References
- Reilly D , Wren C , Berry T . Cloud computing: forensic challenges for law enforcement. IEEE. 2010:1–7.
- Giova G . Improving chain of custody in forensic investigation of electronic digital systems. Int J Comput Sci Network Secur. 2011;11(1):1–9.
- Mell P , Grance T . The NIST definition of cloud computing. Information Technology Laboratory - Computer Security Division; 2011.
- Pearson S , Benameur A . Privacy, security and trust issues arising from cloud computing. IEEE. 2010:693–702.
- Palmer G . A road map for digital forensic research. First Digital Forensic Research Workshop (DFRWS); 2001.
- Barbara JJ . Cloud computing: another digital forensic challenge. Digital Forensic Investigator News. 2009 October.
- Rowlingson R. A ten step process for forensic readiness. Int J Digital Evidence. 2004;2 (3):1–28.
- Birk D , Wegener C . Technical issues of forensic investigations in cloud computing environments. In: Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE); 2011. p. 1-11.
- Muniswamy-Reddy K-K , Seltzer M . Provenance as first class cloud data. ACM SIGOPS Oper Syst Rev. 2010;43(4):11–16.10.1145/1713254
- Lu R , Lin X , Liang X , Shen XS . Secure provenance: the essential of bread and butter of data forensics in cloud computing. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM; 2010. p. 282–292.
- Trenwith PM , Venter HS . A digital forensic model for providing better data provenance in the cloud. Inf Secur S Afr. 2014:1–6.
- Muniswamy-Reddy KK , Braun U , Holland DA , Macko P , Maclean D , Margo D , Seltzer M , Smogor R . Layering in provenance systems. In: Proceedings of the 2009 USENIX Annual Technical Conference; 2009.
- Shi Y , Zhang K , Li Q . A new data integrity verification mechanism for SaaS. In: Web Information Systems and Mining. Springer; 2010. p. 236–243.10.1007/978-3-642-16515-3
- Juels A , Kaliski Jr BS . PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM conference on Computer and communications security; 2007. p. 584–597.
- Zimmermann P . A proposed standard format for RSA Cryptosystems. September 1986;19(9):21–34.
- Rivest RL , Shamir A , Adleman L . A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120–126.10.1145/359340.359342
- Rivest RL , Shamir A , Adleman L . A method for obtaining digital signatures and public-key cryptosystems. Commun ACM . Special 25th Anniversary Issue. 1983;26 (1):96–99.
- Elgamal T . A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans Inf Theory. July 1985;31(4):469–472.
- Fall KR , Stevens WR . TCP/IP illustrated. Volume 1. The protocols. Addison-Wesley; 2011.
- IANA . IANA; 2015. Available from: www.iana.org
- Gilbert H , Handschuh H . Security analysis of SHA-256 and sisters. In: International workshop on selected areas in cryptography. Springer; 2003. p. 175–193.