dropbox.com/static/business/resources/dfb_security_whitepaper.pdf [25 November 2015]).
  • 10
    • 85032427209 scopus 로고    scopus 로고
    • Google's Approach to IT Security. (Available from: https://static.googleusercontent.com/media/www.google.com/en/AU/work/pdf/whygoogle/google-common-security-whitepaper.pdf [25 November 2015]).
  • 11
    • 85032431364 scopus 로고    scopus 로고
    • Security and Compliance: Office 365. (Available from: http://www.microsoft.com/en-us/download/confirmation.aspx?id=26552 [25 November 2015]).
  • 13
    • 84970003207 scopus 로고    scopus 로고
    • Trustworthy processing of healthcare big data in hybrid clouds
    • Nepal S, Ranjan R, Choo K-KR. Trustworthy processing of healthcare big data in hybrid clouds. IEEE Cloud Computing 2015; 2(2):78–84.
    • (2015) IEEE Cloud Computing , vol.2 , Issue.2 , pp. 78-84
    • Nepal, S.1    Ranjan, R.2    Choo, K.-K.R.3
  • 14
    • 85002778113 scopus 로고    scopus 로고
    • Martini B, Do Q, Choo K-KR. Digital forensics in the cloud era: the decline of passwords and the need for legal reform. Trends & Issues in Crime and Criminal Justice 2016[In press].
  • 15
    • 84995549442 scopus 로고    scopus 로고
    • Leom MD, Choo K-KR, Hunt R. Remote wiping and secure deletion on mobile devices: a review. Journal of Forensic Sciences 2016[In press].
  • 18
    • 84881295724 scopus 로고    scopus 로고
    • Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform
    • Dykstra J, Sherman AT. Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform. digital Investigation 2013; 10:87–95. doi:10.1016/j.diin.2013.06.010.
    • (2013) digital Investigation , vol.10 , pp. 87-95
    • Dykstra, J.1    Sherman, A.T.2
  • 20
    • 85032428121 scopus 로고    scopus 로고
    • Quick D, Martini B, Choo K-KR. Cloud Storage Forensics, Syngress. an Imprint of Elsevier, Waltham: MA, 2014.
  • 22
    • 85013192181 scopus 로고    scopus 로고
    • Recovering residual forensic data from smartphone interactions with cloud storage providers
    • In, Ko R, Choo K-KR, (eds)., Syngress, an Imprint of Elsevier, WalthamMA
    • Grispos G, Glisson WB, Storer T. Recovering residual forensic data from smartphone interactions with cloud storage providers. In Cloud Security Ecosystem, Ko R, Choo K-KR (eds). Syngress, an Imprint of Elsevier: Waltham:MA, 2015; 347–382.
    • (2015) Cloud Security Ecosystem , pp. 347-382
    • Grispos, G.1    Glisson, W.B.2    Storer, T.3
  • 23
    • 85018181307 scopus 로고    scopus 로고
    • Mobile cloud forensics: an analysis of seven popular android apps
    • In, Ko R, Choo K-KR, (eds)., Syngress, an Imprint of Elsevier, WalthamMA
    • Martini B, Do Q, Choo K-KR. Mobile cloud forensics: an analysis of seven popular android apps. In Cloud Security Ecosystem, Ko R, Choo K-KR (eds). Syngress, an Imprint of Elsevier: Waltham:MA, 2015; 309–345.
    • (2015) Cloud Security Ecosystem , pp. 309-345
    • Martini, B.1    Do, Q.2    Choo, K.-K.R.3
  • 26
    • 85032090752 scopus 로고    scopus 로고
    • Cahyani N D W, Martini B, Choo K-K R. Effectiveness of multimedia presentations in improving understanding of technical terminologies and concepts: a pilot study. Australian Journal of Forensic Sciences [In press] DOI: 10.1080/00450618.2015.1128968
  • 27
    • 19844379355 scopus 로고    scopus 로고
    • A hierarchical, objectives-based framework for the digital investigations process
    • Beebe NL, Clark JG. A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation 2005; 2(2):147–167. doi:10.1016/j.diin.2005.04.002.
    • (2005) Digital Investigation , vol.2 , Issue.2 , pp. 147-167
    • Beebe, N.L.1    Clark, J.G.2
  • 28
    • 84904615617 scopus 로고    scopus 로고
    • A complete formalized knowledge representation model for advanced digital forensics timeline analysis
    • Chabot Y, Bertaux A, Nicolle C, Kechadi MT. A complete formalized knowledge representation model for advanced digital forensics timeline analysis. Digital Investigation 2014; 11:95–105. doi:10.1016/j.diin.2014.05.009.
    • (2014) Digital Investigation , vol.11 , pp. 95-105
    • Chabot, Y.1    Bertaux, A.2    Nicolle, C.3    Kechadi, M.T.4
  • 29
    • 84884589497 scopus 로고    scopus 로고
    • Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata?
    • Quick D, Choo K-KR. Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata? Digital Investigation 2013; 10(3):266–277. doi:10.1016/j.diin.2013.07.001.
    • (2013) Digital Investigation , vol.10 , Issue.3 , pp. 266-277
    • Quick, D.1    Choo, K.-K.R.2
  • 30
    • 85032428803 scopus 로고    scopus 로고
    • Amazon Web Services (AWS) Shared Responsibility Model. (Available from: https://aws.amazon.com/compliance/shared-responsibility-model/ [5 February 2016]).
  • 31
    • 84963615203 scopus 로고    scopus 로고
    • Ab Rahman NH, Choo K-KR. Factors influencing the adoption of cloud incident handling strategy: a preliminary study in Malaysia. Proceedings of 21st Americas Conference on Information Systems (AMCIS) 2015.
  • 32
    • 85032428204 scopus 로고    scopus 로고
    • The treacherous 12: cloud computing top threats in 2016. (Available from: https://downloads.cloudsecurityalliance.org/assets/research/top-threats/Treacherous-12_Cloud-Computing_Top-Threats.pdf / [31 March 2016].)
  • 33
    • 84957849367 scopus 로고    scopus 로고
    • Tor does not stink: use and abuse of the tor anonymity network from the perspective of law
    • Minárik T, Osula AM. Tor does not stink: use and abuse of the tor anonymity network from the perspective of law. Computer Law & Security Review 2016; 32(1):111–127. doi:10.1016/j.clsr.2015.12.002.
    • (2016) Computer Law & Security Review , vol.32 , Issue.1 , pp. 111-127
    • Minárik, T.1    Osula, A.M.2
  • 34
    • 84870254680 scopus 로고    scopus 로고
    • Digital forensic investigation of cloud storage services
    • Chung H, Park J, Lee S, Kang C. Digital forensic investigation of cloud storage services. Digital Investigation 2012; 9(2):81–95.
    • (2012) Digital Investigation , vol.9 , Issue.2 , pp. 81-95
    • Chung, H.1    Park, J.2    Lee, S.3    Kang, C.4
  • 36
    • 84957103995 scopus 로고    scopus 로고
    • Cloud computing reference architecture and its forensic implications : a preliminary analysis
    • In, Springer, Berlin Heidelberg
    • Ruan K, Carthy J. Cloud computing reference architecture and its forensic implications : a preliminary analysis. In Digital Forensics and Cyber Crime. Springer: Berlin Heidelberg, 2013; 1–21.
    • (2013) Digital Forensics and Cyber Crime , pp. 1-21
    • Ruan, K.1    Carthy, J.2
  • 37
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: ownCloud as a case study
    • Martini B, Choo K-KR. Cloud storage forensics: ownCloud as a case study. Digital Investigation 2013; 10(4):1–13.
    • (2013) Digital Investigation , vol.10 , Issue.4 , pp. 1-13
    • Martini, B.1    Choo, K.-K.R.2
  • 40
    • 84864596423 scopus 로고    scopus 로고
    • Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques
    • Dykstra J, Sherman AT. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digital Investigation 2012; 9:90–98.
    • (2012) Digital Investigation , vol.9 , pp. 90-98
    • Dykstra, J.1    Sherman, A.T.2
  • 42
    • 85032430449 scopus 로고    scopus 로고
    • Cahyani N D W, Martini B, Choo K-K R, Al-Azhar MH. Forensic data acquisition from cloud-of-things devices: Windows smartphones as a case study. Concurrency and Computation: Practice and Experience [In press]
  • 43
    • 84961817119 scopus 로고    scopus 로고
    • Quick D, Choo K-K R. Big forensic data reduction: digital forensic images and electronic evidence. Cluster Computing [In press]. DOI: 10.1007/s10586-016-0553-1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.