Filters








1,190 Hits in 12.2 sec

Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies [chapter]

Sean Thorpe, Tyrone Grandison, Indrajit Ray, Abbie Barbir
2012 Lecture Notes in Computer Science  
In this position paper, the authors present some of the concerns with respect to monitoring and managing the behavioral trust of participants in a forensic cloud data center environment.  ...  This work is an important first step to support the need for enabling trustable cloud digital investigations among participating law enforcement agencies.  ...  Establishing Trust among Forensic Cloud Participants A high degree of trust in a cloud forensic data center participant means that they are likely to be chosen as an interaction partner.  ... 
doi:10.1007/978-3-642-32873-2_11 fatcat:bpr3wqjxobbslbj5auc6cleztq

SoK: Blockchain Solutions for Forensics [article]

Thomas K. Dasaklis and Fran Casino and Constantinos Patsakis
2020 arXiv   pre-print
etc.) are just a few among the various challenges that hinder the adoption and implementation of sound digital forensics schemes.  ...  However, multi-jurisdictional mandates, interoperability issues, the massive amount of evidence gathered (multimedia, text etc.) and multiple stakeholders involved (law enforcement agencies, security firms  ...  records Yes [33] Cloud forensics multi-stakeholder collusion, security and ac- cess control, multiparty cooperation, trust- worthiness of records among stakeholders integrity, chain of custody,  ... 
arXiv:2005.12640v1 fatcat:vdj26kpkbbb6zg4xbt7kxsrb5u

Risk-Based Service Selection in Federated Clouds

Usama Ahmed, Ioan Petri, Omer Rana, Imran Raza, Syed Asad Hussain
2018 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion)  
We present a trust-based risk evaluation for CSP selection in federated clouds, with a particular focus on security & data privacy.  ...  A single Cloud provider can also offer a marketplace for their own offeringse.g. the AWS Marketplace 2 , which enables third party libraries to be deployed as services within AWS instances.  ...  Each of these disciplines join the project framework (realised using the CometCloud system) by sharing their data from their own data center or cloud.  ... 
doi:10.1109/ucc-companion.2018.00038 dblp:conf/ucc/AhmedPRRH18 fatcat:2wwpevwflbbbnhpzymzxeqk2xu

A forensic acquisition and analysis system for IaaS

Saad Alqahtany, Nathan Clarke, Steven Furnell, Christoph Reich
2015 Cluster Computing  
Therefore, dependence on the cloud service providers (CSPs) is ranked as the greatest challenge when investigators need to acquire evidence in a timely yet forensic manner from cloud systems.  ...  This paper examines the challenges in cloud forensics that are identified in the current research literature, alongside exploring the existing proposals and technical solutions addressed in the respective  ...  Indeed, for certain cases, investigators do not even know the location of the data due to the distributed nature of the cloud (i.e. data are distributed among many hosts in multiple data centers) [19]  ... 
doi:10.1007/s10586-015-0509-x fatcat:c7sz6snrjjd7lot6cxmq6ljyjy

Online Child Sexual Exploitation: A New MIS Challenge

Dionysios Demetis, Centre for Systems Studies, University of Hull, UK, Jan Kietzmann, Gustavson School of Business, University of Victoria, Canada
2021 Journal of the AIS  
Through the use of secondary and publicly available data from the Federal Bureau of Investigation, as well as primary data from a cybercrime police unit in the United Kingdom, this study takes a grounded  ...  For our primary UK data collection, we interviewed 14 specialists and participated in four observation sessions with a total of 64 participants.  ...  , data filtering for prioritization, compliance and legal implications of IS-use, cloud-based forensics A12: Access social media accounts by bypassing age restrictions Misperceived affordance  ... 
doi:10.17705/1jais.00652 fatcat:fqlpacxbvzb2bit7vxvvv3bmxi

Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems

Vijay Prakash, Alex Williams, Lalit Garg, Claudio Savaglio, Seema Bawa
2021 Electronics  
It provides data computation and storage where data are processed, enables better data control, faster understanding and actions, and continuous operation.  ...  In recent years, there has been a dramatic change in attitude towards computers and the use of computer resources in general.  ...  Stage Approach Advantage Disadvantage/Limitations Forensic Enabled Data Provenance Model [60] • SLA policies, Database architecture, Data logging security, Timestamp and data trust have been  ... 
doi:10.3390/electronics10111229 fatcat:mkutuyvfinhajcmpymcc57zrka

Investigating And Prosecuting Cyber Crime: Forensic Dependencies And Barriers To Justice

Cameron S. D. Brown
2015 Zenodo  
The primary goal of this paper is to raise awareness regarding legal loopholes and enabling technologies, which facilitate acts of cyber crime.  ...  In perusing these avenues of inquiry, the author seeks to identify systemic impediments which obstruct police investigations, prosecutions, and digital forensics interrogations.  ...  There are polarized views among participants engaged in this heated debate (Timberg, 2014) .  ... 
doi:10.5281/zenodo.22387 fatcat:xjbjc5hs7zcnxnrnlukkkenxi4

A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

Bader Alouffi, Muhammad Hasnain, Abdullah Alharbi, Wael Alosaimi, Hashem Alyami, Muhammad Ayaz
2021 IEEE Access  
The results showed that data tampering and leakage were among the highly discussed topics in the chosen literature.  ...  Other identified security risks were associated with the data intrusion and data storage in the cloud computing environment.  ...  A remote office requests for cloud computing services from vendors to enable the data encryption sent by clients. The encrypted data is stored at the cloud center.  ... 
doi:10.1109/access.2021.3073203 fatcat:xcoltqaq65c2zhcndlkvxk6ejm

A Trust Domains Taxonomy for Securely Sharing Information: A Preliminary Investigation [article]

Nalin Asanka Gamagedara Arachchilage, Andrew Martin
2016 arXiv   pre-print
In order to address this issue, earlier work introduced a trust domains taxonomy that aims at managing trust-related issues in information sharing.  ...  In any given collaboration, information needs to flow from one participant to another.  ...  This enables the parties involved and the observers to understand the level of trust before going ahead with sharing data.  ... 
arXiv:1511.04541v3 fatcat:i5kfjijwzjgufkud43mhvgrooy

Privacy in the Genomic Era

Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, Xiaofeng Wang
2015 ACM Computing Surveys  
has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family  ...  While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data.  ...  ACKNOWLEDGMENTS We thank Aston Zhang and Ji Young Chun for their help with conducting the opinion poll; all the participants for their participation in our survey; the IRB of UIUC in general and Dustin  ... 
doi:10.1145/2767007 pmid:26640318 pmcid:PMC4666540 fatcat:2s4nhu2d6vgrtiebdg5qeognbi

Blockchain for the Internet of Vehicles towards Intelligent Transportation Systems: A Survey [article]

Muhammad Baqer Mollah, Jun Zhao, Dusit Niyato, Yong Liang Guan, Chau Yuen, Sumei Sun, Kwok-Yan Lam, Leong Hai Koh
2020 arXiv   pre-print
Being a participatory data exchange and storage, the underlying information exchange platform of IoV needs to be secure, transparent and immutable in order to achieve the intended objectives of ITS.  ...  Furthermore, we investigate the future opportunities and explore further research directions of IoV as a key enabler of ITS.  ...  Moreover, blockchain along with smart contract enables the removal of third-party entities such as the central service manager, control center, administrators, and trusted intermediaries.  ... 
arXiv:2007.06022v1 fatcat:j7zjypmq3jhzjeqejeedjgdepa

Privacy in the Genomic Era [article]

Muhammad Naveed, Erman Ayday, Ellen W. Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang
2015 arXiv   pre-print
has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family  ...  While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data.  ...  This approach enables privacy preserving computation of genome-phenome associations when the data is distributed among multiple sites. Sequence comparison.  ... 
arXiv:1405.1891v3 fatcat:5ax5htkxmjbezf4zvw2y3n3q4i

A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches and Open Issues

Maria Stoyanova, Yannis Nikoloudakis, Spyridon Panagiotakis, Evangelos Pallis, Evangelos K. Markakis
2020 IEEE Communications Surveys and Tutorials  
Although IoT data could be a rich source of evidence, forensics professionals cope with diverse problems, starting from the huge variety of IoT devices and non-standard formats, to the multitenant cloud  ...  In addition, the present paper addresses the ongoing Forensics-as-a-Service (FaaS) paradigm, as well as some promising cross-cutting data reduction and forensics intelligence techniques.  ...  Users, device manufacturers, cloud service providers, law enforcement agencies, forensics professionals, as well as all other participants in the IoT-based ecosystem could maintain a copy of the ledger  ... 
doi:10.1109/comst.2019.2962586 fatcat:crd72xiwnzekjkaf4xkrixvpsu

The Cybersecurity Aspects of New Entities Need a Cybernetic, Holistic Perspective

Rob Van Kranenburg, Gaelle Le Gars
2021 International Journal of Cyber Forensics and Advanced Threat Investigations  
, is so important), and my behavior: "apply shaving foam" is a number in coelition.org.  ...  world security and proof (evidence constituted in Verifiable Credentials (VC, W3C)) is distributed over what an individual can attest, what my objects tell about me (that is why AI = inferences from that data  ...  Acknowledgments The research of this work on digital identity and trust was undertaken in the context of H2020 project NGI Forward, H2020 Grant Agreement number 825652.  ... 
doi:10.46386/ijcfati.v2i1.36 fatcat:qlkpz5z7rfhyhhnksihdauylj4

Quantum Biotech and Internet of Virus Things: Towards A Theoretical Framework

Prafulla Kumar Padhi, Feranando Charrua-Santos
2021 Applied System Innovation  
A comprehensive review of the literature was accomplished, and a context-centered methodology was applied to the QBIoVT paradigm forensic investigations to impel QmRNA vaccine discovery.  ...  Quantumization, the process of converting information into quantum (qubit) format, is a key enabler for propelling a new and distinct infrastructure in the pharmaceutical space.  ...  Additionally, the massive amount of data managed within the IoVT perspective poses research challenges in the trust, security, and privacy domain.  ... 
doi:10.3390/asi4020027 fatcat:6f3qwzkozzakvkbcuiefo3ubvy
« Previous Showing results 1 — 15 out of 1,190 results