2015 10th International Conference on Availability, Reliability and Security 2015
DOI: 10.1109/ares.2015.54
|View full text |Cite
|
Sign up to set email alerts
|

Challenges of Data Provenance for Cloud Forensic Investigations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 30 publications
0
8
0
Order By: Relevance
“…It also includes information of the nodes responsible for retransmitting information through intermediaries. In [24] a method was developed that integrate provenance data on two levels; a low-level through information cascades, and a high-level through similaritybased clustering.…”
Section: A Social Mediamentioning
confidence: 99%
“…It also includes information of the nodes responsible for retransmitting information through intermediaries. In [24] a method was developed that integrate provenance data on two levels; a low-level through information cascades, and a high-level through similaritybased clustering.…”
Section: A Social Mediamentioning
confidence: 99%
“…Only methods and techniques that can establish data provenance and describe the automatically generated results using a logically explainable theory are accepted [ 9 , 10 ]. Several data mining techniques lose provenance information while pre-processing and normalizing the data [ 11 , 12 ] As a result, most methods for analyzing social media using data mining techniques are not approved for legal or forensic use because they tend to lose provenance during data pre-processing and processing [ 13 , 14 , 15 , 16 , 17 , 18 ].…”
Section: Introductionmentioning
confidence: 99%
“…The popularity of the cloud is associated with its effectiveness and robustness [5] However, the control of data, monitoring and a trusted to CSPs and cloud service administrators. According to the National Institute of Standards and Technology, NIST, defines it as "a model for enabling ubiquitous, convenient, on demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction" [6].…”
Section: Cloud Computingmentioning
confidence: 99%
“…Based on experiments conducted using objects {A,B} and {A,C}, {D,E}, {F,G}, {F,H} the solution converges to different figures when [1,2], [2,3], [2,4], [2,5], [2,6] root interval are used. Table 3 shows the convergence and functional values of the experiments …”
Section: Data Sets For Conducted Experimentsmentioning
confidence: 99%
See 1 more Smart Citation