{"id":"https://openalex.org/W2106568786","doi":"https://doi.org/10.1145/2675744.2675766","title":"A novel approach for incident response in cloud using forensics","display_name":"A novel approach for incident response in cloud using forensics","publication_year":2014,"publication_date":"2014-10-09","ids":{"openalex":"https://openalex.org/W2106568786","doi":"https://doi.org/10.1145/2675744.2675766","mag":"2106568786"},"language":"en","primary_location":{"id":"doi:10.1145/2675744.2675766","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2675744.2675766","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM India Computing Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103855525","display_name":"BKSP Kumar Raju","orcid":null},"institutions":[{"id":"https://openalex.org/I74796645","display_name":"Birla Institute of Technology and Science, Pilani","ror":"https://ror.org/001p3jz28","country_code":"IN","type":"education","lineage":["https://openalex.org/I74796645"]},{"id":"https://openalex.org/I4210101034","display_name":"Birla Institute of Technology and Science - Hyderabad Campus","ror":"https://ror.org/014ctt859","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210101034","https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Bksp Kumar Raju","raw_affiliation_strings":["BITS Pilani Hyderabad, Hyderabad, India","[BITS Pilani-Hyderabad, Hyderabad, India]"],"affiliations":[{"raw_affiliation_string":"BITS Pilani Hyderabad, Hyderabad, India","institution_ids":["https://openalex.org/I4210101034"]},{"raw_affiliation_string":"[BITS Pilani-Hyderabad, Hyderabad, India]","institution_ids":["https://openalex.org/I74796645"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050375143","display_name":"G. Geethakumari","orcid":null},"institutions":[{"id":"https://openalex.org/I4210101034","display_name":"Birla Institute of Technology and Science - Hyderabad Campus","ror":"https://ror.org/014ctt859","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210101034","https://openalex.org/I74796645"]},{"id":"https://openalex.org/I74796645","display_name":"Birla Institute of Technology and Science, Pilani","ror":"https://ror.org/001p3jz28","country_code":"IN","type":"education","lineage":["https://openalex.org/I74796645"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"G. Geethakumari","raw_affiliation_strings":["BITS Pilani Hyderabad, Hyderabad, India","[BITS Pilani-Hyderabad, Hyderabad, India]"],"affiliations":[{"raw_affiliation_string":"BITS Pilani Hyderabad, Hyderabad, India","institution_ids":["https://openalex.org/I4210101034"]},{"raw_affiliation_string":"[BITS Pilani-Hyderabad, Hyderabad, India]","institution_ids":["https://openalex.org/I74796645"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103855525"],"corresponding_institution_ids":["https://openalex.org/I4210101034","https://openalex.org/I74796645"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.19470117,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8798984289169312},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7574551701545715},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7313706278800964},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5804319381713867},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.5775079131126404},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5511891841888428},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.5300894379615784},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.5019748210906982},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.49863553047180176},{"id":"https://openalex.org/keywords/incident-response","display_name":"Incident response","score":0.4787265956401825},{"id":"https://openalex.org/keywords/cloud-service-provider","display_name":"Cloud service provider","score":0.46081632375717163},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.44724929332733154},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4301597476005554},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3442787528038025},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.12237608432769775}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8798984289169312},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7574551701545715},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7313706278800964},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5804319381713867},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.5775079131126404},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5511891841888428},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.5300894379615784},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.5019748210906982},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.49863553047180176},{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.4787265956401825},{"id":"https://openalex.org/C2983819522","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud service provider","level":4,"score":0.46081632375717163},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.44724929332733154},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4301597476005554},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3442787528038025},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.12237608432769775},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2675744.2675766","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2675744.2675766","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th ACM India Computing Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W16482292","https://openalex.org/W1449986297","https://openalex.org/W1525748967","https://openalex.org/W1969238379","https://openalex.org/W1998964974","https://openalex.org/W2009090887","https://openalex.org/W2014211033","https://openalex.org/W2045287414","https://openalex.org/W2054472680","https://openalex.org/W2054964007","https://openalex.org/W2112127916","https://openalex.org/W2124387823","https://openalex.org/W2124410001","https://openalex.org/W2138072040","https://openalex.org/W2159265516","https://openalex.org/W2166059863","https://openalex.org/W2166471894","https://openalex.org/W2167059787","https://openalex.org/W2170354904","https://openalex.org/W2275530856","https://openalex.org/W2486337940","https://openalex.org/W2574835973","https://openalex.org/W3102095724","https://openalex.org/W3142303541","https://openalex.org/W3144052730","https://openalex.org/W4236454837","https://openalex.org/W4245882526","https://openalex.org/W4292693418","https://openalex.org/W6607157719","https://openalex.org/W6652718505"],"related_works":["https://openalex.org/W2972427363","https://openalex.org/W2121070677","https://openalex.org/W246478187","https://openalex.org/W2161391695","https://openalex.org/W4238452393","https://openalex.org/W1500698787","https://openalex.org/W188028618","https://openalex.org/W1980925977","https://openalex.org/W2077664395","https://openalex.org/W2012147233"],"abstract_inverted_index":{"Cloud":[0],"Computing":[1],"is":[2,72,100,151],"a":[3,156,169],"technology":[4],"which":[5,92],"can":[6,82,119],"take":[7],"distributed":[8,20],"and":[9,54,67,117,159],"high":[10],"performance":[11],"computing":[12],"to":[13,26,121,135],"the":[14,39,74,122,126,137,145,153,161,172],"next":[15],"level.":[16],"The":[17,97,131],"concept":[18],"of":[19,35,46,56,65,77,95,102,115,144],"virtualization":[21],"enables":[22],"cloud":[23,78,91,127],"service":[24,29,60,128],"providers":[25],"ensure":[27],"better":[28,84],"availability":[30],"along":[31],"with":[32,58],"optimal":[33],"utilization":[34],"resources.":[36],"Users,":[37],"on":[38],"other":[40],"hand":[41],"get":[42,110],"benefited":[43],"in":[44,70,90,104,147,155],"terms":[45],"cost":[47],"reduction,":[48],"less":[49],"maintenance":[50],"overheads,":[51],"rapid":[52],"provision":[53],"release":[55],"resources":[57],"minimal":[59],"provider":[61,129],"interaction.":[62],"However,":[63],"lack":[64,101],"transparency":[66],"security":[68,107],"procedures":[69],"place":[71],"reducing":[73],"maximal":[75],"usage":[76],"services.":[79],"These":[80],"issues":[81],"be":[83],"addressed":[85],"by":[86,139],"facilitating":[87],"digital":[88],"forensics":[89],"involves":[93],"lot":[94],"challenges.":[96],"main":[98],"concern":[99],"trust":[103,138],"cloud.":[105],"Any":[106],"mechanism":[108],"may":[109],"violated":[111],"at":[112],"some":[113],"point":[114],"time":[116],"this":[118,164],"lead":[120],"reputation":[123],"loss":[124],"for":[125,171],"(CSP).":[130],"CSP":[132],"then":[133],"has":[134],"rebuild":[136],"effective":[140],"incident":[141,148],"management.":[142],"One":[143],"challenges":[146],"handling":[149],"(IH)":[150],"detecting":[152],"incidents":[154],"timely":[157],"manner":[158],"identifying":[160],"intruder.":[162],"In":[163],"paper,":[165],"we":[166],"are":[167],"proposing":[168],"framework":[170],"same.":[173]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
