2019
DOI: 10.1186/s13677-019-0133-z
|View full text |Cite
|
Sign up to set email alerts
|

Experts reviews of a cloud forensic readiness framework for organizations

Abstract: Cloud computing has drastically altered the ways in which it is possible to deliver information technologies (ITs) to consumers as a service. In addition, the concept has given rise to multiple benefits for consumers and organizations. However, such a fast surge in the adoption of cloud computing has led to the emergence of the cloud as a new cybercrime environment, thus giving rise to fresh legal, technical and organizational challenges. In addition to the vast number of attacks that have had an impact on clo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 32 publications
(34 reference statements)
0
16
0
Order By: Relevance
“…CSP and client/investigator trust relationships are required at the highest level so that CSPs can provide specific information on request [51]. The authors of [52][53][54][55][56] have discussed using multiple layers of trust to allow customers and investigators to gather evidence, including VM images, network logs, processes and information. Both of these solutions seek to address the lack of transparency between CSPs and clients, which is why they build a relationship of trust.…”
Section: The Trust Model and Trust Cloudmentioning
confidence: 99%
See 3 more Smart Citations
“…CSP and client/investigator trust relationships are required at the highest level so that CSPs can provide specific information on request [51]. The authors of [52][53][54][55][56] have discussed using multiple layers of trust to allow customers and investigators to gather evidence, including VM images, network logs, processes and information. Both of these solutions seek to address the lack of transparency between CSPs and clients, which is why they build a relationship of trust.…”
Section: The Trust Model and Trust Cloudmentioning
confidence: 99%
“…Both of these solutions seek to address the lack of transparency between CSPs and clients, which is why they build a relationship of trust. However, as the authors of [51] point out, the level of dependence on the control aircraft is essential for the reliability model [53,54]. These solutions are also targeted at IaaS and PaaS models and cannot be successfully implemented in the SaaS model.…”
Section: The Trust Model and Trust Cloudmentioning
confidence: 99%
See 2 more Smart Citations
“…While it is important to acknowledge that these models have offered very significant insights towards the development of IIRM, we put across one core advantage that IIRM holds. IIRM is able to cover pre-incident preparation that has explicitly been presented at a readiness phase [3], this phase not only is able to shorten the process of conducting an investigation in databases but also it saves time due to the availability of forensic evidence when needed [52][53]. As far as IIRM is concerned this would be executed by implementing security policies as was mentioned and highlighted previously in Figure 3.…”
Section: Recovering Database Operationsmentioning
confidence: 99%