{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:47:09Z","timestamp":1743108429647,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030493356"},{"type":"electronic","value":"9783030493363"}],"license":[{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,13]],"date-time":"2020-08-13T00:00:00Z","timestamp":1597276800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-49336-3_37","type":"book-chapter","created":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T12:05:28Z","timestamp":1597233928000},"page":"376-386","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Securing Trustworthy Evidences for Robust Forensic Cloud in Spite of Multi-stakeholder Collusion Problem"],"prefix":"10.1007","author":[{"given":"Sagar","family":"Rane","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sanjeev","family":"Wagh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arati","family":"Dixit","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,13]]},"reference":[{"key":"37_CR1","doi-asserted-by":"crossref","unstructured":"Balduzzi, M., Loureiro, S.: A security analysis of amazon\u2019s elastic compute cloud service. In: Symposium on Applied Computing, pp. 1427\u20131434. ACM (2012)","DOI":"10.1145\/2245276.2232005"},{"key":"37_CR2","unstructured":"Benet, J.: IPFS - Content Addressed, Versioned, P2P File Sys. Draft 3 (2014)"},{"key":"37_CR3","doi-asserted-by":"crossref","unstructured":"Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: SADFE, pp. 1\u201310. IEEE (2011)","DOI":"10.1109\/SADFE.2011.17"},{"key":"37_CR4","doi-asserted-by":"crossref","unstructured":"Cohen, F.: Challenges to Digital Forensic Evidence in the Cloud. In: Cybercrime & Cloud Forensics: Applied for Investigation Process, pp. 59\u201378. IGI Global (2012)","DOI":"10.4018\/978-1-4666-2662-1.ch003"},{"key":"37_CR5","unstructured":"Congress of the United States. Sarbanes-Oxley Act. Accessed 20 Mar 2017"},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"S90","DOI":"10.1016\/j.diin.2012.05.001","volume":"9","author":"J Dykstra","year":"2016","unstructured":"Dykstra, J., Sherman, A.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing. J. Dig. Invest. 9, S90\u2013S98 (2016)","journal-title":"J. Dig. Invest."},{"key":"37_CR7","unstructured":"Dykstra, J., Sherman, A.: Understanding issues in cloud forensics: two hypothetical case studies. Cyber Defense Lab, Department of CSEE (UMBC) (2011)"},{"key":"37_CR8","unstructured":"Health Information Privacy. \nhttp:\/\/goo.gl\/NxgkMi\n\n, Accessed 20 Mar 2017"},{"key":"37_CR9","unstructured":"Hyperledger FabricDocs Documentation, Hyperledger. Accessed March 2018"},{"key":"37_CR10","unstructured":"Infosecurity, Ddos-ers launch attacks from amazon ec2. Accessed Jan 2018"},{"key":"37_CR11","doi-asserted-by":"crossref","unstructured":"Kent, K., Souppaya, M.: Guide to computer security log management. Technical Report 800-92, NIST Special Publication (2006)","DOI":"10.6028\/NIST.SP.800-92"},{"issue":"1","key":"37_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2906149","volume":"49","author":"S Khan","year":"2016","unstructured":"Khan, S., Gani, A., et al.: Cloud log forensics: foundations, state of the art, and future directions. ACM Comput. Surv. 49(1), 1\u201342 (2016). Article 7","journal-title":"ACM Comput. Surv."},{"key":"37_CR13","doi-asserted-by":"crossref","unstructured":"Marty, R.: Cloud application logging for forensics. In: Proceedings of the: ACM Symposium on Applied Computing (SAC11), Taichung, Taiwan., pp. 178\u2013184. ACM (2011)","DOI":"10.1145\/1982185.1982226"},{"key":"37_CR14","unstructured":"Melland, P., Grance, T.: Nist Cloud Computing Forensic Science Challenges. NIST Cloud Forensic Science WG, IT Laboratory, Draft NISTIR 8006 (2014)"},{"key":"37_CR15","unstructured":"MRM.: Market Research Media, Global Cloud Computing Market Forecast 2019\u20132024. \nhttps:\/\/www.marketresearchmedia.com\/?p=839\n\n, Accessed 26 Apr 2018"},{"key":"37_CR16","unstructured":"Nasscom. India\u2019s cloud market to cross \\$7 billion by 2022. Accessed July 2018"},{"issue":"1","key":"37_CR17","first-page":"80","volume":"16","author":"A Patrascu","year":"2014","unstructured":"Patrascu, A.: Logging system for cloud computing forensic environments. J. Control Eng. Appl. Inf. 16(1), 80\u201388 (2014)","journal-title":"J. Control Eng. Appl. Inf."},{"issue":"2","key":"37_CR18","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1109\/JSYST.2012.2221958","volume":"7","author":"I Ray","year":"2013","unstructured":"Ray, I., Belyaev, K., Rajaram, M.: Secure logging as a service delegating log management to the cloud. IEEE Syst. J. 7(2), 323\u2013334 (2013)","journal-title":"IEEE Syst. J."},{"key":"37_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34, 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"key":"37_CR20","first-page":"24","volume":"7","author":"S Thorpe","year":"2012","unstructured":"Thorpe, S., Ray, I.: Detecting temporal inconsistency in virtual machine activity timelines. J. Inf. Assur. Secur. 7, 24\u201331 (2012)","journal-title":"J. Inf. Assur. Secur."},{"key":"37_CR21","doi-asserted-by":"crossref","unstructured":"Zafarullah, Z., et al.: Digital forensics for eucalyptus. In: FIT. IEEE (2011)","DOI":"10.1109\/FIT.2011.28"},{"issue":"5","key":"37_CR22","first-page":"17","volume":"26","author":"S Zawoad","year":"2013","unstructured":"Zawoad, S., Hasan, R.: Digital forensics in the cloud. J. Defen. Softw. Eng. 26(5), 17\u201320 (2013)","journal-title":"J. Defen. Softw. Eng."},{"key":"37_CR23","doi-asserted-by":"crossref","unstructured":"Zawoad, S., Dutta, A.K., Hasan, R.: SecLaaS: Secure logging-as-a service for cloud forensics. In: ASIACCS, pp. 219\u2013230. ACM (2013)","DOI":"10.1145\/2484313.2484342"},{"issue":"2","key":"37_CR24","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/TDSC.2015.2482484","volume":"13","author":"S Zawoad","year":"2016","unstructured":"Zawoad, S., et al.: Towards building forensics enabled cloud through secure logging-as-a-service. IEEE Trans. Depend. Sec. Comput. 13(2), 148\u2013162 (2016)","journal-title":"IEEE Trans. Depend. Sec. Comput."},{"key":"37_CR25","unstructured":"Zawoad, S., Hasan, R.: Cloud forensics: a meta-study of challenges, approaches, and open problems (2013). \narXiv: 1302.6312v1\n\n [cs.DC]"},{"issue":"3","key":"37_CR26","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Fut. Gener. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Fut. Gener. Comput. Syst."}],"container-title":["Advances in Intelligent Systems and Computing","Hybrid Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-49336-3_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,12]],"date-time":"2020-08-12T12:59:20Z","timestamp":1597237160000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-49336-3_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,13]]},"ISBN":["9783030493356","9783030493363"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-49336-3_37","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,13]]},"assertion":[{"value":"13 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Hybrid Intelligent Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sehore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"his2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/his19\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}