Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model

作者: Nurul Hidayah Ab Rahman , Kim-Kwang Raymond Choo

DOI: 10.1016/B978-0-12-801595-7.00017-3

关键词: Cloud computing securitySituational ethicsCrime preventionCloud storageDigital forensicsStorage as a serviceComputer securityWork (electrical)Cloud computingEngineering

摘要: Due to the increase in adoption of cloud storage services by organizations, ensuring security and privacy data stored is critical importance these organizations. It also important for organizations have an effective incident handling strategy minimize impact a breach. In this chapter, we present feasibility study our proposed Cloud Incident Handling Model, which draws upon principles practices from both digital forensics. We demonstrated utility model using ownCloud case simulation. explained how Situational Crime Prevention Theory can be used design mitigation strategies. Future work includes deploying real-world organization.

参考文章(34)
Siani Pearson, None, Privacy, Security and Trust in Cloud Computing Springer, London. pp. 3- 42 ,(2013) , 10.1007/978-1-4471-4189-1_1
Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi, Cloud Computing Architecture Mastering Cloud Computing#R##N#Technologies and Applications Programming. pp. 111- 140 ,(2013) , 10.1016/B978-0-12-411454-8.00004-8
Nor Badrul Anuar, Maria Papadaki, Steven Furnell, Nathan Clarke, A Response Strategy Model for Intrusion Response Systems information security conference. pp. 573- 578 ,(2012) , 10.1007/978-3-642-30436-1_51
Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan, A survey of intrusion detection techniques in Cloud Journal of Network and Computer Applications. ,vol. 36, pp. 42- 57 ,(2013) , 10.1016/J.JNCA.2012.05.003
Sameer Hasan Albakri, Bharanidharan Shanmugam, Ganthan Narayana Samy, Norbik Bashah Idris, Azuan Ahmed, Security risk assessment framework for cloud computing environments Security and Communication Networks. ,vol. 7, pp. 2114- 2124 ,(2014) , 10.1002/SEC.923
Felix C. Freiling, Bastian Schwittay, A Common Process Model for Incident Response and Computer Forensics. IMF. pp. 19- 39 ,(2007)
Cem Gurkok, Cyber Forensics and Incident Response Computer and Information Security Handbook (Second Edition). pp. 601- 621 ,(2013) , 10.1016/B978-0-12-394397-2.00034-9
Denis Trček, Habtamu Abie, Åsmund Skomedal, Iztok Starc, Advanced Framework for Digital Forensic Technologies and Procedures Journal of Forensic Sciences. ,vol. 55, pp. 1471- 1480 ,(2010) , 10.1111/J.1556-4029.2010.01528.X
Azeem Aleem, Christopher Ryan Sprott, Let me in the cloud: analysis of the benefit and risk assessment of cloud platform Journal of Financial Crime. ,vol. 20, pp. 6- 24 ,(2012) , 10.1108/13590791311287337