TY - STD TI - Group, (2014) N.C.C.F.S.W., NIST Cloud Computing Forensic Science Challenges (Draft NISTIR 8006) ID - ref1 ER - TY - STD TI - Moussa, A.N., N. Binti Ithnin, and O.A. Miaikil (2014) Conceptual forensic readiness framework for infrastructure as a service consumers. In Systems, Process and Control (ICSPC), 2014 IEEE Conference on. IEEE ID - ref2 ER - TY - JOUR AU - Hay, B. AU - Nance, K. PY - 2008 DA - 2008// TI - Forensics examination of volatile system data using virtual introspection JO - ACM SIGOPS Operating Systems Review VL - 42 UR - https://doi.org/10.1145/1368506.1368517 DO - 10.1145/1368506.1368517 ID - Hay2008 ER - TY - STD TI - Birk, D. and C. Wegener (2011) Technical issues of forensic investigations in cloud computing environments. In Systematic Approaches to Digital Forensic Engineering (SADFE), 2011 IEEE Sixth International Workshop on. IEEE ID - ref4 ER - TY - JOUR AU - Dykstra, J. AU - Sherman, A. T. PY - 2012 DA - 2012// TI - Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques JO - Digit Investig VL - 9 UR - https://doi.org/10.1016/j.diin.2012.05.001 DO - 10.1016/j.diin.2012.05.001 ID - Dykstra2012 ER - TY - JOUR AU - Zawoad, S. AU - Hasan, R. PY - 2013 DA - 2013// TI - Cloud forensics: a meta-study of challenges, approaches, and open problems JO - arXiv preprint arXiv VL - 1302 ID - Zawoad2013 ER - TY - JOUR AU - Zawoad, S. AU - Hasan, R. AU - Grimes, J. PY - 2015 DA - 2015// TI - LINCS: towards building a trustworthy litigation hold enabled cloud storage system JO - Digit Investig VL - 14 UR - https://doi.org/10.1016/j.diin.2015.05.014 DO - 10.1016/j.diin.2015.05.014 ID - Zawoad2015 ER - TY - JOUR AU - Ruan, K. PY - 2013 DA - 2013// TI - Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results JO - Digit Investig VL - 10 UR - https://doi.org/10.1016/j.diin.2013.02.004 DO - 10.1016/j.diin.2013.02.004 ID - Ruan2013 ER - TY - STD TI - Gebhardt T, Reiser HP (2013) Network Forensics for Cloud Computing. In Distributed Applications and Interoperable Systems. Spring ID - ref9 ER - TY - JOUR AU - Pichan, A. AU - Lazarescu, M. AU - Soh, S. T. PY - 2015 DA - 2015// TI - Cloud forensics: technical challenges, solutions and comparative analysis JO - Digit Investig VL - 13 UR - https://doi.org/10.1016/j.diin.2015.03.002 DO - 10.1016/j.diin.2015.03.002 ID - Pichan2015 ER - TY - STD TI - Alqahtany S et al (2015) A forensic acquisition and analysis system for IaaS. Clust Comput:1–15 ID - ref11 ER - TY - STD TI - Damshenas, M., et al (2012) Forensics investigation challenges in cloud computing environments. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. IEEE ID - ref12 ER - TY - STD TI - Ruan K, et al (2011), Cloud forensics, in Advances in digital forensics VII, Springer, Dordrecht. p. 35–46 ID - ref13 ER - TY - STD TI - Hay, B., K. Nance, and M. Bishop (2011) Storm clouds rising: security challenges for IaaS cloud computing. In System Sciences (HICSS), 2011 44th Hawaii International Conference on. IEEE ID - ref14 ER - TY - STD TI - Guo, H., B. Jin, and T. Shang (2011) Forensic investigations in cloud environments. In Computer Science and Information Processing (CSIP), 2012 International Conference on. IEEE ID - ref15 ER - TY - JOUR AU - Roussev, V. AU - Quates, C. AU - Martell, R. PY - 2013 DA - 2013// TI - Real-time digital forensics and triage JO - Digit Investig VL - 10 UR - https://doi.org/10.1016/j.diin.2013.02.001 DO - 10.1016/j.diin.2013.02.001 ID - Roussev2013 ER - TY - JOUR AU - Kohn, M. D. AU - Eloff, M. M. AU - Eloff, J. H. PY - 2013 DA - 2013// TI - Integrated digital forensic process model JO - Computers & Security VL - 38 UR - https://doi.org/10.1016/j.cose.2013.05.001 DO - 10.1016/j.cose.2013.05.001 ID - Kohn2013 ER - TY - JOUR AU - Reith, M. AU - Carr, C. AU - Gunsch, G. PY - 2002 DA - 2002// TI - An examination of digital forensic models JO - International Journal of Digital Evidence VL - 1 ID - Reith2002 ER - TY - STD TI - Palmer, G (2001) A road map for digital forensic research. in First Digital Forensic Research Workshop, Utica, New York. ID - ref19 ER - TY - JOUR AU - Carrier, B. AU - Spafford, E. H. PY - 2003 DA - 2003// TI - Getting physical with the digital investigation process JO - International Journal of digital evidence VL - 2 ID - Carrier2003 ER - TY - STD TI - Baryamureeba, V. and F. Tushabe (2004) The enhanced digital investigation process model. In Proceedings of the Fourth Digital Forensic Research Workshop. Citeseer ID - ref21 ER - TY - JOUR AU - Beebe, N. L. AU - Clark, J. G. PY - 2005 DA - 2005// TI - A hierarchical, objectives-based framework for the digital investigations process JO - Digit Investig VL - 2 UR - https://doi.org/10.1016/j.diin.2005.04.002 DO - 10.1016/j.diin.2005.04.002 ID - Beebe2005 ER - TY - STD TI - Kent K et al (2006) Guide to integrating forensic techniques into incident response. NIST Special Publication:800–886 ID - ref23 ER - TY - JOUR AU - Selamat, S. R. AU - Yusof, R. AU - Sahib, S. PY - 2008 DA - 2008// TI - Mapping process of digital forensic investigation framework JO - International Journal of Computer Science and Network Security VL - 8 ID - Selamat2008 ER - TY - STD TI - Cohen FB (2010) Fundamentals of digital forensic evidence. In: Handbook of Information and Communication Security. Springer, Dordrecht, pp 789–808 ID - ref25 ER - TY - STD TI - Valjarevic, A. and H.S. Venter (2012) Harmonised digital forensic investigation process model. in Information Security for South Africa (ISSA), 2012. IEEE ID - ref26 ER - TY - JOUR AU - Martini, B. AU - Choo, K. -. K. R. PY - 2012 DA - 2012// TI - An integrated conceptual digital forensic framework for cloud computing JO - Digit Investig VL - 9 UR - https://doi.org/10.1016/j.diin.2012.07.001 DO - 10.1016/j.diin.2012.07.001 ID - Martini2012 ER - TY - STD TI - Quick D, Martini B, Choo R (2013) Cloud storage forensics. Syngress, Waltham ID - ref28 ER - TY - STD TI - Zawoad, S., R. Hasan, and A. Skjellum (2015) OCF: An Open Cloud Forensics Model for Reliable Digital Forensics. In Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on.IEEE ID - ref29 ER - TY - STD TI - Ferguson-Boucher, K. and B (2012) Endicott-Popovsky, Forensic Readiness in the Cloud (FRC): Integrating Records Management Cybercrime and Cloud Forensics: Applications for Investigation Processes: Applications for Investigation Processes, p. 105 ID - ref30 ER - TY - JOUR AU - Endicott-Popovsky, B. AU - Frincke, D. A. AU - Taylor, C. A. PY - 2007 DA - 2007// TI - A theoretical framework for organizational network forensic readiness JO - Journal of Computers VL - 2 UR - https://doi.org/10.4304/jcp.2.3.1-11 DO - 10.4304/jcp.2.3.1-11 ID - Endicott-Popovsky2007 ER - TY - STD TI - Sibiya, G., et al (2013) Digital forensic readiness in a cloud environment. in AFRICON, 2013. IEEE ID - ref32 ER - TY - STD TI - Trenwith, P.M. and H.S. Venter (2013) Digital forensic readiness in the cloud. in Information Security for South Africa, 2013. IEEE ID - ref33 ER - TY - BOOK AU - De Marco, L. AU - Ferrucci, F. AU - Kechadi, T. PY - 2014 DA - 2014// TI - Reference architecture for a cloud forensic readiness system ID - De Marco2014 ER - TY - STD TI - De Marco, L., et al (2014) Formalization of SLAs for Cloud Forensic Readiness. in Proc. ICCSM Conference. ID - ref35 ER - TY - STD TI - Makutsoane, M.P. and A. Leonard (2014) A conceptual framework to determine the digital forensic readiness of a Cloud Service Provider. In Management of Engineering & Technology (PICMET), 2014 Portland International Conference on. IEEE ID - ref36 ER - TY - JOUR AU - Federici, C. PY - 2014 DA - 2014// TI - Cloud data imager: a unified answer to remote acquisition of cloud storage areas JO - Digit Investig VL - 11 UR - https://doi.org/10.1016/j.diin.2014.02.002 DO - 10.1016/j.diin.2014.02.002 ID - Federici2014 ER - TY - JOUR AU - Oestreicher, K. PY - 2014 DA - 2014// TI - A forensically robust method for acquisition of iCloud data JO - Digit Investig VL - 11 UR - https://doi.org/10.1016/j.diin.2014.05.006 DO - 10.1016/j.diin.2014.05.006 ID - Oestreicher2014 ER - TY - BOOK AU - Cahyani, N. D. W. PY - 2016 DA - 2016// TI - Forensic data acquisition from cloud-of-things devices: windows smartphones as a case study PB - Concurrency and Computation CY - Practice and Experience ID - Cahyani2016 ER - TY - STD TI - Anwar, F. and Z. Anwar (2011) Digital forensics for eucalyptus. in Frontiers of Information Technology (FIT), 2011. IEEE ID - ref40 ER - TY - STD TI - Marturana, F., G. Me, and S. Tacconi (2012) A case study on digital forensics in the cloud. In Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on. IEEE ID - ref41 ER - TY - JOUR AU - Hale, J. S. PY - 2013 DA - 2013// TI - Amazon cloud drive forensic analysis JO - Digit Investig VL - 10 UR - https://doi.org/10.1016/j.diin.2013.04.006 DO - 10.1016/j.diin.2013.04.006 ID - Hale2013 ER - TY - JOUR AU - Quick, D. AU - Choo, K. -. K. R. PY - 2013 DA - 2013// TI - Dropbox analysis: data remnants on user machines JO - Digit Investig VL - 10 UR - https://doi.org/10.1016/j.diin.2013.02.003 DO - 10.1016/j.diin.2013.02.003 ID - Quick2013 ER - TY - JOUR AU - Quick, D. AU - Choo, K. -. K. R. PY - 2013 DA - 2013// TI - Digital droplets: Microsoft SkyDrive forensic data remnants JO - Futur Gener Comput Syst VL - 29 UR - https://doi.org/10.1016/j.future.2013.02.001 DO - 10.1016/j.future.2013.02.001 ID - Quick2013 ER - TY - JOUR AU - Quick, D. AU - Choo, K. -. K. R. PY - 2014 DA - 2014// TI - Google drive: forensic analysis of data remnants JO - J Netw Comput Appl VL - 40 UR - https://doi.org/10.1016/j.jnca.2013.09.016 DO - 10.1016/j.jnca.2013.09.016 ID - Quick2014 ER - TY - BOOK AU - Shariati, M. PY - 2015 DA - 2015// TI - Ubuntu one investigation: detecting evidences on client machines UR - https://doi.org/10.1016/B978-0-12-801595-7.00019-7 DO - 10.1016/B978-0-12-801595-7.00019-7 ID - Shariati2015 ER - TY - JOUR AU - Cho, C. AU - Chin, S. AU - Chung, K. S. PY - 2012 DA - 2012// TI - Cyber forensic for hadoop based cloud system JO - International Journal of Security and its Applications VL - 6 ID - Cho2012 ER - TY - JOUR AU - Chung, H. PY - 2012 DA - 2012// TI - Digital forensic investigation of cloud storage services JO - Digit Investig VL - 9 UR - https://doi.org/10.1016/j.diin.2012.05.015 DO - 10.1016/j.diin.2012.05.015 ID - Chung2012 ER - TY - STD TI - Spyridopoulos, T. and V. Katos (2012) Data Recovery Strategies for Cloud Environments Cybercrime and Cloud Forensics: Applications for Investigation Processes: Applications for Investigation Processes,: p. 251 ID - ref49 ER - TY - JOUR AU - Martini, B. AU - Choo, K. -. K. R. PY - 2013 DA - 2013// TI - Cloud storage forensics: own cloud as a case study JO - Digit Investig VL - 10 UR - https://doi.org/10.1016/j.diin.2013.08.005 DO - 10.1016/j.diin.2013.08.005 ID - Martini2013 ER - TY - JOUR AU - Martini, B. AU - Choo, K. -. K. R. PY - 2014 DA - 2014// TI - Distributed filesystem forensics: XtreemFS as a case study JO - Digit Investig VL - 11 UR - https://doi.org/10.1016/j.diin.2014.08.002 DO - 10.1016/j.diin.2014.08.002 ID - Martini2014 ER - TY - STD TI - Thethi, N. and A. Keane. Digital forensics investigations in the cloud. In Advance Computing Conference (IACC), 2014 IEEE International. 2014. IEEE ID - ref52 ER - TY - STD TI - Daryabar F, Dehghantanha A, Choo K-KR (2016) Cloud storage forensics: MEGA as a case study. Australian Journal of Forensic Sciences:1–14 ID - ref53 ER - TY - STD TI - Martini, B. and K.-K.R. Choo. Remote programmatic vCloud forensics: a six-step collection process and a proof of concept. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on. 2014. IEEE ID - ref54 ER - TY - STD TI - McKemmish, R., What is forensic computing? 1999: Australian Institute of Criminology Canberra ID - ref55 ER - TY - STD TI - Povar D, Geethakumari G (2014) A Heuristic Model for Performing Digital Forensics in Cloud Computing Environment, in Security in Computing and Communications. Springer, Dordrecht, pp 341–352 ID - ref56 ER - TY - JOUR AU - Ab Rahman, N. H. AU - Choo, K. -. K. R. PY - 2015 DA - 2015// TI - A survey of information security incident handling in the cloud JO - Computers & Security VL - 49 UR - https://doi.org/10.1016/j.cose.2014.11.006 DO - 10.1016/j.cose.2014.11.006 ID - Ab Rahman2015 ER - TY - STD TI - Ab Rahman N, Choo K (2015) Integrating digital forensic practices in cloud incident handling: A conceptual cloud incident handling model. Cloud Security EcosystemR ID - ref58 ER - TY - STD TI - Ab Rahman, N.H., N.D.W. Cahyani, and K.K.R. Choo (2016) Cloud incident handling and forensic-by-design: cloud storage as a case study. Concurrency and Computation: Practice and Experience ID - ref59 ER - TY - JOUR AU - Ab Rahman, N. H. PY - 2016 DA - 2016// TI - Forensic-by-design framework for cyber-physical cloud systems JO - IEEE Cloud Computing VL - 3 UR - https://doi.org/10.1109/MCC.2016.5 DO - 10.1109/MCC.2016.5 ID - Ab Rahman2016 ER - TY - STD TI - Simou, S., et al (2015) Towards the Development of a Cloud Forensics Methodology: A Conceptual Model. In Advanced Information Systems Engineering Workshops. Spring ID - ref61 ER - TY - STD TI - Yan, C (2011) Cybercrime forensic system in cloud computing. In Image Analysis and Signal Processing (IASP), 2011 International Conference on. IEEE ID - ref62 ER - TY - STD TI - Delport, W., M. Köhn, and M.S (2011) Olivier. Isolating a cloud instance for a digital forensic investigation. in ISSA. ID - ref63 ER - TY - STD TI - Marty, R (2011) Cloud application logging for forensics. In Proceedings of the 2011 ACM Symposium on Applied Computing. ACM ID - ref64 ER - TY - JOUR AU - Dykstra, J. AU - Sherman, A. T. PY - 2013 DA - 2013// TI - Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform JO - Digit Investig VL - 10 UR - https://doi.org/10.1016/j.diin.2013.06.010 DO - 10.1016/j.diin.2013.06.010 ID - Dykstra2013 ER - TY - STD TI - Zawoad, S., A.K. Dutta, and R. Hasan (2013) SecLaaS: secure logging-as-a-service for cloud forensics. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. ACM ID - ref66 ER - TY - JOUR AU - Patrascu, A. AU - Patriciu, V. -. V. PY - 2015 DA - 2015// TI - Logging for cloud computing forensic systems JO - International Journal of Computers Communications & Control VL - 10 UR - https://doi.org/10.15837/ijccc.2015.2.802 DO - 10.15837/ijccc.2015.2.802 ID - Patrascu2015 ER - TY - STD TI - Molina-Jimenez, C., N. Cook, and S. Shrivastava (2008) On the feasibility of bilaterally agreed accounting of resource consumption. In Service-Oriented Computing–ICSOC 2008 Workshops. Spring ID - ref68 ER - TY - STD TI - Van Oorschot PC (2003) Revisiting software protection, in Information Security. Springer, Dordrecht, pp 1–13 ID - ref69 ER - TY - STD TI - Adolph M, Sutherland E, Levin A (2009) Distributed computing: utilities, grids & clouds. International Telecommunication Union-Technology Watch Report 9 ID - ref70 ER - TY - STD TI - Cook, N., S. Shrivastava, and S. Wheater (2002) Distributed object middleware to support dependable information sharing between organisations. In Dependable Systems and Networks, 2002. DSN 2002. Proceedings. International Conference on. IEEE ID - ref71 ER - TY - STD TI - Robinson, P., N. Cook, and S. Shrivastava (2005) Implementing fair non-repudiable interactions with web services. In EDOC Enterprise Computing Conference, 2005 Ninth IEEE International. IEEE ID - ref72 ER - TY - JOUR AU - Cook, N. AU - Robinson, P. AU - Shrivastava, S. K. PY - 2006 DA - 2006// TI - Design and implementation of web services middleware to support fair non-repudiable interactions JO - International Journal of Cooperative Information Systems VL - 15 UR - https://doi.org/10.1142/S0218843006001499 DO - 10.1142/S0218843006001499 ID - Cook2006 ER -