Abstract
Cloud log forensics (CLF) mitigates the investigation process by identifying the malicious behavior of attackers through profound cloud log analysis. However, the accessibility attributes of cloud logs obstruct accomplishment of the goal to investigate cloud logs for various susceptibilities. Accessibility involves the issues of cloud log access, selection of proper cloud log file, cloud log data integrity, and trustworthiness of cloud logs. Therefore, forensic investigators of cloud log files are dependent on cloud service providers (CSPs) to get access of different cloud logs. Accessing cloud logs from outside the cloud without depending on the CSP is a challenging research area, whereas the increase in cloud attacks has increased the need for CLF to investigate the malicious activities of attackers. This paper reviews the state of the art of CLF and highlights different challenges and issues involved in investigating cloud log data. The logging mode, the importance of CLF, and cloud log-as-a-service are introduced. Moreover, case studies related to CLF are explained to highlight the practical implementation of cloud log investigation for analyzing malicious behaviors. The CLF security requirements, vulnerability points, and challenges are identified to tolerate different cloud log susceptibilities. We identify and introduce challenges and future directions to highlight open research areas of CLF for motivating investigators, academicians, and researchers to investigate them.
- A. Burton. 2014. Real-time log management and analytics at any scale. (2014). Retrieved November 16, 2015, from https://logentries.com/.Google Scholar
- A. Chuvakin, K. Schmidt, and Chris Phillips. 2013. Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management. Syngress, 460 pages. Google ScholarDigital Library
- A. Gani, G. M. Nayeem, M. Shiraz, M. Sookhak, M. Whaiduzzaman, and S. Khan. 2014. A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing. J. Network Comput. Appl. 43 (2014), 84--102.Google ScholarCross Ref
- A. Holovaty. 2014. Django Makes It Easier to Build Better Web Apps More Quickly and with Less Code. (2014). Retrieved November 16, 2015, from https://www.djangoproject.com/.Google Scholar
- A. Oliner, A. Ganapathi, and W. Xu. 2012. Advances and challenges in log analysis. Commun. ACM 55, 2 (2012), 55--61. Google ScholarDigital Library
- A. Patrascu and V. V. Patriciu. 2014. Logging framework for cloud computing forensic environments. In Proceeding of the IEEE 10th International Conference on Communications (COMM). 1--4.Google Scholar
- A. Patrascu and V. V. Patriciu. 2015. Logging for cloud computing forensic systems. Int. J. Comput. Commun. Control 10, 2 (2015), 222--229.Google ScholarCross Ref
- A. Prasad and P. Chakrabarti. 2014. Extending access management to maintain audit logs in cloud computing. Int. J. Adv. Comput. Sci. Appl. 5, 3 (2014), 144--147.Google Scholar
- A. Rafael. 2013. Secure log architecture to support remote auditing. Math. Comput. Model. 57, 7 (2013), 1578--1591.Google ScholarCross Ref
- A. Stanojevic. 2013. Banca Intesa counters threats with HP ArcSight. Case Study. Hewlett-Packard. 4 pages. Retrieved November 16, 2015, from http://www8.hp.com/h20195/V2/GetPDF.aspx/4AA4-6020ENUS.pdf.Google Scholar
- A. Williams. 2013. Loggly, a Splunk Competitor, Raises $10.5m for Cloud-Centric Approach to Log Management. (2013). Retrieved November 16, 2015, from http://techcrunch.com/2013/09/03/loggly-a-splunk-competitor-raises-10-5m-for-cloud-centric-approach-to-log-management/.Google Scholar
- Amazon. 2015. Amazon Simple Notification Service. (2015). Retrieved November 16, 2015, from http://aws.amazon.com/sns/.Google Scholar
- B. Mizerany. 2014. Put this in your pipe and smoke it. (2014). Retrieved November 16, 2015, from http://www.sinatrarb.com/.Google Scholar
- B. Mollamustafaoglu. 2014. We make alerts work for you. (2014). Retrieved November 16, 2015, from https://www.opsgenie.com/.Google Scholar
- B. R. Carrier. 2006. Risks of live digital forensic analysis. Commun. ACM 49, 2 (2006), 56--61. Google ScholarDigital Library
- C. C. Yun, J. Y. C. Chang, B. B. C. Chiu, D. Y. Shue, Y. Kaneyasu, and J. W. Warfield. 2014. Ensuring integrity of security event log upon download and delete. (2014). U.S. Patent No. 8,856,086.Google Scholar
- C. Oppenheimer. 2009. Loggly reveals what matters. (2009). Retrieved November 16, 2015, from https://www.loggly.com/.Google Scholar
- C. Rong, S. T. Nguyen, and M. G. Jaatun. 2013. Beyond lightning: A survey on security challenges in cloud computing. Comput. Electr. Eng. 39, 1 (2013), 47--54. Google ScholarDigital Library
- D. J. Scales, M. Xu, and M. D. Ginzton. 2013. Low overhead fault tolerance through hybrid checkpointing and replay. U.S. Patent No. 8,499,297 (2013).Google Scholar
- D. Birk. 2011. Technical challenges of forensic investigations in cloud computing environments. In Workshop on Cryptography and Security in Clouds. Zurich, Switzerland, 1--6. Google ScholarDigital Library
- D. Birk and C. Wegener. 2011. Technical issues of forensic investigations in cloud computing environments. In Proceeding of the IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). Washington, DC, USA, 1--10. Google ScholarDigital Library
- E. Casey. 2009. Handbook of Digital Forensics and Investigation. Academic Press, San Diego, CA, 600 pages. Google ScholarDigital Library
- E. J. Janger and P. M. Schwartz. 2001. Gramm-Leach-Bliley act, information privacy, and the limits of default rules. The. Minn. L. Rev. 86 (2001), 1219.Google Scholar
- E. Lindvall. 2014. How Papertrail makes life easier. (2014). Retrieved November 16, 2015, from https://papertrailapp.com/.Google Scholar
- G. Rocher. 2005. A powerful Groovy-based Web application framework for the JVM. (2005). Retrieved November 16, 2015, from https://grails.org/.Google Scholar
- G. Samudra. 2005. Extending Log4j to create custom logging components. In Logging in Java with the JDK 1.4 Logging API and Apache Log4j. Apress. 235--284.Google Scholar
- H. A. Jahdali, A. Albatli, P. Garraghan, P. Townend, L. Lau, and Jie Xu. 2014. Multi-tenancy in cloud computing. In Proceeding of the IEEE 8th International Symposium on Service Oriented System Engineering. Oxford, United Kingdom, 344--351. Google ScholarDigital Library
- H. Chung, J. Park, S. Lee, and C. Kang. 2012. Digital forensic investigation of cloud storage services. Digital Invest. 9, 2 (2012), 81--95.Google ScholarCross Ref
- H. H. Mao, C. J. Wu, E. E. Papalexakis, C. Faloutsos, K. C. Lee, and T. C. Kao. 2014. MalSpot: Multi2 malicious network behavior patterns analysis. In Advances in Knowledge Discovery and Data Mining. Springer, Berlin, (2014), 1--14.Google ScholarCross Ref
- I. A. T. Hashem, I. Yaqoob, N. B. Anuar, S. Mokhtar, A. Gani, and S. U. Khan. The rise of “big data” on cloud computing: Review and open research issues. Inform. Syst. 47 (2015), 98--115.Google Scholar
- I. M. Abbadi. 2014. Cloud Management and Security. John Wiley & Sons, New York, 238 pages. Google ScholarDigital Library
- I. Ray, K. Belyaev, M. Strizhov, D. Mulamba, and M. Rajaram. 2013. Secure logging as a service—delegating log management to the cloud. IEEE Syst. J. 7 (2013), 323--334.Google ScholarCross Ref
- J. Dykstra and A. T. Sherman. 2011. Understanding issues in cloud forensics: Two hypothetical case studies. J. Network Forens. 3, 1 (2011), 19--31.Google Scholar
- J. Gerring. 2007. Case Study Research. Principles and Practices. Cambridge University Press, Cambridge, 278 pages.Google Scholar
- J. Hash, P. Bowen, A. Johnson, C. D. Smith, and D. I. Steinberg. 2008. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. Doctoral Dissertation, National Institute of Standards and Technology, 117 pages.Google Scholar
- J. H. Beaver. 2015. Lessons on Efficient Log Analysis from Monex Insight. Case Study Report. Loggly Research. 3 pages. https://www.loggly.com/blog/lessons-efficient-log-analysis-monex-insight/.Google Scholar
- J. Sissel. 2014. Process any data, from any source. (2014). Retrieved November 16, 2015, from https://www.elastic.co/products/logstash.Google Scholar
- J. South. 2013. Heartland Payment Systems Hardens Applications and Blocks Attacks with the Aid of HP Security Software. Technical Report. IDC Go-To-Market Services. http://www8.hp.com/h20195/V2/GetPDF.aspx/4AA5-1356ENW.pdf.Google Scholar
- J. Spring. 2011. Monitoring cloud computing by layer, part 1. IEEE Security Privacy 9, 2 (2011), 66--68. Google ScholarDigital Library
- J. Stoppelman. 2004. AWS Case Study: Yelp. Case Study. Amazon. Retrieved November 16, 2015, from https://aws.amazon.com/solutions/case-studies/yelp/.Google Scholar
- J. T. Force and T. Initiative. 2013. Security and privacy controls for federal information systems and organizations. NIST Spec. Publ. 800 (2013), 53.Google Scholar
- J. Turnbull. 2005. Understanding logging and log monitoring. Hardening Linux. A-press, Berkeley, California, 584 pages. Google ScholarDigital Library
- J. W. Joo, J. H. Park, S. K. Suk, and D. G. Lee. 2014. LISS: Log data integrity support scheme for reliable log analysis of osp. J. Converg. 5, 4 (2014), 1--5.Google Scholar
- J. Wei, Y. Zhao, K. Jiang, R. Xie, and Y. Jin. 2011. Analysis farm: A cloud-based scalable aggregation and query platform for network log analysis. In Proceedings of the IEEE International Conference on Cloud and Service Computing (CSC). Hong Kong, 354--359. Google ScholarDigital Library
- J. Yang. N. Plasson, G. Gillis. N. Talagala, and S. Sundararaman. 2014. Don't stack your log on my log. In USENIX Workshop on Interactions of NVM/Flash with Operating Systems and Workloads (INFLOW). Broomfield, USA.Google Scholar
- J. Yin. 2014. Cloud based logging service. US Patent 20,140,366,118 (2014).Google Scholar
- K. Kent, S. Chevalier, T. Grance, and H. Dang. 2006. Guide to integrating forensic techniques into incident response. NIST Spec. Publ. (2006), 800--886.Google Scholar
- K. Kent and M. Souppaya. 2014. Guide to computer security log management. National Institute of Standards and Technology (2014). 72 pages.Google Scholar
- K. L. K. Ryan, P. Jagadpramana, and B. S. Lee. 2011a. Flogger: A file-centric logger for monitoring file access and transfers within cloud computing environments. In Proceedings of the International Joint Conference of IEEE TrustCom-11/11/IEEE ICESS-11/FCST-11. 765--771. Google ScholarDigital Library
- K. L. K. Ryan, M. Kirchberg, and B. S. Lee. 2011b. From system-centric to data-centric logging-accountability, trust & security in cloud computing. In Proceedings of the IEEE Defense Science Research Conference and Expo (DSR). Singapore, 1--4.Google Scholar
- K. Popovic and Z. Hocenski. 2010. Cloud computing security issues and challenges. In Proceedings of the IEEE 33rd International Convention (MIPRO). Opatija, Croatia, 344--349.Google Scholar
- K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie. 2011. Cloud forensics. Advances in Digital Forensics VII. Springer, Berlin, 35--46.Google Scholar
- K. Ruan, J. James, J. Carthy, and T. Kechadi. 2012. Key terms for service level agreements to support cloud forensics. Advances in Digital Forensics VIII. Springer, Berlin, 201--212.Google Scholar
- K. Saurabh and C. Beedgen. 2014. Master your data continous intelligence. (2014). Retrieved November 16, 2015, from https://www.sumologic.com/.Google Scholar
- M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia. 2010. A view of cloud computing. Commun. ACM 53, 4 (2010), 50--58. Google ScholarDigital Library
- M. Baum. 2014. Analyze & troubleshoot your cloud applications. Technical Report. SplunkStorm. https://www.splunk.com/web_assets/pdfs/secure/Storm_Product_Fact_Sheet.pdf.Google Scholar
- M. Bradley and A. Dent. 2010. Payment Card Industry Data Security: What it is and its impact on retail merchants. Technical Report. Royal Holloway Series. http://cdn.ttgtmedia.com/searchsecurityuk/downloads/RHUL_Bradley_2010.pdf.Google Scholar
- M. Damshenas, A. Dehghantanha, R. Mahmoud, and S. B. Shamsuddin. 2012. Forensics investigation challenges in cloud computing environments. In Proceedings of the IEEE International Conference on Cyber Security, Cyber Warfare and Digital Forensics (CyberSec). 190--194.Google Scholar
- M. Ellis. 2013. IBM Operations Analytics-Log Analysis. (2013). Retrieved November 16, 2015, from http://www-03.ibm.com/software/products/en/ibm-operations-analytics—log-analysis.Google Scholar
- M. Lemoudden, N. Bouazza, and B. E. Ouahidi. 2014. Towards achieving discernment and correlation in cloud logging. In Proceedings of the Applications of Information Systems in Engineering and Bioscience. Gdansk, Poland, 202--207.Google Scholar
- M. Sato and T. Yamauchi. 2013. Secure log transfer by replacing a library in a virtual machine. In Advances in Information and Computer Security. Springer, Berlin, 1--18.Google Scholar
- M. Shiraz, A. Gani, A. Shamim, S. Khan, and R. W. Ahmad. 2015. Energy efficient computational offloading framework for mobile cloud computing. J. Grid Comput. 13, 1 (2015), 1--18. Google ScholarDigital Library
- M. Taylor, J. Haggerty, D. Gresty, and D. Lamb. 2011. Forensic investigation of cloud computing systems. Network Security 2011, 3 (2011), 4--10. Google ScholarDigital Library
- M. Vrable, S. Savage, and G. M. Voelker. 2012. BlueSky: A cloud-backed file system for the enterprise. In Proceedings of the 10th USENIX Conference on File and Storage Technologies. San Jose, CA, USA, 19--19. Google ScholarDigital Library
- N. Prabha, C. Timotta, T. Rajan, and A. Jaleef PK. 2014. Encrypted query processing based log management in the cloud for improved potential for confidentiality. Int. J. Comput. Appl. Technol. Res. 3, 5. (2014), 309--311.Google Scholar
- N. Santos, K. P. Gummadi, and R. Rodrigues. 2009. Towards trusted cloud computing. In Proceedings of the 2009 Conference on Hot Topics in Cloud Computing. 3--3. Google ScholarDigital Library
- P. Heath. 2014. Monitor your apps every single second. (2014). Retrieved November 16, 2015, from http://www.bmc.com/truesightpulse/customers/.Google Scholar
- P. M. Trenwith and H. S. Venter. 2014. A digital forensic model for providing better data provenance in the cloud. In Proceedings of the IEEE Information Security for South Africa (ISSA). 1--6.Google Scholar
- P. Mell and T. Grace. 2011. The NIST definition of cloud computing. NIST Special Publication 800--145 (2011).Google Scholar
- Q. Han, M. Shiraz, A. Gani, M. Whaiduzzaman, and S. Khan. 2014. Sierpinski triangle based data center architecture in cloud computing. J. Supercomput. 69, 2 (2014), 887--907. Google ScholarDigital Library
- R. A. Popa, J. R. Lorch, D. Molnar, H. J. Wang, and L. Zhuang. 2011. Enabling security in cloud storage SLAs with cloudproof. In Usenix Annual Technical Conference. 242 (2011). Google ScholarDigital Library
- R. Buyya, C. S. Yeo, and S. Venugopalirk. 2008. Market-Oriented cloud computing: Vision, hype, and reality for delivering IT services as computing utilities. In Proceeding of the IEEE 10th International Conference on High Performance Computing and Communications. 5--13. Google ScholarDigital Library
- R. Buyya, C. S. Yeo, S. Venugopalirk, J. Broberg, and I. Brandic. 2009. Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility. Future Generation Comput. Syst. 25, 6 (2009), 599--616. Google ScholarDigital Library
- R. Dahl. 2014. Node.js on the Road. (2014). Retrieved November 16, 2015 from https://www.joyent.com/noderoad.Google Scholar
- R. Marty. 2011. Cloud application logging for forensics. In Proceedings of the 2011 ACM Symposium on Applied Computing. ACM, New York, NY, 178--184. Google ScholarDigital Library
- R. Vaarandi and M. Pihelgas. 2014. Using security logs for collecting and reporting technical security metrics. In Proceedings of the IEEE Military Communications Conference (MILCOM). 294--299. Google ScholarDigital Library
- S. Ahmad, B. Ahmad, S. M. Saqib, and R. M. Khattak. 2012. Trust model: Cloud's provider and cloud's user. Int. J. Adv. Sci. Technol. 44, (2012), 69--80.Google Scholar
- S. Butterfield, E. Costello, C. Henderson, and S. Mourachov. 2014. Slack so yeah, we tried slack. (2014). Retrieved November 16, 2015, from https://slack.com/.Google Scholar
- S. Khan, A. Gani, A. W. A. Wahab, and M. A. Bagiwa. 2015. SIDNFF: Source identification network forensics framework for cloud computing. In Proceeding of the IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW). 418--419.Google Scholar
- S. Khan, A. Gani, A. W. A. Wahab, M. Shiraz, and I. Ahmad. 2016. Network forensics: Review, taxonomy, and open challenges. (in press).Google Scholar
- S. Khan, E. Ahmad, M. Shiraz, A. Gani, A. W. A. Wahab, and M. A. Bagiwa. 2014a. Forensic challenges in mobile cloud computing. In Proceeding of the IEEE International Conference on Computer, Communication, and Control Technology (I4CT 2014). 343--347.Google Scholar
- S. Khan, K. Hayat, S. A. Madani, S. U. Khan, and J. Kolodziej. 2012. The median resource failure check pointing. In 26<sup>th</sup> European Conference on Modelling and Simulation (ECMS). 483--489.Google Scholar
- S. Khan, M. Shiraz, A. W. A. Wahab, A. Gani, Q. Han, and Z. B. A. Rahman. 2014b. A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing. Sci. World J. 2014, 547062 (2014), 27.Google Scholar
- S. Ramgovind, M. M. Eloff, and E. Smith. 2010. The management of security in cloud computing. In Proceedings of the IEEE Information Security for South Africa (ISSA). 1--7.Google Scholar
- S. Simou, C. Kalloniatis, E. Kavakli, and S. Gritzalis. 2014. Cloud forensics: Identifying the major issues and challenges. In Advanced Information Systems Engineering. Springer, Berlin, 271--284.Google Scholar
- S. Sundareswaran, A. C. Squicciarini, and D. Lin. 2012. Ensuring distributed accountability for data sharing in the cloud. IEEE Trans. Depend. Secure Comput. 9, 4 (2012). 556--568. Google ScholarDigital Library
- S. T. On, J. Xu, B. Choi, H. Hu, and B. He. 2012. Flag commit: Supporting efficient transaction recovery in flash-based dbmss. IEEE Trans. Knowled. Data Eng. 24, 9 (2012), 1624--1639. Google ScholarDigital Library
- S. Thorpe, I. Ray, T. Grandison, and A. Barbir. 2011a. The virtual machine log auditor. In Proceeding of the IEEE 1st International Workshop on Security and Forensics in Communication Systems. 1--7.Google Scholar
- S. Thorpe, I. Ray, and T. Grandison. 2011b. A synchronized log cloud forensic framework. The International Conference on Cybercrime, Security & Digital Forensics. 14 pages.Google Scholar
- S. Thorpe, I. Ray, and T. Grandison. 2011c. Enforcing data quality rules for a synchronized VM log audit environment using transformation mapping techniques. In Computational Intelligence in Security for Information Systems. Springer, Berlin, 265--271. Google ScholarDigital Library
- S. Thorpe, I. Ray, T. Grandison, and A. Barbir. 2012a. Cloud log forensics metadata analysis. In Proceedings of the IEEE Computer Software and Applications Conference Workshops (COMPSACW). 194--199. Google ScholarDigital Library
- S. Thorpe, I. Ray, T. Grandison, A. Barbir, and R. France. 2013b. Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations. In Data and Applications Security and Privacy XXVII. Springer, Berlin, 97--112.Google Scholar
- S. Thorpe, I. Ray, I. Ray, and T. Grandison. 2011d. A formal temporal log data model for the global synchronized virtual machine environment. Int. J. Inform. Assur. Secur. 6, 2 (2011), 398--406.Google Scholar
- S. Thorpe, I. Ray, I. Ray, T. Grandison, A. Barbir, and R. France. 2012b. Formal parameterization of log synchronization events within a distributed forensic compute cloud database environment. In Digital Forensics and Cyber Crime. Springer, Berlin, 156--171.Google Scholar
- S. Thorpe, T. Grandison, A. Campbell, J. Williams, K. Burrell, and I. Ray. 2013a. Towards a forensic-based service oriented architecture framework for auditing of cloud logs. In Proceeding of the IEEE 9th World Congress on Services. 75--83. Google ScholarDigital Library
- T. Nielsen. 2014. Everything you need to build, run, and scale. (2014). Retrieved November 16, 2015, from https://www.heroku.com/.Google Scholar
- T. R. Wyatt. 2009. Mission: Messaging: Circular Logs Vs Linear Logs. (2014). Retrieved November 16th, 2015 from http://www.ibm.com/developerworks/websphere/techjournal/0904_mismes.html.Google Scholar
- T. Sang. 2013. A log-based approach to make digital forensics easier on cloud computing. In Proceeding of the IEEE 3rd International Conference on Intelligent System Design and Engineering Applications (ISDEA). 91--94. Google ScholarDigital Library
- T. Simon. 2014. KPI Dashboards that put your data to work. Retrieved November 16, 2015, from https://www.geckoboard.com/.Google Scholar
- U. Flegel. 2002. Pseudonymizing unix log files. In Infrastructure Security. Springer, Berlin, 162--179. Google ScholarDigital Library
- V. Wesley, T. Harris, L. Long Jr., and R. Green. 2014. Hypervisor security in cloud computing systems. ACM Comput. Surv. (2014), 1--22.Google Scholar
- X. Lin, P. Wang, and B. Wu. 2013. Log analysis in cloud computing environment with hadoop and spark. In Proceedings of the IEEE 5th International Conference on Broadband Network & Multimedia Technology (IC-BNMT2013). 273--276.Google Scholar
- Z. Nik. 2011. Detection of network security breaches based on analysis of network record logs. U.S. Patent No. 7,904,479 (2011).Google Scholar
- Z. Shams, A. K. Dutta, and R. Hasan. 2013. SecLaaS: Secure logging-as-a-service for cloud forensics. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM, New York, NY, 219--230. Google ScholarDigital Library
- Z. Shams, M. Mernik, and R. Hasan. 2014. Towards building a forensics aware language for secure logging. Comput. Sci. Inform. Syst. 11, 4 (2014), 1291--1314.Google ScholarCross Ref
- Z. Shen, L. Li, F. Yan, and X. Wu. 2010. Cloud computing system based on trusted computing platform. In Proceeding of the IEEE Intelligent Computation Technology and Automation (ICICTA). 942--945. Google ScholarDigital Library
- Z. Zibin, J. Zhu, and M. R. Lyu. 2013. Service-generated big data and big data-as-a-service: An overview. In Proceedings of the IEEE International Congress on Big Data (BigData Congress). 403--410. Google ScholarDigital Library
Index Terms
- Cloud Log Forensics: Foundations, State of the Art, and Future Directions
Recommendations
Challenges of Cloud Log Forensics
ACM SE '17: Proceedings of the SouthEast ConferenceThe forensics1 investigation of cloud computing is faced by many obstacles originating from the complex integration of technologies used to build the cloud and its sheer size. In this research we aim to provide an insight into cloud computing log ...
Cloud forensics
Cloud computing is arguably one of the most significant advances in information technology (IT) services today. Several cloud service providers (CSPs) have offered services that have produced various transformative changes in computing activities and ...
A cloud provider-agnostic secure storage protocol
CRITIS'10: Proceedings of the 5th international conference on Critical Information Infrastructures SecurityOver the last years Cloud Computing has been seen as an emerging technology, which has changed the way computing services are delivered. Cloud computing is not a new technology paradigm, but rather introduces a new way of delivering computing services ...
Comments