Towards the Development of a Cloud Forensics Methodology: A Conceptual Model

被引:2
作者
Simou, Stavros [1 ]
Kalloniatis, Christos [1 ]
Mouratidis, Haralambos [2 ]
Gritzalis, Stefanos [3 ]
机构
[1] Univ Aegean, Dept Cultural Technol & Commun, Cultural Informat Lab, Mitilini 81100, Greece
[2] Univ Brighton, Sch Comp Engn & Math, Brighton BN2 4GJ, E Sussex, England
[3] Univ Aegean, Informat & Commun Syst Secur Lab, Dept Informat & Commun Syst Engn, Samos 83200, Greece
来源
ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2015 | 2015年 / 215卷
关键词
Cloud forensics; Review; Cloud forensics process; Cloud forensics challenges; Cloud forensics solutions;
D O I
10.1007/978-3-319-19243-7_43
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud Computing technology and services despite the advantages they bring to the market have created number of issues regarding the security and trust of the individuals using them. Incidents occurring in cloud computing environments are hard to be solved since digital forensic methods used to conduct digital investigations are not suitable for cloud computing investigations since they do not consider the specific characteristics of the Cloud. However, designing services over the cloud that will support and assist an investigation process when an incident occurs is also of vital importance. This paper presents a conceptual model for supporting the development of a cloud forensics method and process, thus assisting information systems developers in building better services and investigators to be able to conduct forensics analysis in cloud environments.
引用
收藏
页码:470 / 481
页数:12
相关论文
共 26 条
[1]  
Adams R, 2013, CYBERCRIME AND CLOUD FORENSICS: APPLICATIONS FOR INVESTIGATION PROCESSES, P79, DOI 10.4018/978-1-4666-2662-1.ch004
[2]  
Al-Fedaghi S, 2012, INT J SECUR APPL, V6, P97
[3]  
[Anonymous], 2011, NIST SPECIAL PUBLICA
[4]  
[Anonymous], ARXIV13026312
[5]  
[Anonymous], 2004, Int. J. Dig. Evid., DOI DOI 10.1504/IJESDF.2010.033780.AVAILABLE
[6]  
[Anonymous], 2011, Advances in Digital Forensics, DOI DOI 10.1007/978-3-642-24212-0_3
[7]  
[Anonymous], 2003, International Journal of Digital Evidence
[8]  
Aydin M., 2013, 2013 INT C INF SCI T
[9]   A hierarchical, objectives-based framework for the digital investigations process [J].
Beebe, Nicole Lang ;
Clark, Jan Guynes .
DIGITAL INVESTIGATION, 2005, 2 (02) :147-167
[10]  
Cohen FB, 2010, HANDBOOK OF INFORMATION AND COMMUNICATION SECURITY, P789, DOI 10.1007/978-3-642-04117-4_36