A systematic survey on cloud forensics challenges, solutions, and future directions

B Manral, G Somani, KKR Choo, M Conti… - ACM Computing …, 2019 - dl.acm.org
The challenges of cloud forensics have been well-documented by both researchers and
government agencies (eg, US National Institute of Standards and Technology), although …

A survey on cloud forensics challenges and solutions

S Simou, C Kalloniatis, S Gritzalis… - Security and …, 2016 - Wiley Online Library
In recent years, cloud computing has gained popularity, and it is now used to support
various areas of human life. Cloud forensics has been introduced to help forensic …

Blockchain access control ecosystem for big data security

UU Uchibeke, KA Schneider… - … on Internet of Things …, 2018 - ieeexplore.ieee.org
In recent years, the advancement in modern technologies has not only resulted in an
explosion of huge data sets being captured and recorded in different fields, but also given …

[HTML][HTML] Geometrical and topological approaches to Big Data

V Snášel, J Nowaková, F Xhafa, L Barolli - Future Generation Computer …, 2017 - Elsevier
Modern data science uses topological methods to find the structural features of data sets
before further supervised or unsupervised analysis. Geometry and topology are very natural …

Cloud and edge computing-based computer forensics: Challenges and open problems

V Prakash, A Williams, L Garg, C Savaglio, S Bawa - Electronics, 2021 - mdpi.com
In recent years, there has been a dramatic change in attitude towards computers and the
use of computer resources in general. Cloud and Edge computing have emerged as the …

Cloud forensics: a review of challenges, solutions and open problems

S Alqahtany, N Clarke, S Furnell… - … conference on cloud …, 2015 - ieeexplore.ieee.org
Cloud computing is a promising next generation computing paradigm which offers
significant economic benefits to both commercial and public entities. Due to the unique …

[PDF][PDF] Web data amalgamation for security engineering: Digital forensic investigation of open source cloud.

A Imran, SA Aljawarneh, K Sakib - J. Univers. Comput. Sci., 2016 - researchgate.net
The largely distributed nature and growing demand for open source Cloud makes the
infrastructure an ideal target for malicious attacks that grants unauthorized access to its data …

Security-aware provenance for transparency in iot data propagation

FT Jaigirdar, B Tan, C Rudolph, C Bain - IEEE Access, 2023 - ieeexplore.ieee.org
A successful application of an Internet of Things (IoT) based network depends on the
accurate and successful delivery of data collected from numerous sources. A significant …

Attribute-based cloud storage with secure provenance over encrypted data

H Cui, RH Deng, Y Li - Future Generation Computer Systems, 2018 - Elsevier
To securely and conveniently enjoy the benefits of cloud storage, it is desirable to design a
cloud data storage system which protects data privacy from storage servers through …

A forensic acquisition and analysis system for IaaS

S Alqahtany, N Clarke, S Furnell, C Reich - Cluster Computing, 2016 - Springer
Cloud computing is a promising next-generation computing paradigm that offers significant
economic benefits to both commercial and public entities. Furthermore, cloud computing …