2022
DOI: 10.1016/j.jksuci.2022.10.018
|View full text |Cite
|
Sign up to set email alerts
|

Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 30 publications
(16 citation statements)
references
References 149 publications
0
16
0
Order By: Relevance
“…Provenance models are widely adopted in various research areas as the data representation model for build assessments about data reliability and quality [ 39 , 40 , 41 , 42 ]. However, because the existing provenance models focus on data or are specialized for specific domains, it is difficult to apply them to other domains that were not initially targeted [ 43 , 44 , 45 ]. Therefore, in this research, we define a provenance meta-model, which is a general model that can be adapted for a specific target domain.…”
Section: Proposed Approachmentioning
confidence: 99%
“…Provenance models are widely adopted in various research areas as the data representation model for build assessments about data reliability and quality [ 39 , 40 , 41 , 42 ]. However, because the existing provenance models focus on data or are specialized for specific domains, it is difficult to apply them to other domains that were not initially targeted [ 43 , 44 , 45 ]. Therefore, in this research, we define a provenance meta-model, which is a general model that can be adapted for a specific target domain.…”
Section: Proposed Approachmentioning
confidence: 99%
“…Creating and testing a customized incident response plan that is adapted to the specifics of cloud environments is crucial in order to address this [74], [75]. Close cooperation with the cloud provider is essential to a smooth incident investigation and resolution process, guaranteeing a planned and efficient method for managing security breaches and reducing possible harm [76], [77].…”
Section: Figure 7 Cloud Incident Response and Forensicsmentioning
confidence: 99%
“…The procedures for proving the absence of vulnerabilities in software applications is a challenging task since it is nearly impossible to guarantee complete absence [176]. However, there are several techniques and practices that can help increase confidence in the security of a system.…”
Section: Techniques To Prove the Absence Of Vulnerabilitiesmentioning
confidence: 99%