Home Page Icon
Home Page
Table of Contents for
Part II: Cloud Forensics
Close
Part II: Cloud Forensics
by Nhien-An Le-Khac, Hassan Takabi, Lei Chen
Security, Privacy, and Digital Forensics in the Cloud
Cover
List of Contributors
Part I: Cloud Security and Privacy
1 Introduction to the Cloud and Fundamental Security and Privacy Issues of the Cloud
1.1 Introduction
1.2 Cloud Computing and Security Issues
1.3 Identity Security in the Cloud
1.4 Information Security in the Cloud
1.5 Cloud Security Standards
1.6 Conclusion
References
2 Cloud Infrastructure Security
2.1 Introduction
2.2 Infrastructure Security in the Cloud
2.3 Infrastructure Security Analysis in Some Clouds
2.4 Protecting Cloud Infrastructure
2.5 Conclusion
References
3 Confidentiality of Data in the Cloud: Conflicts Between Security and Cost
3.1 Introduction
3.2 Background
3.3 Confidentiality: Threats and Adversaries
3.4 Achieving Data Confidentiality in Cloud Storage Systems
3.5 Reducing Cloud Storage System Costs through Data‐Reduction Techniques
3.6 Reconciling Data Reduction and Confidentiality
3.7 Trusted Decrypter
3.8 Future Directions for Cloud Storage Confidentiality with Low Cost
3.9 Conclusions
References
4 Access Control in Cloud IaaS
4.1 Introduction
4.2 Background
4.3 Access Control in OpenStack Cloud IaaS
4.4 Access Control in AWS Cloud IaaS
4.5 Access Control in Azure Cloud IaaS
4.6 Conclusions
References
5 Cloud Security and Privacy Management
5.1 Introduction and Background
5.2 Security and Privacy Analysis
5.3 Best Security Practices and Recommendation
5.4 Use Case Example: Microsoft Office 365, SaaS Version
5.5 Current Trends and Future Direction
5.6 Related Works
5.7 Conclusion
Acknowledgments
References
6 Hacking and Countermeasures in the Cloud
6.1 Introduction
6.2 Background
6.3 Cloud Security Threats
6.4 Cloud Security Countermeasures
6.5 Hacking the Cloud: Reality Check
6.6 Future of Cloud Security
6.7 Conclusions
References
7 Risk Management and Disaster Recovery in the Cloud
7.1 Introduction
7.2 Background
7.3 Consequence‐Centric Security Assessment
7.4 Future Directions
7.5 Conclusions
8 Cloud Auditing and Compliance
8.1 Introduction
8.2 Background
8.3 Cloud Auditing
8.4 Cloud Compliance
8.5 Future Research Directions for Cloud Auditing and Compliance
8.6 Conclusion
References
Further Reading
9 Security‐as‐a‐Service (SECaaS) in the Cloud
9.1 Introduction
9.2 Related Work
9.3 Security‐as‐a‐Service Framework
9.4 Conclusions
References
Part II: Cloud Forensics
10 Cloud Forensics: Model, Challenges, and Approaches
10.1 Introduction
10.2 Background
10.3 Process and Model of Cloud Forensics
10.4 Cloud Forensics Methods, Approaches, and Tools
10.5 Challenges in Cloud Forensics
10.6 Conclusions
References
11 Cyberterrorism in the Cloud: Through a Glass Darkly
11.1 Introduction
11.2 What Is Terrorism?
11.3 Defining Cyberterrorism
11.4 Cyberterrorism vs. Terrorist Use of Cyberspace
11.5 Cyberterrorism in the Cloud
11.6 The Benefits of the Cloud to Cyberterrorists
11.7 Cyberlaw and Cyberterrorism
11.8 Conclusion: Through a Glass Darkly
References
12 Digital Forensic Process and Model in the Cloud
12.1 Introduction
12.2 Digital Forensics Models
12.3 Cloud Forensics Process and Model
12.4 Toward a New Cloud Forensics Model
12.5 Evaluation and Analysis
12.6 Conclusion
References
13 Data Acquisition in the Cloud
13.1 Introduction
13.2 Background
13.3 Data Center as a Source of Evidence
13.4 Cloud Service Providers: Essential Requirements, Governance, and Challenges
13.5 Cloud Storage Forensics
13.6 Case Study 1: Finding Data Centers on the Internet in Data‐Dense Environments
13.7 Case Study 2: Cloud Forensics for the Amazon Simple Storage Service
13.8 Conclusion
References
14 Digital Evidence Management, Presentation, and Court Preparation in the Cloud: A Forensic Readiness Approach
14.1 Introduction
14.2 Cloud Forensics and Challenges
14.3 Digital Forensics Readiness
14.4 Cloud Forensics Readiness
14.5 Forensics Readiness in Evidence Management, Presentation, and Court Preparation
14.6 Conclusion
References
15 Analysis of Cloud Digital Evidence
15.1 Introduction
15.2 Background
15.3 Current Approaches
15.4 Proposed Comprehensive Approaches
15.5 Discussion
15.6 Conclusions
References
16 Forensics‐as‐a‐Service (FaaS) in the State‐of‐the‐Art Cloud
16.1 Introduction
16.2 Background and Motivation
16.3 State of the Art in Parallel and Distributed Forensic Analysis
16.4 Conclusion and Future Research Direction
References
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
9 Security‐as‐a‐Service (SECaaS) in the Cloud
Next
Next Chapter
10 Cloud Forensics: Model, Challenges, and Approaches
Part II
Cloud Forensics
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset