Forensics investigation challenges in cloud computing environments
Cloud computing discusses about sharing any imaginable entity such as process units, storage devices or software. The provided service is utterly economical and expandable. Cloud computing attractive benefits entice huge interest of both business owners and cyber thefts. Consequently, the “computer...
| Main Authors: | Damshenas, Mohsen, Dehghantanha, Ali, Mahmod, Ramlan, Shamsuddin, Solahuddin |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/69135/ http://psasir.upm.edu.my/id/eprint/69135/1/Forensics%20investigation%20challenges%20in%20cloud%20computing%20environments.pdf |
Similar Items
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
An approach for forensic investigation in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Digital Forensics Investigation Frameworks for Cloud
Computing and Internet of Things
by: Pichan, Ameer
Published: (2022)
by: Pichan, Ameer
Published: (2022)
Cloud forensic: Technical challenges, solutions and comparative analysis
by: Pichan, A., et al.
Published: (2015)
by: Pichan, A., et al.
Published: (2015)
Advances in computer forensics
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
by: Abdullah @ Selimun, Mohd Taufik, et al.
Published: (2008)
Advances of mobile forensic procedures in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study
by: Teing, Yee Yang, et al.
Published: (2017)
by: Teing, Yee Yang, et al.
Published: (2017)
An efficient computer forensics selective imaging model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Greening cloud-enabled big data storage forensics: syncany as a case study
by: Teing, Yee-Yang, et al.
Published: (2019)
by: Teing, Yee-Yang, et al.
Published: (2019)
Cloud computing: issues and challenges
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
Investigating computer forensic tools and their searching technique
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
An ordered selective imaging and distributed analysis computer forensics model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
TC-enabled and distributed cloud computing access control model
by: Halboob, Waleed, et al.
Published: (2014)
by: Halboob, Waleed, et al.
Published: (2014)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
Disaster recovery in single-cloud and multi-cloud
environments: Issues and challenges
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
by: Alshammari, Mohammad Matar, et al.
Published: (2018)
An analysis method of forensic investigation for platform-as-a-service cloud storage services
by: Shaerpour, Kaveh
Published: (2016)
by: Shaerpour, Kaveh
Published: (2016)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
E-learning-based cloud computing environment : A systematic review, challenges, and opportunities
by: Eljak, Hana, et al.
Published: (2024)
by: Eljak, Hana, et al.
Published: (2024)
Cloud Computing Delivery and Delivery Models: Opportunity and Challenges
by: Alajmi, Qasim, et al.
Published: (2018)
by: Alajmi, Qasim, et al.
Published: (2018)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
Big Data Processing in Cloud Computing Environments
by: Noraziah, Ahmad, et al.
Published: (2017)
by: Noraziah, Ahmad, et al.
Published: (2017)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
Towards a practical cloud forensics logging framework
by: Pichan, A., et al.
Published: (2018)
by: Pichan, A., et al.
Published: (2018)
Cloud computing issues, challenges, and needs: A survey
by: Aljanabi, Mohammad, et al.
Published: (2021)
by: Aljanabi, Mohammad, et al.
Published: (2021)
A behaviour-based analytical malware detection framework for android smartphones
by: Damshenas, Mohsen
Published: (2014)
by: Damshenas, Mohsen
Published: (2014)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Similar Items
-
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013) -
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014) -
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013) -
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013) -
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)