{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T00:43:00Z","timestamp":1769128980573,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,3]],"date-time":"2018-08-03T00:00:00Z","timestamp":1533254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,3]]},"DOI":"10.1145\/3264560.3264565","type":"proceedings-article","created":{"date-parts":[[2018,10,1]],"date-time":"2018-10-01T12:16:08Z","timestamp":1538396168000},"page":"6-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Challenges and Solutions in Cloud Forensics"],"prefix":"10.1145","author":[{"given":"Syed Ahmed","family":"Ali","sequence":"first","affiliation":[{"name":"Institute of Information and Communication Technology, University of Sindh, Pakistan"}]},{"given":"Shahzad","family":"Memon","sequence":"additional","affiliation":[{"name":"Institute of Information and Communication Technology, University of Sindh, Pakistan"}]},{"given":"Farhan","family":"Sahito","sequence":"additional","affiliation":[{"name":"Office of Legal Affairs (OLA), Data Protection &amp; Programmes (DPP), INTERPOL General Secretariat, Lyon, France"}]}],"member":"320","published-online":{"date-parts":[[2018,8,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The Impact of Cloud Forensic Readiness on Security. 7th Int. Conf. Cloud Comput. Serv. Sci. Closer","author":"Alenezi Ahmed","year":"2017","unstructured":"Ahmed Alenezi , Nurul H N Zulkipli , Hany F Atlam , Robert J Walters , and Gary B Wills . 2017 . The Impact of Cloud Forensic Readiness on Security. 7th Int. Conf. Cloud Comput. Serv. Sci. Closer (2017), 511--517. Ahmed Alenezi, Nurul H N Zulkipli, Hany F Atlam, Robert J Walters, and Gary B Wills. 2017. The Impact of Cloud Forensic Readiness on Security. 7th Int. Conf. Cloud Comput. Serv. Sci. Closer (2017), 511--517."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.02.006"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17485\/ijst\/2017\/v10i18\/112116","article-title":"Emphasizing on Various Security Issues in Cloud Forensic Framework","volume":"10","author":"Chauhan Pranay","year":"2017","unstructured":"Pranay Chauhan and Pratosh Bansal . 2017 . Emphasizing on Various Security Issues in Cloud Forensic Framework . Indian J. Sci. Technol. 10 , 18 (2017), 1 -- 7 . Pranay Chauhan and Pratosh Bansal. 2017. Emphasizing on Various Security Issues in Cloud Forensic Framework. Indian J. Sci. Technol. 10, 18 (2017), 1--7.","journal-title":"Indian J. Sci. Technol."},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"Review on Cloud Forensics","volume":"145","author":"Datta Suchana","year":"2016","unstructured":"Suchana Datta . 2016 . Review on Cloud Forensics : An Open Discussion on Challenges and Capabilities. 145 , 1 (2016), 1 -- 8 . Suchana Datta. 2016. Review on Cloud Forensics: An Open Discussion on Challenges and Capabilities. 145, 1 (2016), 1--8.","journal-title":"An Open Discussion on Challenges and Capabilities."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Muhammad Irfan Haider Abbas Yunchuan Sun Anam Sajid and Maruf Pasha. 2016. A framework for cloud forensics evidence collection and analysis using security information and event management. (2016).  Muhammad Irfan Haider Abbas Yunchuan Sun Anam Sajid and Maruf Pasha. 2016. A framework for cloud forensics evidence collection and analysis using security information and event management. (2016).","DOI":"10.1002\/sec.1538"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/I4CT.2014.6914202"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.07.001"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Peter Mell and Timothy Grance. 2011. The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology. Natl. Inst. Stand. Technol. Inf. Technol. Lab. 145 (2011) 7.  Peter Mell and Timothy Grance. 2011. The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology. Natl. Inst. Stand. Technol. Inf. Technol. Lab. 145 (2011) 7.","DOI":"10.6028\/NIST.SP.800-145"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. - 15th Int. Symp. Parallel Distrib. Comput. ISPDC 2016","author":"Nanda Saurav","year":"2017","unstructured":"Saurav Nanda and Raymond A. Hansen . 2017. Forensics as a service: Three-tier architecture for cloud based forensic analysis . Proc. - 15th Int. Symp. Parallel Distrib. Comput. ISPDC 2016 ( 2017 ), 178--183. Saurav Nanda and Raymond A. Hansen. 2017. Forensics as a service: Three-tier architecture for cloud based forensic analysis. Proc. - 15th Int. Symp. Parallel Distrib. Comput. ISPDC 2016 (2017), 178--183."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.03.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2535295"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Keyun Ruan Joe Carthy Tahar Kechadi and Mark Crosbie. 2011. Chapter 3 CLOUD FORENSICS. (2011) 35--46.  Keyun Ruan Joe Carthy Tahar Kechadi and Mark Crosbie. 2011. Chapter 3 CLOUD FORENSICS. (2011) 35--46.","DOI":"10.1007\/978-3-642-24212-0_3"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Palash Santra Asmita Roy Sadip Midya and Koushik Majumder. 2018. Log-Based Cloud Forensic Techniques: A Comparative Study. (2018).  Palash Santra Asmita Roy Sadip Midya and Koushik Majumder. 2018. Log-Based Cloud Forensic Techniques: A Comparative Study. (2018).","DOI":"10.1007\/978-981-10-4600-1_5"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Stavros Simou Christos Kalloniatis and Stefanos Gritzalis. 2017. Trust Privacy and Security in Digital Business. 10442 (2017) 147--163.  Stavros Simou Christos Kalloniatis and Stefanos Gritzalis. 2017. Trust Privacy and Security in Digital Business. 10442 (2017) 147--163.","DOI":"10.1007\/978-3-319-64483-7_10"}],"event":{"name":"ICCBDC'18: 2018 2nd International Conference on Cloud and Big Data Computing","location":"Barcelona Spain","acronym":"ICCBDC'18","sponsor":["Brookes Oxford Brookes University","Northumbria University University of Northumbria at Newcastle"]},"container-title":["Proceedings of the 2018 2nd International Conference on Cloud and Big Data Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264560.3264565","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3264560.3264565","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:39:35Z","timestamp":1750235975000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3264560.3264565"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,3]]},"references-count":14,"alternative-id":["10.1145\/3264560.3264565","10.1145\/3264560"],"URL":"https:\/\/doi.org\/10.1145\/3264560.3264565","relation":{},"subject":[],"published":{"date-parts":[[2018,8,3]]},"assertion":[{"value":"2018-08-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}