On cloud security requirements, threats, vulnerabilities and countermeasures: A survey

R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …

[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem

K Awuson-David, T Al-Hadhrami, M Alazab… - Future Generation …, 2021 - Elsevier
Log files are the primary source of recording users, applications and protocols, activities in
the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when …

A semi-automated forensic investigation model for online social networks

H Arshad, E Omlara, IO Abiodun, A Aminu - Computers & Security, 2020 - Elsevier
Investigating the online social network profiles of victims, suspects, and witnesses are now
part of almost every legal investigation, either it involves a criminal offense, financial fraud …

Machine learning for evidence in criminal proceedings: Techno-legal challenges for reliability assurance

R Stoykova, JM Bonnici, K Franke - Artificial Intelligence (AI) in …, 2023 - books.google.com
This chapter identifies one overarching problem which can significantly impact the
successful adoption of artificial intelligence (AI) in general, and machine learning in …

[HTML][HTML] A multi-layer semantic approach for digital forensics automation for online social networks

H Arshad, S Abdullah, M Alawida, A Alabdulatif… - Sensors, 2022 - mdpi.com
Currently, law enforcement and legal consultants are heavily utilizing social media platforms
to easily access data associated with the preparators of illegitimate events. However …

A forensic enabled data provenance model for public cloud

S Haque, T Atkison - Journal of Digital Forensics, Security and …, 2018 - commons.erau.edu
Cloud computing is a newly emerging technology where storage, computation and services
are extensively shared among a large number of users through virtualization and distributed …

[PDF][PDF] Providing tamper-resistant audit trails for cloud forensics with distributed ledger based solutions

M Neovius, J Karlsson, M Westerlund, G Pulkkis - Cloud Comput, 2018 - researchgate.net
Network and information security are often more challenging in cloud computing than in
onsite computing. Cloud computing resources are publicly accessible and thereby through …

[PDF][PDF] Providing tamper-resistant audit trails with distributed ledger based solutions for forensics of iot systems using cloud resources

M Westerlund, M Neovius, G Pulkkis - International Journal on …, 2018 - researchgate.net
Network and information security are often more challenging for current IoT systems than for
traditional networks. Cloud computing resources used by most IoT systems are publicly …

Cloud forensics: A centralized cloud provenance investigation system using MECC

S Nasreen, AH Mir - Concurrency and Computation: Practice …, 2024 - Wiley Online Library
As a new development in digital forensics, cloud forensics (CF) is being utilized to combat
cyber‐crimes. Nevertheless, the centralized compilation and preservation of evidence …