2015 International Conference on Pervasive Computing (ICPC) 2015
DOI: 10.1109/pervasive.2015.7087206
|View full text |Cite
|
Sign up to set email alerts
|

An efficient approach to forensic investigation in cloud using VM snapshots

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 17 publications
0
19
0
Order By: Relevance
“…Several security approaches are taken into account to mitigate these kinds of threats and ensure protection to the resources of cloud so that it's potential can be exploited to the fullest. Cloud forensics [9][10][11][12] [ [15][16][17][18] is such an approach that attempts to investigate as well as analyze cloud security threats. It plays the role of a deterrent, improving security and reducing network crime rate.…”
Section: Cloud Forensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…Several security approaches are taken into account to mitigate these kinds of threats and ensure protection to the resources of cloud so that it's potential can be exploited to the fullest. Cloud forensics [9][10][11][12] [ [15][16][17][18] is such an approach that attempts to investigate as well as analyze cloud security threats. It plays the role of a deterrent, improving security and reducing network crime rate.…”
Section: Cloud Forensicsmentioning
confidence: 99%
“…Another framework proposed by [18] where the authors emphasized on the admissibility of the evidences. They also mentioned that the efficacy of the evidences must also be guaranteed for ensuring their acceptance in litigation.…”
Section: Related Frameworkmentioning
confidence: 99%
“…Computer Forensics is the science of identifying, extracting preserving, and presenting the digital evidence stored in digital devices that can be legally admissible in court for any cybercrime or fraudulent [6]. In other words, finding out facts, records, and digital trails can be legally admissible in the court for criminal prosecution [7].…”
Section: Computer Forensicsmentioning
confidence: 99%
“…In cloud computing environment several challenges may exist in cloud computing forensics. Cloud Service Pro-vider is an entity that provides services to its clients including infrastructure, OS licensing, application interfaces, data storage, processing power, backups and other necessary supporting tools for cloud computing [6]. Cloud Computing supports the virtualization where hardware and configurations are provided as per requirement of the client and its budget.…”
Section: Cloud Service Provider (Csp)mentioning
confidence: 99%
See 1 more Smart Citation