2014 IEEE International Advance Computing Conference (IACC) 2014
DOI: 10.1109/iadcc.2014.6779543
|View full text |Cite
|
Sign up to set email alerts
|

Digital forensics investigations in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(19 citation statements)
references
References 11 publications
0
19
0
Order By: Relevance
“…The framework was used to investigate ownCloud [50], Amazon EC2 [51], VMWare [32], and XtreemFS [52]. Quick et al [24] further extended and validated the four-stage framework using SkyDrive, Dropbox, Google Drive, and ownCloud.…”
Section: Related Workmentioning
confidence: 99%
“…The framework was used to investigate ownCloud [50], Amazon EC2 [51], VMWare [32], and XtreemFS [52]. Quick et al [24] further extended and validated the four-stage framework using SkyDrive, Dropbox, Google Drive, and ownCloud.…”
Section: Related Workmentioning
confidence: 99%
“…This forensic clustering resolution reduces the search space, permits multi drive correlation and methods a social network of virtual machine instances. N. Thethi and A. Keane [5] address problem by responsible the relationship among acquisition times on the dissimilar storage capacities, expending remote acquisition to get data from virtual machines in the cloud. A hypothetical case study is used to examine the significance of using a partial and full technique for acquisition of data from the cloud and to regulate how every technique affects the duration and accuracy of the forensics investigation and consequence.…”
Section: IImentioning
confidence: 99%
“…Martini and Choo 51 proposed the first cloud forensic investigation framework, which was derived based upon the frameworks of McKemmish 52 and NIST. 49 The framework was used to investigate ownCloud, 53 Amazon EC2, 18 VMWare, 54 and XtreemFS. 55 63 proposed a proactive application-level logging mechanism designed to log information of forensics interest.…”
Section: Andmentioning
confidence: 99%