{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T23:47:57Z","timestamp":1759362477042,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":32,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811375606"},{"type":"electronic","value":"9789811375613"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-7561-3_6","type":"book-chapter","created":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T02:12:18Z","timestamp":1556590338000},"page":"77-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["BlockSLaaS: Blockchain Assisted Secure Logging-as-a-Service for Cloud Forensics"],"prefix":"10.1007","author":[{"given":"Sagar","family":"Rane","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arati","family":"Dixit","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,4,30]]},"reference":[{"key":"6_CR1","unstructured":"Columbus, L.: Cloud computing market projected to reach 411B dollar by 2020 (2017). \n                    https:\/\/goo.gl\/hmKeK1\n                    \n                  . Accessed 09 July 2018"},{"key":"6_CR2","unstructured":"Ashford, W.: Ransomware to hit cloud computing in 2018, predicts MIT (2018). \n                    https:\/\/goo.gl\/9JoHhj\n                    \n                  . Accessed 26 Apr 2018"},{"key":"6_CR3","unstructured":"Congress of the United States. Sarbanes-Oxley Act (2002). \n                    http:\/\/goo.gl\/YHwujG\n                    \n                  . Accessed 20 Mar 2015"},{"key":"6_CR4","unstructured":"www.hhs.gov\n                    \n                  . Health Information Privacy. \n                    http:\/\/goo.gl\/NxgkMi\n                    \n                  . Accessed 20 Mar 2015"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response. NIST Special Publication 800-86 (2006)","DOI":"10.6028\/NIST.SP.800-86"},{"key":"6_CR6","first-page":"2012","volume":"1","author":"S Nakamoto","year":"2008","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted 1, 2012 (2008)","journal-title":"Consulted"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Marty, R.: Cloud application logging for forensics. In: Proceedings of the 2011 ACM Symposium on Applied Computing (SAC11), Taichung, Taiwan, pp. 178\u2013184. ACM, March 2011","DOI":"10.1145\/1982185.1982226"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: SADFE, pp. 1\u201310. IEEE (2011)","DOI":"10.1109\/SADFE.2011.17"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E., Loureiro, S.: A security analysis of Amazon\u2019s elastic compute cloud service. In: Symposium on Applied Computing, pp. 1427\u20131434. ACM (2012)","DOI":"10.1145\/2245276.2232005"},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"6_CR11","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Future Gener. Comput. Syst."},{"key":"6_CR12","unstructured":"Infosecurity-magazine. Ddos-ers launch attacks from Amazon ec2, July 2014. \n                    http:\/\/goo.gl\/vrXrHE\n                    \n                  . Accessed 1 Jan 2018"},{"key":"6_CR13","unstructured":"Melland, P., Grance, T.: Nist cloud computing forensic science challenges. NIST Cloud Computing Forensic Science Working Group, Information Technology Laboratory, Draft NISTIR 8006, June 2014"},{"issue":"5","key":"6_CR14","first-page":"17","volume":"26","author":"S Zawoad","year":"2013","unstructured":"Zawoad, S., Hasan, R.: Digital forensics in the cloud. J. Defense Softw. Eng. 26(5), 17\u201320 (2013)","journal-title":"J. Defense Softw. Eng."},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"S90","DOI":"10.1016\/j.diin.2012.05.001","volume":"9","author":"J Dykstra","year":"2012","unstructured":"Dykstra, J., Sherman, A.: Acquiring forensic evidence from infrastructure-as-aservice cloud computing: exploring and evaluating tools, trust, and techniques. J. Digit. Invest. 9, S90\u2013S98 (2012). \n                    https:\/\/doi.org\/10.1016\/j.diin.2012.05.001","journal-title":"J. Digit. Invest."},{"issue":"1","key":"6_CR16","first-page":"80","volume":"16","author":"A Patrascu","year":"2014","unstructured":"Patrascu, A., Patriciu, V.-V.: Logging system for cloud computing forensic environments. J. Control Eng. Appl. Inform. 16(1), 80\u201388 (2014)","journal-title":"J. Control Eng. Appl. Inform."},{"issue":"1","key":"6_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2906149","volume":"49","author":"Suleman Khan","year":"2016","unstructured":"Khan, S., Gani, A., Wahab, A., et al.: Cloud log forensics: foundations, state of the art, and future directions. ACM Comput. Surv. 49(1) \n                    https:\/\/doi.org\/10.1145\/2906149\n                    \n                   (2016). Article 7","journal-title":"ACM Computing Surveys"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Zawoad, S., Dutta, A.K., Hasan, R.: SecLaaS: secure logging-as-aservice for cloud forensics. In: ASIACCS, pp. 219\u2013230. ACM (2013)","DOI":"10.1145\/2484313.2484342"},{"issue":"2","key":"6_CR19","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/TDSC.2015.2482484","volume":"13","author":"S Zawoad","year":"2016","unstructured":"Zawoad, S., Dutta, A., Hasan, R.: Towards building forensics enabled cloud through secure logging-as-a-service. IEEE Trans. Dependable Secure Comput. 13(2), 148\u2013162 (2016). \n                    https:\/\/doi.org\/10.1109\/TDSC.2015.2482484","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"1","key":"6_CR20","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.diin.2013.02.004","volume":"10","author":"K Ruan","year":"2013","unstructured":"Ruan, K., Carthy, J., Kechadi, T., Baggili, I.: Cloud forensics denitions and critical criteria for cloud forensic capability: an overview of survey results. Digital Invest. 10(1), 34\u201343 (2013)","journal-title":"Digital Invest."},{"key":"6_CR21","unstructured":"Zawoad, S., Hasan, R.: Cloud forensics: a meta-study of challenges, approaches, and open problems \n                    arXiv: 1302.6312v1\n                    \n                   [cs.DC] 26 February 2013"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Kent, K., Souppaya, M.: Guide to computer security log management. Technical report. NIST Special Publication 800-92 (2006)","DOI":"10.6028\/NIST.SP.800-92"},{"key":"6_CR23","unstructured":"Dykstra, J., Sherman, A.: Understanding issues in cloud forensics: two hypothetical case studies. Cyber Defense Lab, Department of CSEE, University of Maryland, Baltimore County (UMBC) (2011)"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Cohen, F.: Challenges to digital forensic evidence in the cloud. In: Ruan, K. (ed.) Cybercrime and Cloud Forensics: Applications for Investigation Processes, pp. 59\u201378. IGI Global, December 2012","DOI":"10.4018\/978-1-4666-2662-1.ch003"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Khajeh-Hosseini, A., Greenwood, D., Sommerville, I.: Cloud migration: a case study of migrating an enterprise it system to IaaS. In: Proceedings of the 3rd International Conference on Cloud Computing (CLOUD), pp. 450\u2013457. IEEE (2010)","DOI":"10.1109\/CLOUD.2010.37"},{"key":"6_CR26","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-24212-0_3","volume-title":"Advances in Digital Forensics VII","author":"K Ruan","year":"2011","unstructured":"Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics. In: Peterson, G., Shenoi, S. (eds.) DigitalForensics 2011. IAICT, vol. 361, pp. 35\u201346. Springer, Heidelberg (2011). \n                    https:\/\/doi.org\/10.1007\/978-3-642-24212-0_3"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Grispos, G., Glisson, W., Storer, T.: Calm before the Storm: the emerging challenges of cloud commuting in digital forensics. University of Glasgow (2012)","DOI":"10.4018\/jdcf.2012040103"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Zafarullah, Z., Anwar, F., Anwar, Z.: Digital forensics for eucalyptus. In: FIT, pp. 110\u2013116. IEEE (2011)","DOI":"10.1109\/FIT.2011.28"},{"issue":"1","key":"6_CR29","first-page":"24","volume":"7","author":"S Thorpe","year":"2012","unstructured":"Thorpe, S., Ray, I.: Detecting temporal inconsistency in virtual machine activity timelines. J. Inf. Assur. Secur. 7(1), 24\u201331 (2012)","journal-title":"J. Inf. Assur. Secur."},{"key":"6_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-642-39256-6_7","volume-title":"Data and Applications Security and Privacy XXVII","author":"S Thorpe","year":"2013","unstructured":"Thorpe, S., Ray, I., Grandison, T., Barbir, A., France, R.: Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 97\u2013112. Springer, Heidelberg (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-39256-6_7"},{"issue":"2","key":"6_CR31","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1109\/JSYST.2012.2221958","volume":"7","author":"I Ray","year":"2013","unstructured":"Ray, I., Belyaev, K., Strizhov, M., Mulamba, D., Rajaram, M.: Secure logging as a service delegating log management to the cloud. IEEE Syst. J. 7(2), 323\u2013334 (2013)","journal-title":"IEEE Syst. J."},{"key":"6_CR32","unstructured":"Hyperledger FabricDocs Documentation, Hyperledger. \n                    https:\/\/readthedocs.org\/projects\/hyperledger-fabric\/downloads\/pdf\/latest\/hyperledger-fabric.pdf"}],"container-title":["Communications in Computer and Information Science","Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-7561-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:23:04Z","timestamp":1558398184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-7561-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811375606","9789811375613"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-7561-3_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"30 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISEA-ISAP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security & Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jaipur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 January 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 January 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iseaisap2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isea-sp.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"88","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"21","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3-5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}