[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
Research trends, challenges, and emerging topics in digital forensics: A review of reviews
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …
researchers and practitioners alike. The ever increasing sophistication of modern …
Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges
For various reasons, the cloud computing paradigm is unable to meet certain requirements
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …
(eg low latency and jitter, context awareness, mobility support) that are crucial for several …
[HTML][HTML] A new model for forensic data extraction from encrypted mobile devices
In modern criminal investigations, mobile devices are seized at every type of crime scene,
and the data on those devices often becomes critical evidence in the case. Various mobile …
and the data on those devices often becomes critical evidence in the case. Various mobile …
[HTML][HTML] Availability of datasets for digital forensics–and what is missing
This paper targets two main goals. First, we want to provide an overview of available
datasets that can be used by researchers and where to find them. Second, we want to stress …
datasets that can be used by researchers and where to find them. Second, we want to stress …
Trust is good, control is better: Creating secure clouds by continuous auditing
Cloud service certifications (CSC) attempt to assure a high level of security and compliance.
However, considering that cloud services are part of an ever-changing environment, multi …
However, considering that cloud services are part of an ever-changing environment, multi …
A systematic survey on cloud forensics challenges, solutions, and future directions
The challenges of cloud forensics have been well-documented by both researchers and
government agencies (eg, US National Institute of Standards and Technology), although …
government agencies (eg, US National Institute of Standards and Technology), although …
BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem
K Awuson-David, T Al-Hadhrami, M Alazab… - Future Generation …, 2021 - Elsevier
Log files are the primary source of recording users, applications and protocols, activities in
the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when …
the cloud ecosystem. Cloud forensic investigators can use log evidence to ascertain when …
A survey on digital forensics in Internet of Things
J Hou, Y Li, J Yu, W Shi - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) is increasingly permeating peoples' lives, gradually revolutionizing
our way of life. Due to the tight connection between people and IoT, now civil and criminal …
our way of life. Due to the tight connection between people and IoT, now civil and criminal …
Security, cybercrime and digital forensics for IoT
Abstract The Internet of Things (IoT) connects almost all the environment objects whether
physical or virtual over the Internet to produce new digitized services that improve people's …
physical or virtual over the Internet to produce new digitized services that improve people's …