{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:16:25Z","timestamp":1726060585685},"publisher-location":"Singapore","reference-count":20,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811501838"},{"type":"electronic","value":"9789811501845"}],"license":[{"start":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T00:00:00Z","timestamp":1574899200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-0184-5_9","type":"book-chapter","created":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T07:04:06Z","timestamp":1574838246000},"page":"91-107","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Role of Cloud Forensics in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Shaik Khaja","family":"Mohiddin","sequence":"first","affiliation":[]},{"given":"Yalavarthi Suresh","family":"Babu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,28]]},"reference":[{"key":"9_CR1","unstructured":"Hu, et al.: Advantages and disadvantages of different cloud types (2011)"},{"issue":"2","key":"9_CR2","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1108\/13639510610684674","volume":"29","author":"R Broadhurst","year":"2006","unstructured":"Broadhurst, R.: Developments in the global law enforcement of cyber crime. Policing Int. J. Police Strat. Manage. 29(2), 408\u2013433 (2006)","journal-title":"Policing Int. J. Police Strat. Manage."},{"key":"9_CR3","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/978-3-642-04155-6_20","volume-title":"Advances in Digital Forensics V","author":"Sydney Liles","year":"2009","unstructured":"Liles, S., Rogers, M., Hoebich, M.: A survey of the legal issues facing digital forensic experts. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics V. Springer, Heidelberg, Germany, pp. 267\u2013276 (2009)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Khaja Mohiddin, S., Yalavarthi, S.B., Kondragunta, V.: An analytical comparative approach of cloud forensic tools during cyber attacks in cloud. In: Bansal, J., Das, K., Nagar, A., Deep, K., Ojha, A. (eds.) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol. 817. Springer, Singapore (2019)","DOI":"10.1007\/978-981-13-1595-4_41"},{"key":"9_CR5","unstructured":"Wu, H., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 18\u201321. IEEE Computer Society, Washington, DC, USA (2010)"},{"key":"9_CR6","unstructured":"Morsy, M.A., Grundy, J., M\u00fcller, I.: An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia (2010)"},{"key":"9_CR7","unstructured":"Garfinkel, T., Rosenblum, M.: When virtual is harder than real: security challenges in virtual machine based computing environments. In: Proceedings of the 10th Conference on Hot Topics in Operating Systems, Santa Fe, NM, vol. 10, pp. 227\u2013229. USENIX Association Berkeley, CA, USA (2005)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Wang, Z., Jiang, X.: HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 380\u2013395. IEEE Computer Society, Washington, DC, USA (2010)","DOI":"10.1109\/SP.2010.30"},{"key":"9_CR9","volume-title":"Securing the cloud: cloud computer security techniques and tactics","author":"V Winkler","year":"2011","unstructured":"Winkler, V.: Securing the cloud: cloud computer security techniques and tactics. Elsevier Inc., Waltham, MA (2011)"},{"key":"9_CR10","unstructured":"Dawoud, W., Takouna, I., Meinel, C.: Infrastructure as a service security: challenges and solutions. In: The 7th International Conference on Informatics and Systems (INFOS), Potsdam, Germany, pp. 1\u20138. IEEE Computer Society, Washington, DC, USA (2010)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, pp. 199\u2013212. ACM, New York, NY, USA (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Townsend, M.: Managing a security program in a cloud computing environment. In: Information Security Curriculum Development Conference, Kennesaw, Georgia, pp. 128\u2013133. ACM, New York, NY, USA (2009)","DOI":"10.1145\/1940976.1941001"},{"issue":"2","key":"9_CR13","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2010.115","volume":"9","author":"B Grobauer","year":"2011","unstructured":"Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50\u201357 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"9_CR14","unstructured":"Ertaul, L., Singhal, S., G\u00f6kay, S.: Security challenges in cloud computing. In: Proceedings of the 2010 International conference on Security and Management SAM\u201910, pp. 36\u201342. CSREA Press, Las Vegas, USA (2010)"},{"key":"9_CR15","unstructured":"ENISA: Cloud Computing: benefits, risks and recommendations for information security (2009)"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Jansen, W.A.: Cloud hooks: security and privacy issues in cloud computing. In: Proceedings of the 44th Hawaii international conference on system sciences, Koloa, Kauai, HI, pp. 1\u201310. IEEE Computer Society, Washington, DC, USA (2011)","DOI":"10.1109\/HICSS.2011.103"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Jasti, A., Shah, P., Nagaraj, R., Pendse, R.: Security in multi-tenancy cloud. In: IEEE International Carnahan Conference on Security Technology (ICCST), KS, USA, pp. 35\u201341. IEEE Computer Society, Washington, DC, USA (2010)","DOI":"10.1109\/CCST.2010.5678682"},{"key":"9_CR18","unstructured":"Cloud Security Alliance: Top threats to cloud computing V1.0. Available: \nhttps:\/\/cloudsecurityalliance.org\/research\/top-threats\n\n (2010)"},{"key":"9_CR19","unstructured":"https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project\n\n (2010)"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., et al.: J. Internet Serv. Appl. 4, 5 (2013). \nhttps:\/\/doi.org\/10.1186\/1869-0238-4-5","journal-title":"J. Internet Serv. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-0184-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,27]],"date-time":"2019-11-27T07:22:48Z","timestamp":1574839368000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-0184-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,28]]},"ISBN":["9789811501838","9789811501845"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-0184-5_9","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,28]]},"assertion":[{"value":"28 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}