{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T02:33:57Z","timestamp":1771036437967,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811033247","type":"print"},{"value":"9789811033254","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3325-4_5","type":"book-chapter","created":{"date-parts":[[2017,4,12]],"date-time":"2017-04-12T14:24:18Z","timestamp":1492007058000},"page":"38-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["A Complete Ontological Survey of Cloud Forensic in the Area of Cloud Computing"],"prefix":"10.1007","author":[{"given":"Shaik Khaja","family":"Mohiddin","sequence":"first","affiliation":[]},{"given":"Suresh Babu","family":"Yalavarthi","sequence":"additional","affiliation":[]},{"given":"Shaik","family":"Sharmila","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,13]]},"reference":[{"key":"5_CR1","unstructured":"Ting, Y.H., et al.: Design and implementation of a cloud digital forensic laboratory (2013)"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Zawoad, S., et al.: I have the proof: providing proofs of past data possession in cloud forensics. In: 2012 International Conference on Cyber Security, pp. 75\u201382. IEEE, December 2012","DOI":"10.1109\/CyberSecurity.2012.17"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Yan, C.: Cybercrime forensic system in cloud computing. In: 2011 International Conference on Image Analysis and Signal Processing, pp. 612\u2013615. IEEE, October 2011","DOI":"10.1109\/IASP.2011.6109117"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Thorpe, S., Grandison, T., Campbell, A., Williams, J., Burrell, K., Ray, I.: Towards a forensic-based service oriented architecture framework for auditing of cloud logs. In: 2013 IEEE Ninth World Congress on Services, pp. 75\u201383. IEEE, June 2013","DOI":"10.1109\/SERVICES.2013.76"},{"issue":"3","key":"5_CR5","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.2298\/CSIS130920063L","volume":"11","author":"T Lee","year":"2014","unstructured":"Lee, T., Lee, H., Rhee, K.-H., Shin, U.: The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data. Comput. Sci. Inf. Syst. 11(3), 1037\u20131054 (2014)","journal-title":"Comput. Sci. Inf. Syst."},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"S54","DOI":"10.1016\/j.diin.2014.03.007","volume":"11","author":"R Baar van","year":"2014","unstructured":"van Baar, R., van Beek, H., van Eijk, E.: Digital forensics as a service: a game changer. Digital Invest. 11, S54\u2013S62 (2014)","journal-title":"Digital Invest."},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Lee, J., Un, S.: Digital forensics as a service: a case study of forensic indexed search. In: 2012 International Conference on ICT Convergence (ICTC 2012), pp. 499\u2013503. IEEE, October 2012","DOI":"10.1109\/ICTC.2012.6387185"},{"key":"5_CR8","unstructured":"Zeng, G.: Research on digital forensics based on private cloud computing, vol. 2, no. 9, pp. 24\u201329 (2014)"},{"key":"5_CR9","unstructured":"Shende, J.R.G.: Cloud forensics (2014)"},{"key":"5_CR10","unstructured":"Wen, Y., Man, X., Le, K., Shi, W.: Forensics-as-a-Service (FaaS): computer forensic workflow management and processing using cloud, pp. 208\u2013214 (2013)"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Sang, T.: A log based approach to make digital forensics easier on cloud computing. In: 2013 Third International Conference on Intelligent System Design and Engineering Applications, pp. 91\u201394. IEEE, January 2013","DOI":"10.1109\/ISDEA.2012.29"},{"key":"5_CR12","unstructured":"Lee, J.Y., et al.: Remote forensics system based on network (2011)"},{"key":"5_CR13","doi-asserted-by":"publisher","first-page":"S87","DOI":"10.1016\/j.diin.2013.06.010","volume":"10","author":"J Dykstra","year":"2013","unstructured":"Dykstra, J., Sherman, A.T.: Design and implementation of FROST: digital forensic tools for the Open Stack cloud computing platform. Digital Invest. 10, S87\u2013S95 (2013)","journal-title":"Digital Invest."},{"key":"5_CR14","unstructured":"Deepak, N., et al.: Digital forensics service platform for internet videos, vol. 2, pp. 456\u2013464 (2013)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Q., et al.: Performance overhead among three hypervisors: an experimental study using hadoop benchmarks. In: 2013 IEEE International Congress on Big Data, pp. 9\u201316, June 2013","DOI":"10.1109\/BigData.Congress.2013.11"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.cose.2012.09.008","volume":"32","author":"K Reddy","year":"2013","unstructured":"Reddy, K., et al.: The architecture of a digital forensic readiness management system. Comput. Secur. 32, 73\u201389 (2013)","journal-title":"Comput. Secur."},{"key":"5_CR17","unstructured":"Shirkhedkar, D., et al.: Design of digital forensic technique for cloud computing, vol. 2, no. 6, pp. 192\u2013194 (2014)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Reichert, Z., Richards, K., Yoshigoe, K.: Automated forensic data acquisition in the cloud. In: 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 725\u2013730. IEEE, October 2014","DOI":"10.1109\/MASS.2014.135"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Belorkar, A., Geethakumari, G.: Regeneration of events using system snapshots for cloud forensic analysis. In: 2011 Annual IEEE India Conference, pp. 1\u20134. IEEE, December 2011","DOI":"10.1109\/INDCON.2011.6139350"},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"S3","DOI":"10.1016\/j.diin.2011.05.002","volume":"8","author":"C Shields","year":"2011","unstructured":"Shields, C., et al.: A system for the proactive, continuous, and efficient collection of digital forensic evidence. Digital Invest. 8, S3\u2013S13 (2011)","journal-title":"Digital Invest."}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of Sixth International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3325-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:06:23Z","timestamp":1750197983000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3325-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811033247","9789811033254"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3325-4_5","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 April 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}