Journal of Engineering and Applied Sciences

Year: 2019
Volume: 14
Issue: 2
Page No. 539 - 544

Cloud Security and Forensic Awareness Survey: An Empirical Analysis

Authors : Sugandh Bhatia and Jyoteesh Malhotra

References

Eleyan, A. and D. Eleyan, 2015. Forensic Process as a Service (FPaaS) for cloud computing. Proceedings of the 2015 European Conference on Intelligence and Security Informatics (EISIC), September 7-9, 2015, IEEE, Manchester, England, ISBN:978-1-4799-8657-6, pp: 157-160.

Fehling, C., F. Leymann, R. Retter, W. Schupeck and P. Arbitter, 2014. Cloud Application Architecture Patterns. In: Cloud Computing Patterns Fundamentals to Design, Build and Manage Cloud Applications, Fehling, C., F. Leymann, R. Retter, W. Schupeck and P. Arbitter (Eds.). Springer, Vienna, Austria, ISBN:978-3-7091-1567-1, pp: 151-238.

Gladyshev, P. and M.K. Rogers, 2012. Digital Forensics and Cyber Crime. 1st Edn., Springer Berlin, Germany, ISBN:978-3-642-35515-8, Pages: 297.

Juels, A. and B. Parno, 2013. Fifth ACM cloud computing security workshop (CCSW 2013). Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, November 04-08, 2013, ACM, New York,USA., ISBN:978-1-4503-2477-9, pp: 1487-1488.

Kipper, G., 2004. Investigator's Guide to Steganography. Auerbach Publications, Boca Raton, Florida, ISBN:9780849324338, Pages: 220.

Malozemoff, A.J., J. Katz and M.D. Green, 2014. Automated analysis and synthesis of block-cipher modes of operation. Proceedings of the 2014 IEEE 27th Symposium on Computer Security Foundations (CSF), July 19-22, 2014, IEEE, Vienna, Austria, ISBN:978-1-4799-4290-9, pp: 140-152.

Mell, P. and T. Grance, 2011. The NIST definition of cloud computing. National Institute of Standards and Technology, Gaithersburg, Maryland. http://faculty.winthrop.edu/domanm/csci411/Handouts/NIST.pdf.

Messier, R., 2017. Network Forensics. John Wiley & Sons, New York, USA., ISBN:978-1-119-32918-3, Pages: 335.

Munoz, A., A. Mana and J. Gonzalez, 2013. Dynamic Security Properties Monitoring Architecture for Cloud Computing. In: Security Engineering for Cloud Computing: Approaches and Tools, Rosado, D.G. (Ed.). IGI Global, USA., ISBN:978-1-4666-2125, pp: 1-18.

Popovic, O., Z. Jovanovic, N. Jovanovic and R. Popovic, 2011. A comparison and security analysis of the cloud computing software platforms. Proceedings of the 2011 10th International Conference on Telecommunication in Modern Satellite Cable and Broadcasting Services (TELSIKS), October 5-8, 2011, IEEE, Nis, Serbia, ISBN:978-1-4577-2018-5, pp: 632-634.

Soares, L.F.B., D.A.B. Fernandes, J.V. Gomes, M.M. Freire and P.R.M. Inacio, 2014. Cloud Security: State of the Art. In: Security, Privacy and Trust in Cloud Systems, Nepal, S. and M. Pathan (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-38585-8, pp: 3-44.

Zawoad, S. and R. Hasan, 2016. Cloud Forensics. In: Encyclopedia of Cloud Computing, Murugesan, S. and ‎I. Bojanova (Eds.). John Wiley & Sons, Hoboken, New Jersey, USA., ISBN:9781118821978, pp: 233-244.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved