Investigation model for locating data remnants on cloud storage
Cloud storage services allow users to store their data online and remotely access, maintain, manage, and back up their data from anywhere through the Internet. Although this storage is helpful, it challenges digital forensic investigators and practitioners in collecting, identifying, acquiring, and...
| Main Authors: | Khalid, Abdulrahman, Ahmed, Abdulghani Ali, Mohammed, Muamer N. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
Springer Nature Switzerland
2019
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/24829/ http://umpir.ump.edu.my/id/eprint/24829/1/22.%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf http://umpir.ump.edu.my/id/eprint/24829/2/22.1%20Investigation%20Model%20for%20Locating%20Data%20Remnants%20on%20Cloud%20Storage.pdf |
Similar Items
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
by: Ahmed, Abdulghani Ali, et al.
Published: (2018)
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
by: Fahad, Ahmed Mohammed, et al.
Published: (2017)
Retrieving and identifying remnants of artefacts on local devices using Sync.com cloud
by: Ahmed, Abdulghani Ali, et al.
Published: (2024)
by: Ahmed, Abdulghani Ali, et al.
Published: (2024)
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Model of security level classification for data in hybrid cloud computing
by: Shakir, Mohanaad, et al.
Published: (2016)
by: Shakir, Mohanaad, et al.
Published: (2016)
Fault Tolerance Impact on Near Field Communication for Data Storage of Mobile Commerce Technology in Cloud Computing
by: Noraziah, Ahmad, et al.
Published: (2015)
by: Noraziah, Ahmad, et al.
Published: (2015)
Cloud based public bus location tracking and notification application for mobile devices
by: Chee, Xian Yang
Published: (2019)
by: Chee, Xian Yang
Published: (2019)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Cloud-to-cloud data transfer parallelization framework via spawning intermediate instances for scalable data migration
by: Boey, Calvin Mun Lek
Published: (2019)
by: Boey, Calvin Mun Lek
Published: (2019)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Dynamic remote data auditing for securing big data storage in cloud computing / Mehdi Sookhak
by: Sookhak, Mehdi
Published: (2015)
by: Sookhak, Mehdi
Published: (2015)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Managing big RDF data in clouds: challenges, opportunities, and solutions
by: Nahla, Mohammed Elzein, et al.
Published: (2018)
by: Nahla, Mohammed Elzein, et al.
Published: (2018)
An investigation on cloud computing adoption within information technology companies
by: Mohammadi, A., et al.
Published: (2021)
by: Mohammadi, A., et al.
Published: (2021)
Securing cloud data system (SCDS) for key exposure using AES algorithm
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
by: Thabet Albatol, Mohammed Samer Hasan
Published: (2021)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
An integrated model to evaluate the effects of cloud computing services on SMEs performance
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
by: Ruzaini, Abdullah Arshah, et al.
Published: (2018)
Dual Access Control for Cloud Storage and Sharing
by: Sandeep, T.S., et al.
Published: (2024)
by: Sandeep, T.S., et al.
Published: (2024)
An extended access control list for local network protection from insider attacks
by: Muamer N., Mohammed
Published: (2011)
by: Muamer N., Mohammed
Published: (2011)
An integrated model for continuance use of cloud computing services towards SMEs organizational performance
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
by: Al-Sharafi, Mohammed Abdullah Ali
Published: (2020)
Slicing-based enhanced method for privacy-preserving in publishing big data
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
SSM: Secure-Split-Merge data distribution in cloud infrastructure
by: Khan, Burhan ul Islam, et al.
Published: (2015)
by: Khan, Burhan ul Islam, et al.
Published: (2015)
MICIE: A model for identifying and collecting intrusion evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
A new scheduling technique to improve data management in cloud computing
by: Khan, Nawsher
Published: (2013)
by: Khan, Nawsher
Published: (2013)
Detection and avoidance technique of anomalous congestion at the network gateways
by: Ahmed, Abdulghani Ali
Published: (2018)
by: Ahmed, Abdulghani Ali
Published: (2018)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Secure Cloud Storage with a Sanitizable Access Control System Again Malicious Data Publisher
by: Alfiya Khanum, R.M., et al.
Published: (2024)
by: Alfiya Khanum, R.M., et al.
Published: (2024)
Determinants of Mobile Phone to Adopt Personal Cloud Online Data Service in Malaysia
by: Koon, Meng Kit
Published: (2017)
by: Koon, Meng Kit
Published: (2017)
A model for computing skyline data items in cloud incomplete databases
by: Gulzar, Yonis, et al.
Published: (2020)
by: Gulzar, Yonis, et al.
Published: (2020)
An open cloud-based platform for the creation and delivery of smart applications and services
by: Fadhil, Heba M., et al.
Published: (2020)
by: Fadhil, Heba M., et al.
Published: (2020)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Identifying skylines in cloud databases with incomplete data
by: Gulzar, Yonis, et al.
Published: (2019)
by: Gulzar, Yonis, et al.
Published: (2019)
BioHealthCloud: A Biometric Worldwide Public Cloud Infrastructure
by: M. A., Ameedeen, et al.
Published: (2014)
by: M. A., Ameedeen, et al.
Published: (2014)
Cloud-Based Enhanced Storage System Using Android Technology
by: Malathy, Batumalay, et al.
Published: (2021)
by: Malathy, Batumalay, et al.
Published: (2021)
Iot cloud simulation managing resources: an overview
by: Hamza, Nidal Abdelgadir Ahmed, et al.
Published: (2018)
by: Hamza, Nidal Abdelgadir Ahmed, et al.
Published: (2018)
Towards agent-based petri net decision making modelling for cloud service composition: A literature survey
by: Ahmed, Firas D., et al.
Published: (2019)
by: Ahmed, Firas D., et al.
Published: (2019)
Similar Items
-
Locating and collecting cybercrime evidences on cloud storage: review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017) -
Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
by: Ahmed, Abdulghani Ali, et al.
Published: (2018) -
The importance of monitoring cloud computing: An intensive review
by: Fahad, Ahmed Mohammed, et al.
Published: (2017) -
Retrieving and identifying remnants of artefacts on local devices using Sync.com cloud
by: Ahmed, Abdulghani Ali, et al.
Published: (2024) -
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018)