{"id":"https://openalex.org/W2293061394","doi":"https://doi.org/10.1145/2857218.2857253","title":"Cloud forensics challenges from a service model standpoint","display_name":"Cloud forensics challenges from a service model standpoint","publication_year":2015,"publication_date":"2015-10-25","ids":{"openalex":"https://openalex.org/W2293061394","doi":"https://doi.org/10.1145/2857218.2857253","mag":"2293061394"},"language":"en","primary_location":{"id":"doi:10.1145/2857218.2857253","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2857218.2857253","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057818352","display_name":"David Freet","orcid":null},"institutions":[{"id":"https://openalex.org/I110325482","display_name":"Eastern Kentucky University","ror":"https://ror.org/012xks909","country_code":"US","type":"education","lineage":["https://openalex.org/I110325482"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"David Freet","raw_affiliation_strings":["Eastern Kentucky University, Richmond, KY"],"affiliations":[{"raw_affiliation_string":"Eastern Kentucky University, Richmond, KY","institution_ids":["https://openalex.org/I110325482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016702627","display_name":"Rajeev Agrawal","orcid":"https://orcid.org/0000-0002-5415-5230"},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rajeev Agrawal","raw_affiliation_strings":["North Carolina A&amp;T State University, Greensboro, NC"],"affiliations":[{"raw_affiliation_string":"North Carolina A&amp;T State University, Greensboro, NC","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076874511","display_name":"Sherin John","orcid":null},"institutions":[{"id":"https://openalex.org/I35777872","display_name":"North Carolina Agricultural and Technical State University","ror":"https://ror.org/02aze4h65","country_code":"US","type":"education","lineage":["https://openalex.org/I35777872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sherin John","raw_affiliation_strings":["North Carolina A&amp;T State University, Greensboro, NC"],"affiliations":[{"raw_affiliation_string":"North Carolina A&amp;T State University, Greensboro, NC","institution_ids":["https://openalex.org/I35777872"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072746206","display_name":"Jessie Walker","orcid":"https://orcid.org/0000-0002-8196-5474"},"institutions":[{"id":"https://openalex.org/I94525581","display_name":"University of Arkansas at Pine Bluff","ror":"https://ror.org/03zsjhd07","country_code":"US","type":"education","lineage":["https://openalex.org/I94525581"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jessie J. Walker","raw_affiliation_strings":["University of Arkansas at Pine Bluff, Pine Bluff, AR"],"affiliations":[{"raw_affiliation_string":"University of Arkansas at Pine Bluff, Pine Bluff, AR","institution_ids":["https://openalex.org/I94525581"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5057818352"],"corresponding_institution_ids":["https://openalex.org/I110325482"],"apc_list":null,"apc_paid":null,"fwci":5.5622,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.95979262,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"148","last_page":"155"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8905574679374695},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7782468795776367},{"id":"https://openalex.org/keywords/software-as-a-service","display_name":"Software as a service","score":0.7073527574539185},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.6881576180458069},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6553767323493958},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.6460340023040771},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6436830759048462},{"id":"https://openalex.org/keywords/cloud-testing","display_name":"Cloud testing","score":0.5874559879302979},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5339576005935669},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5304887890815735},{"id":"https://openalex.org/keywords/utility-computing","display_name":"Utility computing","score":0.4696440100669861},{"id":"https://openalex.org/keywords/multitenancy","display_name":"Multitenancy","score":0.4566286504268646},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3502119481563568},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.349536657333374},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.17411810159683228},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.14488470554351807},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1075538694858551}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8905574679374695},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7782468795776367},{"id":"https://openalex.org/C175133352","wikidata":"https://www.wikidata.org/wiki/Q1254596","display_name":"Software as a service","level":4,"score":0.7073527574539185},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.6881576180458069},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6553767323493958},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.6460340023040771},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6436830759048462},{"id":"https://openalex.org/C120115606","wikidata":"https://www.wikidata.org/wiki/Q5135723","display_name":"Cloud testing","level":4,"score":0.5874559879302979},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5339576005935669},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5304887890815735},{"id":"https://openalex.org/C85106507","wikidata":"https://www.wikidata.org/wiki/Q1188445","display_name":"Utility computing","level":4,"score":0.4696440100669861},{"id":"https://openalex.org/C69016650","wikidata":"https://www.wikidata.org/wiki/Q1364211","display_name":"Multitenancy","level":5,"score":0.4566286504268646},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3502119481563568},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.349536657333374},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.17411810159683228},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.14488470554351807},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1075538694858551},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2857218.2857253","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2857218.2857253","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W65919655","https://openalex.org/W1539338302","https://openalex.org/W1550746896","https://openalex.org/W1781545590","https://openalex.org/W1980920861","https://openalex.org/W1993586921","https://openalex.org/W1997010178","https://openalex.org/W2001913551","https://openalex.org/W2018164199","https://openalex.org/W2023675205","https://openalex.org/W2025529089","https://openalex.org/W2025784223","https://openalex.org/W2036154845","https://openalex.org/W2040567316","https://openalex.org/W2055204629","https://openalex.org/W2069877496","https://openalex.org/W2103478379","https://openalex.org/W2105686707","https://openalex.org/W2109026747","https://openalex.org/W2123870853","https://openalex.org/W2130924213","https://openalex.org/W2152772307","https://openalex.org/W2166059863","https://openalex.org/W2275530856","https://openalex.org/W2510548757","https://openalex.org/W4255673994","https://openalex.org/W6633023809","https://openalex.org/W6910597968"],"related_works":["https://openalex.org/W2292426028","https://openalex.org/W2036927393","https://openalex.org/W2009313797","https://openalex.org/W4233104795","https://openalex.org/W2888955470","https://openalex.org/W4205832124","https://openalex.org/W2516338567","https://openalex.org/W1648925414","https://openalex.org/W2091785840","https://openalex.org/W3014967687"],"abstract_inverted_index":{"Cloud":[0,14,77],"computing":[1,15,78],"is":[2,147,154],"a":[3,17,37,63,68,74,125,161],"promising":[4],"and":[5,26,50,52,71,89,102,109,116,138,157,168,183,195,200],"expanding":[6],"technology":[7,146],"which":[8,22,29,111,131],"could":[9],"replace":[10],"traditional":[11],"IT":[12],"systems.":[13],"resembles":[16],"giant":[18],"pool":[19],"of":[20,43,118,128,181],"resources":[21],"contains":[23],"hardware,":[24],"software":[25],"related":[27],"applications,":[28],"can":[30,54],"be":[31,55],"accessed":[32],"through":[33],"web-based":[34],"services":[35],"on":[36,150],"pay-per-usage":[38],"model.":[39],"The":[40,145],"main":[41],"features":[42],"the":[44,93,114,135,179,190,197],"cloud":[45,98,129,142,192],"model":[46,206],"are":[47,85,106],"accessibility,":[48],"availability":[49],"scalability,":[51],"it":[53],"subdivided":[56],"into":[57],"three":[58,191],"service":[59,143,193,205],"models:":[60],"Software":[61],"as":[62,67,73],"Service":[64,69,75],"(SaaS),":[65],"Platform":[66],"(PaaS)":[70],"Infrastructure":[72],"(IaaS).":[76],"continues":[79],"to":[80,133,178],"transform":[81],"how":[82],"security":[83,136,198],"challenges":[84,199],"addressed":[86],"in":[87,160],"closed":[88],"private":[90],"networks.":[91],"Given":[92],"advanced":[94],"functionality":[95],"offered":[96],"by":[97],"computing,":[99,130],"network":[100],"monitoring":[101],"digital":[103,119],"forensics":[104,172],"efforts":[105],"potentially":[107],"detectable":[108],"service-interruptive,":[110],"significantly":[112],"impacts":[113],"effectiveness":[115],"thoroughness":[117],"forensic":[120],"methods.":[121],"This":[122,170,187],"paper":[123,188],"presents":[124,171],"general":[126],"view":[127],"aims":[132],"highlight":[134],"issues":[137,201],"vulnerabilities":[139],"associated":[140],"with":[141,174,203,208],"models.":[144],"mainly":[148],"based":[149],"virtualization,":[151],"where":[152],"data":[153],"always":[155],"volatile":[156],"typically":[158],"stored":[159],"de-centralized":[162],"architecture":[163],"located":[164],"across":[165],"various":[166],"countries":[167],"regions.":[169],"investigators":[173],"legal":[175],"challenges,":[176],"due":[177],"nature":[180],"multi-tenancy":[182],"distributed":[184],"shared":[185],"resources.":[186],"examines":[189],"models":[194],"discusses":[196],"involved":[202],"each":[204],"along":[207],"potential":[209],"solutions":[210],"for":[211],"each.":[212]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
