{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T14:39:07Z","timestamp":1768401547392,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,25]]},"DOI":"10.1145\/2857218.2857253","type":"proceedings-article","created":{"date-parts":[[2016,1,26]],"date-time":"2016-01-26T13:25:06Z","timestamp":1453814706000},"page":"148-155","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Cloud forensics challenges from a service model standpoint"],"prefix":"10.1145","author":[{"given":"David","family":"Freet","sequence":"first","affiliation":[{"name":"Eastern Kentucky University, Richmond, KY"}]},{"given":"Rajeev","family":"Agrawal","sequence":"additional","affiliation":[{"name":"North Carolina A&amp;T State University, Greensboro, NC"}]},{"given":"Sherin","family":"John","sequence":"additional","affiliation":[{"name":"North Carolina A&amp;T State University, Greensboro, NC"}]},{"given":"Jessie J.","family":"Walker","sequence":"additional","affiliation":[{"name":"University of Arkansas at Pine Bluff, Pine Bluff, AR"}]}],"member":"320","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Market Research Media 2012. Global cloud computing market forecast 2015--2020. Retrieved from: http:\/\/www.marketresearchmedia.com\/2012\/01\/08\/global-cloud-computing-market\/  Market Research Media 2012. Global cloud computing market forecast 2015--2020. Retrieved from: http:\/\/www.marketresearchmedia.com\/2012\/01\/08\/global-cloud-computing-market\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. Masters Thesis","author":"Zawoad S.","year":"2013","unstructured":"Zawoad , S. , and Hasan , R . 2013 . Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. Masters Thesis . University of Alabama at Birmingham Birmingham , Alabama. Zawoad, S., and Hasan, R. 2013. Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. Masters Thesis. University of Alabama at Birmingham Birmingham, Alabama."},{"key":"e_1_3_2_1_3_1","unstructured":"Talbot Chris (May 1 2014). Talkin' Bitglass Report: Security Concerns Limit Cloud Adoption. Retrieved from: http:\/\/talkincloud.com\/cloud-computing-research\/050114\/bitglass-report-security-concerns-limit-cloud-adoption  Talbot Chris (May 1 2014). Talkin' Bitglass Report: Security Concerns Limit Cloud Adoption. Retrieved from: http:\/\/talkincloud.com\/cloud-computing-research\/050114\/bitglass-report-security-concerns-limit-cloud-adoption"},{"key":"e_1_3_2_1_4_1","volume-title":"Gartner Says Cloud Computing Will Become the Bulk of New IT Spend by","author":"Shetty","year":"2016","unstructured":"Shetty , Sony. 2013. Gartner Says Cloud Computing Will Become the Bulk of New IT Spend by 2016 . (October 2013) Retrieved December 12, 2013 from http:\/\/www.gartner.com\/newsroom\/id\/2613015. Shetty, Sony. 2013. Gartner Says Cloud Computing Will Become the Bulk of New IT Spend by 2016. (October 2013) Retrieved December 12, 2013 from http:\/\/www.gartner.com\/newsroom\/id\/2613015."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.20533\/ijmip.2042.4647.2011.0004"},{"key":"e_1_3_2_1_6_1","volume-title":"The NIST definition of cloud computing","author":"Mell T.","year":"2011","unstructured":"P. Mell , and T. Grance , \" The NIST definition of cloud computing ,\" 2011 . P. Mell, and T. Grance, \"The NIST definition of cloud computing,\" 2011."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the IEEE International Symposium on Technologies for Homeland Security","author":"Jackson C.","year":"2014","unstructured":"Jackson , C. , Agrawal R. , Walker , J. & Grosky , W. 2014 . Scenario-based Design for a cloud Forensics Portal . In Proceedings of the IEEE International Symposium on Technologies for Homeland Security , Waltham, MA, USA. Jackson, C., Agrawal R., Walker, J. & Grosky, W. 2014. Scenario-based Design for a cloud Forensics Portal. In Proceedings of the IEEE International Symposium on Technologies for Homeland Security, Waltham, MA, USA."},{"key":"e_1_3_2_1_8_1","volume-title":"Infoworld","author":"Brodkin J.","year":"2008","unstructured":"Brodkin , J. ( 2008 ). Gartner: Seven cloud-computing security risks . Infoworld , 2008, 1--3. Brodkin, J. (2008). Gartner: Seven cloud-computing security risks. Infoworld, 2008, 1--3."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484342"},{"key":"e_1_3_2_1_10_1","volume-title":"ADFSL Conference on Digital Forensics, Security and Law.","author":"Ruan K.","year":"2011","unstructured":"Ruan , K. , Baggili , I. , Carthy , J. , Kechadi , T. 2011 . Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis . ADFSL Conference on Digital Forensics, Security and Law. Ruan, K., Baggili, I., Carthy, J., Kechadi, T. 2011. Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. ADFSL Conference on Digital Forensics, Security and Law."},{"key":"e_1_3_2_1_11_1","volume-title":"K","author":"Paul A.","year":"2012","unstructured":"Paul , A. , Anvekar , K, M. , Rishil , J. , and Chandra , S , K . 2012 . Cyber Forensics in Cloud Computing. Master Thesis. Department of Computer Science and Engineering , NITK, Surathkal, India Paul, A., Anvekar, K, M., Rishil, J., and Chandra, S, K. 2012. Cyber Forensics in Cloud Computing. Master Thesis. Department of Computer Science and Engineering, NITK, Surathkal, India"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2011.17"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDEA.2012.29"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2013.6567430"},{"key":"e_1_3_2_1_15_1","volume-title":"Securing Software as a Service Model of Cloud Computing: Issues and Solutions,\" arXiv preprint arXiv:1309.2426","author":"Rai R.","year":"2013","unstructured":"Rai , R. , Sahoo , G. and Mehfuz , S . \" Securing Software as a Service Model of Cloud Computing: Issues and Solutions,\" arXiv preprint arXiv:1309.2426 , 2013 . Rai, R., Sahoo, G. and Mehfuz, S. \"Securing Software as a Service Model of Cloud Computing: Issues and Solutions,\" arXiv preprint arXiv:1309.2426, 2013."},{"key":"e_1_3_2_1_16_1","volume-title":"S90--S98.","author":"Dykstra J.","year":"2012","unstructured":"Dykstra , J. , & Sherman , A. T. ( 2012 ). Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation, 9 , S90--S98. Dykstra, J., & Sherman, A. T. (2012). Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation, 9, S90--S98."},{"key":"e_1_3_2_1_17_1","volume-title":"Information Science and Technology (CIST), (Oct.","author":"Bouayad A.","year":"2012","unstructured":"Bouayad , A. , Blilat , A. , and Ghazi , M, E ,. 2012 . Cloud computing: Security challenges. 2012 . Information Science and Technology (CIST), (Oct. 2012), 22--24. Bouayad, A., Blilat, A., and Ghazi, M, E,. 2012. Cloud computing: Security challenges. 2012. Information Science and Technology (CIST), (Oct. 2012), 22--24."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.006"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246092"},{"key":"e_1_3_2_1_20_1","volume-title":"The 7th International Conference,(2010)","author":"Dawoud W.","year":"2010","unstructured":"Dawoud , W. , Takouna , I. , and Meinel , C ,. 2010 . Infrastructure as a service security: Challenges and solutions. In Informatics and Systems (INFOS) , The 7th International Conference,(2010) , 1--8. Dawoud, W., Takouna, I., and Meinel, C,. 2010. Infrastructure as a service security: Challenges and solutions. In Informatics and Systems (INFOS), The 7th International Conference,(2010), 1--8."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2011.386"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2011.17"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.001"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982226"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIT.2011.28"},{"key":"e_1_3_2_1_26_1","unstructured":"Krautheim F. J. \"Private virtual infrastructure for cloud computing \" In Proceedings of the 2009 conference on Hot topics in cloud computing (HotCloud'09). USENIX Association Berkeley CA USA.   Krautheim F. J. \"Private virtual infrastructure for cloud computing \" In Proceedings of the 2009 conference on Hot topics in cloud computing (HotCloud'09). USENIX Association Berkeley CA USA."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2011.17"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.84"},{"key":"e_1_3_2_1_29_1","unstructured":"Vaultive Inc 2014. Taking Control of Cloud Data: A Realistic Approach to Encryption of Cloud Data in Use. Retrieved from: http:\/\/www.vaultive.com\/wp-content\/uploads\/2013\/01\/Taking-Control-of-Cloud-Data-A-Realistic-Approach-to-Encryption-of-Cloud-Data-in-Use.pdf  Vaultive Inc 2014. Taking Control of Cloud Data: A Realistic Approach to Encryption of Cloud Data in Use. Retrieved from: http:\/\/www.vaultive.com\/wp-content\/uploads\/2013\/01\/Taking-Control-of-Cloud-Data-A-Realistic-Approach-to-Encryption-of-Cloud-Data-in-Use.pdf"},{"issue":"1","key":"e_1_3_2_1_30_1","first-page":"1","article-title":"2012. A quantitative analysis of current security concerns and solutions for cloud computing","volume":"1","author":"Nelson G.","year":"2012","unstructured":"Nelson , G. , Charles , M. , Fernado , R. , Marcos , S. , Tereza , C. , Mats , N. and Makan , P . 2012. A quantitative analysis of current security concerns and solutions for cloud computing . Journal of Cloud Computing 1 . 1 ( 2012 ): 1 -- 18 . Nelson, G., Charles, M., Fernado, R., Marcos, S., Tereza, C., Mats, N. and Makan, P. 2012. A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing 1.1 (2012): 1--18.","journal-title":"Journal of Cloud Computing"},{"key":"e_1_3_2_1_31_1","volume-title":"CSA TCI Reference Architecture. https:\/\/cloudsecurityalliance. org\/wp-content\/uploads\/2011\/11\/TCI-Reference-Architecture-1.1.pdf","author":"CSA","year":"2011","unstructured":"CSA ( 2011 ) CSA TCI Reference Architecture. https:\/\/cloudsecurityalliance. org\/wp-content\/uploads\/2011\/11\/TCI-Reference-Architecture-1.1.pdf CSA (2011) CSA TCI Reference Architecture. https:\/\/cloudsecurityalliance. org\/wp-content\/uploads\/2011\/11\/TCI-Reference-Architecture-1.1.pdf"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.113"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-011-0035-x"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2245365"},{"key":"e_1_3_2_1_35_1","volume-title":"Cloud Computing Security Requirements and Solutions: a Systematic Literature Review. Master's Thesis","author":"H\u00f6ner P.","unstructured":"H\u00f6ner , P. 2013. Cloud Computing Security Requirements and Solutions: a Systematic Literature Review. Master's Thesis , University of Twente , 7500AE Enschede, The Netherlands. H\u00f6ner, P. 2013. Cloud Computing Security Requirements and Solutions: a Systematic Literature Review. Master's Thesis, University of Twente, 7500AE Enschede, The Netherlands."}],"event":{"name":"MEDES '15: The 7th International Conference on Management of computational and collective IntElligence in Digital EcoSystems","location":"Caraguatatuba Brazil","acronym":"MEDES '15","sponsor":["The French Chapter of ACM Special Interest Group on Applied Computing","IFSP Federal Institute of S\u00e3o Paulo","SIGAPP ACM Special Interest Group on Applied Computing"]},"container-title":["Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital EcoSystems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2857218.2857253","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2857218.2857253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:08Z","timestamp":1750221548000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2857218.2857253"}},"subtitle":["IaaS, PaaS and SaaS"],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"references-count":35,"alternative-id":["10.1145\/2857218.2857253","10.1145\/2857218"],"URL":"https:\/\/doi.org\/10.1145\/2857218.2857253","relation":{},"subject":[],"published":{"date-parts":[[2015,10,25]]},"assertion":[{"value":"2015-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}