{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T16:29:57Z","timestamp":1776184197136,"version":"3.50.1"},"reference-count":148,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:00:00Z","timestamp":1704844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF)","doi-asserted-by":"publisher","award":["RS-2022-00144000"],"award-info":[{"award-number":["RS-2022-00144000"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF)","doi-asserted-by":"publisher","award":["RS-2022-00165225"],"award-info":[{"award-number":["RS-2022-00165225"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea (NRF)","doi-asserted-by":"publisher","award":["2022-0-01200"],"award-info":[{"award-number":["2022-0-01200"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Institute for Information &amp; Communications Technology Planning &amp; Evaluation (IITP)","award":["RS-2022-00144000"],"award-info":[{"award-number":["RS-2022-00144000"]}]},{"name":"Institute for Information &amp; Communications Technology Planning &amp; Evaluation (IITP)","award":["RS-2022-00165225"],"award-info":[{"award-number":["RS-2022-00165225"]}]},{"name":"Institute for Information &amp; Communications Technology Planning &amp; Evaluation (IITP)","award":["2022-0-01200"],"award-info":[{"award-number":["2022-0-01200"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Cloud computing technology is rapidly becoming ubiquitous and indispensable. However, its widespread adoption also exposes organizations and individuals to a broad spectrum of potential threats. Despite the multiple advantages the cloud offers, organizations remain cautious about migrating their data and applications to the cloud due to fears of data breaches and security compromises. In light of these concerns, this study has conducted an in-depth examination of a variety of articles to enhance the comprehension of the challenges related to safeguarding and fortifying data within the cloud environment. Furthermore, the research has scrutinized several well-documented data breaches, analyzing the financial consequences they inflicted. Additionally, it scrutinizes the distinctions between conventional digital forensics and the forensic procedures specific to cloud computing. As a result of this investigation, the study has concluded by proposing potential opportunities for further research in this critical domain. By doing so, it contributes to our collective understanding of the complex panorama of cloud data protection and security, while acknowledging the evolving nature of technology and the need for ongoing exploration and innovation in this field. This study also helps in understanding the compound annual growth rate (CAGR) of cloud digital forensics, which is found to be quite high at \u224816.53% from 2023 to 2031. Moreover, its market is expected to reach \u2248USD 36.9 billion by the year 2031; presently, it is \u2248USD 11.21 billion, which shows that there are great opportunities for investment in this area. This study also strategically addresses emerging challenges in cloud digital forensics, providing a comprehensive approach to navigating and overcoming the complexities associated with the evolving landscape of cloud computing.<\/jats:p>","DOI":"10.3390\/s24020433","type":"journal-article","created":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T09:39:57Z","timestamp":1704879597000},"page":"433","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8412-7655","authenticated-orcid":false,"given":"Annas Wasim","family":"Malik","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, University of Central Punjab, Lahore 54590, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7314-9517","authenticated-orcid":false,"given":"David Samuel","family":"Bhatti","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Central Punjab, Lahore 54590, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9057-9201","authenticated-orcid":false,"given":"Tae-Jin","family":"Park","sequence":"additional","affiliation":[{"name":"Nuclear System Integrity Sensing & Diagnosis Division, Korea Atomic Energy Research Institute (KAERI), Daejeon 34057, Republic of Korea"}]},{"given":"Hafiz Usama","family":"Ishtiaq","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Central Punjab, Lahore 54590, Pakistan"}]},{"given":"Jae-Cheol","family":"Ryou","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chungnam National University, Daejeon 34134, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8366-3533","authenticated-orcid":false,"given":"Ki-Il","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Chungnam National University, Daejeon 34134, Republic of Korea"}]}],"member":"1968","published-online":{"date-parts":[[2024,1,10]]},"reference":[{"key":"ref_1","unstructured":"Mell, P., and Grance, T. (2023, November 01). The NIST Definition of Cloud Computing, Available online: https:\/\/csrc.nist.gov\/pubs\/sp\/800\/145\/final."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Badger, M.L., Grance, T., Patt-Corner, R., and Voas, J.M. (2012). Cloud Computing Synopsis and Recommendations, National Institute of Standards & Technology.","DOI":"10.6028\/NIST.SP.800-146"},{"key":"ref_3","unstructured":"International Data Group (2023, November 01). 2020 Cloud Computing Study. Available online: https:\/\/www.idg.com\/tools-for-marketers\/2020-cloud-computing-study\/."},{"key":"ref_4","unstructured":"Costello, K., and Rimol, M. (2023, November 01). Gartner Forecasts Worldwide Public Cloud End-User Spending to Grow 18% in 2021. Gartner. Available online: https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2020-11-17-gartner-forecasts-worldwide-public-cloud-end-user-spending-to-grow-18-percent-in-2021."},{"key":"ref_5","unstructured":"Davidson, M.A. (2023, November 01). Oracle and KPMG Cloud Threat Report 2020. Available online: https:\/\/www.oracle.com\/security\/cloud-threat-report\/."},{"key":"ref_6","unstructured":"IBM (2023, November 01). Cost of a Data Breach Report 2020. Available online: https:\/\/www.ibm.com\/security\/digital-assets\/cost-data-breach-report\/#\/."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Barona, R., and Anita, E.M. (2017, January 20\u201321). A survey on data breach challenges in cloud computing security: Issues and threats. Proceedings of the 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), Kollam, India.","DOI":"10.1109\/ICCPCT.2017.8074287"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Carroll, M., Van Der Merwe, A., and Kotze, P. (2011, January 15\u201317). Secure cloud computing: Benefits, risks and controls. Proceedings of the 2011 Information Security for South Africa, Johannesburg, South Africa.","DOI":"10.1109\/ISSA.2011.6027519"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sun, H., He, R., Zhang, Y., Wang, R., Ip, W.H., and Yung, K.L. (2018). eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology. Sensors, 18.","DOI":"10.3390\/s18113807"},{"key":"ref_10","first-page":"202706103","article-title":"A Survey of Various Frameworks and Solutions in all Branches of Digital Forensics with a Focus on Cloud Forensics","volume":"10","author":"Khanafseh","year":"2019","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_11","unstructured":"Khodayarseresht, E., and Majumdar, S. (2023). Innovations in Digital Forensics, World Scientific."},{"key":"ref_12","unstructured":"Abdalla, S., Hazem, S., and Hashem, S. (2007, January 18\u201320). Guideline model for digital forensic investigation. Proceedings of the Conference on Digital Forensics, Security and Law, Alexandria, VA, USA."},{"key":"ref_13","unstructured":"Carrier, B. (2005). File System Forensic Analysis, Addison-Wesley Professional."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1791491","DOI":"10.1155\/2022\/1791491","article-title":"Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications","volume":"2022","author":"Raghavendra","year":"2022","journal-title":"Secur. Commun. Netw."},{"key":"ref_15","unstructured":"Surange, G., and Khatri, P. (2021, January 17\u201319). IoT forensics: A review on current trends, approaches and foreseen challenges. Proceedings of the 2021 8th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.procs.2017.06.124","article-title":"A comprehensive survey on security in cloud computing","volume":"110","author":"Ramachandra","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_17","first-page":"1287","article-title":"Cloud computing security breaches and threats analysis","volume":"8","author":"Mozumder","year":"2017","journal-title":"Int. J. Sci. Eng. Res."},{"key":"ref_18","first-page":"79","article-title":"Taxonomy for identification of security issues in cloud computing environments","volume":"58","author":"Ahmed","year":"2018","journal-title":"J. Comput. Inf. Syst."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Basu, S., Bardhan, A., Gupta, K., Saha, P., Pal, M., Bose, M., Basu, K., Chaudhury, S., and Sarkar, P. (2018, January 8\u201310). Cloud computing security challenges & solutions-A survey. Proceedings of the 2018 IEEE 8th Annual Computing and CommunicationWorkshop and Conference (CCWC), Las Vegas, NV, USA.","DOI":"10.1109\/CCWC.2018.8301700"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Ahmed, M., Kambam, H.R., Liu, Y., and Uddin, M.N. (2019, January 7\u20139). Impact of Human Factors in Cloud Data Breach. Proceedings of the International Conference on Intelligent and Interactive Systems and Applications, Las Palmas de Gran Canaria, Spain.","DOI":"10.1007\/978-3-030-34387-3_70"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3361216","article-title":"A systematic survey on cloud forensics challenges, solutions, and future directions","volume":"52","author":"Manral","year":"2019","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Chen, L., Le-Khac, N.A., Schlepphorst, S., and Xu, L. (2019). Security, Privacy, and Digital Forensics in the Cloud, Wiley.","DOI":"10.1002\/9781119053385"},{"key":"ref_23","unstructured":"Khan, Y., and Varma, S. (2020). Social Networking and Computational Intelligence, Springer."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"e4178","DOI":"10.1002\/ett.4178","article-title":"TamForen: A tamper-proof cloud forensic framework","volume":"33","author":"Ye","year":"2022","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_25","unstructured":"Schlepphorst, S., Choo, K.K.R., and Le-Khac, N.A. (2020). Cyber and Digital Forensic Investigations: A Law Enforcement Practitioner\u2019s Perspective, Springer."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"699","DOI":"10.1007\/s12065-020-00410-y","article-title":"Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based SVNN","volume":"14","author":"Tummalapalli","year":"2021","journal-title":"Evol. Intell."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s11831-021-09575-w","article-title":"A Comprehensive Study of Cloud Forensics","volume":"29","author":"Purnaye","year":"2021","journal-title":"Arch. Comput. Methods Eng."},{"key":"ref_28","unstructured":"Alenezi, A.M. (2023). Digital and Cloud Forensic Challenges. arXiv."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Abdulsalam, Y.S., and Hedabou, M. (2021). Security and privacy in cloud computing: Technical review. Future Internet, 14.","DOI":"10.3390\/fi14010011"},{"key":"ref_30","unstructured":"Voorsluys, W., Broberg, J., and Buyya, R. (2011). Cloud Computing: Principles and Paradigms, John Wiley & Sons."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1016\/j.diin.2013.02.004","article-title":"Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results","volume":"10","author":"Ruan","year":"2013","journal-title":"Digit. Investig."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"57792","DOI":"10.1109\/ACCESS.2021.3073203","article-title":"A systematic literature review on cloud computing security: Threats and mitigation strategies","volume":"9","author":"Alouffi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_33","first-page":"702","article-title":"Disaster recovery in cloud computing systems: An overview","volume":"11","author":"Abualkishik","year":"2020","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Hasselgren, A., Wan, P., Horn, M., Kralevska, K., Gligoroski, D., and Faxvaag, A. (2020). GDPR Compliance for Blockchain Applications in Healthcare. arXiv.","DOI":"10.5121\/csit.2020.101303"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"100581","DOI":"10.1016\/j.jocs.2016.11.011","article-title":"Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability","volume":"36","author":"Tchernykh","year":"2019","journal-title":"J. Comput. Sci."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.asej.2019.03.002","article-title":"Integrity and confidentiality in cloud outsourced data","volume":"10","author":"Rady","year":"2019","journal-title":"Ain Shams Eng. J."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.jnca.2015.11.014","article-title":"Availability in the cloud: State of the art","volume":"60","author":"Nabi","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"El-Yahyaoui, A., and El Kettani, M.D.E.C. (2018, January 3\u20135). Data privacy in cloud computing. Proceedings of the 2018 4th International Conference on Computer and Technology Applications (ICCTA), Istanbul, Turkey.","DOI":"10.1109\/CATA.2018.8398650"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Karthiban, K., and Smys, S. (2018, January 19\u201320). Privacy preserving approaches in cloud computing. Proceedings of the 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India.","DOI":"10.1109\/ICISC.2018.8399115"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"131723","DOI":"10.1109\/ACCESS.2020.3009876","article-title":"Data security and privacy protection for cloud storage: A survey","volume":"8","author":"Yang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Banday, M.T., and Mehraj, S. (2017, January 21\u201323). Directory services for identity and access management in cloud computing. Proceedings of the 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Tumkur, India.","DOI":"10.1109\/ICATCCT.2017.8389157"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.procs.2016.03.117","article-title":"Identity and access management as security-as-a-service from clouds","volume":"79","author":"Sharma","year":"2016","journal-title":"Procedia Comput. Sci."},{"key":"ref_43","unstructured":"Nickel, J. (2019). Mastering Identity and Access Management with Microsoft Azure: Empower Users by Managing and Protecting Identities and Data, Packt Publishing Ltd."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MCC.2018.064181121","article-title":"Cloud computing and the new EU general data protection regulation","volume":"5","author":"Russo","year":"2018","journal-title":"IEEE Cloud Comput."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"012106","DOI":"10.1088\/1757-899X\/160\/1\/012106","article-title":"Reviews on Security Issues and Challenges in Cloud Computing","volume":"160","author":"An","year":"2016","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Aissaoui, K., Belhadaoui, H., and Rifi, M. (2017, January 19\u201320). Survey on data remanence in Cloud Computing environment. Proceedings of the 2017 International Conference onWireless Technologies, Embedded and Intelligent Systems (WITS), Fez, Morocco.","DOI":"10.1109\/WITS.2017.7934624"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Tamimi, A.A., Dawood, R., and Sadaqa, L. (2019, January 9\u201311). Disaster recovery techniques in cloud computing. Proceedings of the 2019 IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology (JEEIT), Amman, Jordan.","DOI":"10.1109\/JEEIT.2019.8717450"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Odun-Ayo, I., Misra, S., Abayomi-Alli, O., and Ajayi, O. (2017, January 5\u20138). Cloud multi-tenancy: Issues and developments. Proceedings of the Companion Proceedings of the10th International Conference on Utility and Cloud Computing, Austin, TX, USA.","DOI":"10.1145\/3147234.3148095"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Ong, Y.J., Qiao, M., Routray, R., and Raphael, R. (2017, January 25\u201330). Context-aware data loss prevention for cloud storage services. Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA.","DOI":"10.1109\/CLOUD.2017.58"},{"key":"ref_50","first-page":"185","article-title":"Enhancing Features of Cloud Computing Using Cloud Access Security Brokers to Avoid Data Breaches","volume":"4","author":"Kaur","year":"2019","journal-title":"Eur. J. Eng. Technol. Res."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Diamantopoulou, V., Tsohou, A., and Karyda, M. (2019, January 26\u201327). From ISO\/IEC 27002:2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. Proceedings of the Computer Security: ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg.","DOI":"10.1007\/978-3-030-42048-2_16"},{"key":"ref_52","unstructured":"Achten, A. (2023, November 01). Data Breach Report. Available online: https:\/\/www.idtheftcenter.org\/wp-content\/uploads\/2023\/01\/ITRC_2022-Data-Breach-Report_Final-1.pdf."},{"key":"ref_53","unstructured":"Botha, J., Grobler, M., and Eloff, M. (2017, January 29\u201330). Global data breaches responsible for the disclosure of personal information: 2015 & 2016. Proceedings of the European Conference on CyberWarfare and Security, Academic Conferences International Limited, Dublin, Ireland."},{"key":"ref_54","first-page":"19","article-title":"Data breaches as top security concern in cloud computing","volume":"119","author":"Patil","year":"2018","journal-title":"Int. J. Pure Appl. Math."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Zuo, C., Lin, Z., and Zhang, Y. (2019, January 19\u201323). Why does your data leak? uncovering the data leakage in cloud from mobile apps. Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA.","DOI":"10.1109\/SP.2019.00009"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Mondal, A., and Chatterjee, P.S. (2022, January 14\u201316). A Systematic Literature Survey on Data Security Techniques in a Cloud Environment. Proceedings of the 2022 OITS International Conference on Information Technology (OCIT), Bhubaneswar, India.","DOI":"10.1109\/OCIT56763.2022.00090"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Mayhew, K., and Chen, W. (2019, January 27\u201329). Blockchain-Can It Solve the Security Issues and Fraud Expenses for Credit Card Commerce?. Proceedings of the 2019 IEEE 5th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing,(HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Washington, DC, USA.","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2019.00018"},{"key":"ref_58","unstructured":"Mishra, A., Gupta, N., and Gupta, B.B. (2020). Modern Principles, Practices, and Algorithms for Cloud Security, IGI Global."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Chun, S.H. (2019). E-commerce liability and security breaches in mobile payment for e-business sustainability. Sustainability, 11.","DOI":"10.3390\/su11030715"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Chen, D., Chowdhury, M.M., and Latif, S. (2021, January 7\u20138). Data Breaches in Corporate Setting. Proceedings of the 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Mauritius, Mauritius.","DOI":"10.1109\/ICECCME52200.2021.9590974"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/S1353-4858(20)30079-9","article-title":"The 2020 Data Breach Investigations Report\u2013a CSO\u2019s perspective","volume":"2020","author":"Jartelius","year":"2020","journal-title":"Netw. Secur."},{"key":"ref_62","unstructured":"MSRC (2023, November 01). Investigation Regarding Misconfigured Microsoft Storage Location. Misconfiguration in a Microsoft Cloud Database Resulting in Data Exposure without Proper access Controls. Available online: https:\/\/msrc.microsoft.com\/blog\/2022\/10\/investigation-regarding-misconfigured-microsoft-storage-location-2\/."},{"key":"ref_63","unstructured":"Micro, T. (2023, November 01). Data on 123 Million US Households Exposed Due to Misconfigured AWS S3 Bucket. Available online: https:\/\/www.trendmicro.com."},{"key":"ref_64","unstructured":"Tripwire (2021). Misconfigured Elasticsearch Cluster Exposed over 90 Million Records, Tripwire."},{"key":"ref_65","unstructured":"Tamari, S. (2023, November 01). Compromised Microsoft Key: More Impactful than We Thought: Wiz Blog. Available online: https:\/\/www.schneier.com\/blog\/archives\/2023\/08\/microsoft-signing-key-stolen-by-chinese.html."},{"key":"ref_66","unstructured":"Dive, C. (2023, November 01). LastPass Cyberattack Timeline. Available online: https:\/\/www.cybersecuritydive.com\/news\/lastpass-cyberattack-timeline\/643958\/."},{"key":"ref_67","unstructured":"Krebs, B. (2023, November 01). Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach. Available online: https:\/\/krebsonsecurity.com\/2023\/09\/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach\/."},{"key":"ref_68","first-page":"1747","article-title":"Enhancement in privacy preservation in cloud computing using apriori algorithm","volume":"26","author":"Mustafa","year":"2022","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"key":"ref_69","unstructured":"Oxford Analytica (2023). LastPass breach underlines critical cyber trends. Emerald Expert Briefings."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Ren, Y., Zhu, F., Qi, J., Wang, J., and Sangaiah, A.K. (2019). Identity management and access control based on blockchain under edge computing for the industrial internet of things. Appl. Sci., 9.","DOI":"10.3390\/app9102058"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Fan, K., Wang, J., Wang, X., Li, H., and Yang, Y. (2017). A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing. Sensors, 17.","DOI":"10.3390\/s17071695"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"L\u2019Esteve, R.C. (2023). The Cloud Leader\u2019s Handbook: Strategically Innovate, Transform, and Scale Organizations, Springer.","DOI":"10.1007\/978-1-4842-9526-7"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1016\/j.procs.2022.09.103","article-title":"Cloud Adoption Framework","volume":"207","year":"2022","journal-title":"Procedia Comput. Sci."},{"key":"ref_74","unstructured":"Sharma, S., Gupta, G., and Laxmi, P. (2014). A survey on cloud security issues and techniques. arXiv."},{"key":"ref_75","first-page":"539","article-title":"The impact of cloud forensic readiness on security","volume":"Volume 2","author":"Alenezi","year":"2017","journal-title":"Proceedings of the International Conference on Cloud Computing and Services Science"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Bella, H.K., and Vasundra, S. (2022, January 20\u201322). A study of security threats and attacks in cloud computing. Proceedings of the 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India.","DOI":"10.1109\/ICSSIT53264.2022.9716317"},{"key":"ref_77","unstructured":"Casey, E. (2011). Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Academic Press."},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1080\/13501763.2023.2173274","article-title":"Regulatory cybersecurity governance in the making: The formation of ENISA and its struggle for epistemic authority","volume":"30","author":"Smeets","year":"2023","journal-title":"J. Eur. Public Policy"},{"key":"ref_79","unstructured":"Mondschein, C.F., and Monda, C. (2019). Fundamentals of Clinical Data Science, Springer."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Herman, M., Herman, M., Iorga, M., Salim, A.M., Jackson, R.H., Hurst, M.R., Leo, R., Lee, R., Landreville, N.M., and Mishra, A.K. (2020). Nist Cloud Computing Forensic Science Challenges, US Department of Commerce, National Institute of Standards and Technology.","DOI":"10.6028\/NIST.IR.8006"},{"key":"ref_81","unstructured":"(2023, November 01). ISO & IEC ISO. Available online: https:\/\/www.iso.org\/standard\/43757.html?browse=tc."},{"key":"ref_82","unstructured":"(2023, November 01). ISO & IEC ISO. Available online: https:\/\/www.iso.org\/standard\/76559.html?browse=tc."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Doshi, R., and Kute, V. (2020, January 24\u201325). A review paper on security concerns in cloud computing and proposed security models. Proceedings of the 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE), Vellore, India.","DOI":"10.1109\/ic-ETITE47903.2020.37"},{"key":"ref_84","unstructured":"FedRAMP (2023, November 01). Federal Risk and Authorization Management Program (FedRAMP\u00ae), Available online: https:\/\/www.fedramp.gov\/program-basics\/."},{"key":"ref_85","unstructured":"Kamil, N.E.F.M., Samy, G.N., Perumal, S., Magalingam, P., Hassan, N.H., and Perumal, S. (2022, January 7\u20138). A Cloud Computing Adoption Challenges in Financial Institution. Proceedings of the 7th International Conference on Information Technology &Society, Selangor, Malaysia."},{"key":"ref_86","unstructured":"(2023, October 30). HIPAA-Health Insurance Portability and Accountability Act, Available online: https:\/\/www.hhs.gov\/hipaa\/index.html."},{"key":"ref_87","unstructured":"(2013). Information Technology\u2013Security Techniques\u2013Information Security Management Systems\u2013Requirements (Standard No. ISO\/IEC 27001). Available online: https:\/\/www.iso.org\/standard\/54534.html."},{"key":"ref_88","first-page":"2425","article-title":"Cyber threats: Taxonomy, impact, policies, and way forward","volume":"16","author":"Malik","year":"2022","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.compeleceng.2017.02.006","article-title":"Forensics framework for cloud computing","volume":"60","author":"Alex","year":"2017","journal-title":"Comput. Electr. Eng."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1007\/s10776-022-00560-z","article-title":"Cloud-Based Framework for Performing Digital Forensic Investigations","volume":"29","author":"Prakash","year":"2022","journal-title":"Int. J. Wirel. Inf. Netw."},{"key":"ref_91","unstructured":"Materese, R. (2023, November 01). Digital Evidence, Available online: https:\/\/www.nist.gov\/digital-evidence."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i17\/93051","article-title":"Challenges of digital forensics in cloud computing environment","volume":"9","author":"Rani","year":"2016","journal-title":"Indian J. Sci. Technol."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Zawoad, S., Hasan, R., and Skjellum, A. (July, January 27). OCF: An open cloud forensics model for reliable digital forensics. Proceedings of the 2015 IEEE 8th International Conference on Cloud Computing, New York, NY, USA.","DOI":"10.1109\/CLOUD.2015.65"},{"key":"ref_94","first-page":"2","article-title":"Evidential Reasoning for Forensic Readiness","volume":"11","author":"Liao","year":"2016","journal-title":"J. Digit. Forensics, Secur. Law"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Moreb, M. (2022). Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices, Springer.","DOI":"10.1007\/978-1-4842-8026-3"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/s42979-020-00285-x","article-title":"Forensic investigation of google assistant","volume":"1","author":"Akinbi","year":"2020","journal-title":"SN Comput. Sci."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Davenport, T.H., and Miller, S.M. (2022). Working with AI: Real Stories of Human-Machine Collaboration, MIT Press.","DOI":"10.7551\/mitpress\/14453.001.0001"},{"key":"ref_98","unstructured":"(2023, November 01). Volatility Foundation. Volatility Framework. Available online: https:\/\/www.volatilityfoundation.org\/."},{"key":"ref_99","unstructured":"(2023, November 01). AccessData. AccessData Cloud Extractor. Available online: https:\/\/www.carahsoft.com\/accessdata."},{"key":"ref_100","unstructured":"(2023, November 01). Oxygen Forensics. Oxygen Forensic Cloud Extractor. Available online: https:\/\/oxygenforensics.com\/en\/resources\/oxygen-forensic-cloud-extractor\/."},{"key":"ref_101","unstructured":"(2023, November 01). Basis Technology. Autopsy. Available online: https:\/\/www.autopsy.com\/."},{"key":"ref_102","unstructured":"(2023, November 01). BlackBag Technologies. BlackLight. Available online: https:\/\/www.blacklightsoftware.com\/."},{"key":"ref_103","unstructured":"(2023, November 01). X-Ways Software Technology AG. X-Ways Forensics. Available online: https:\/\/www.x-ways.net\/forensics\/."},{"key":"ref_104","unstructured":"(2023, November 01). TechTarget Azure Security Center. Available online: https:\/\/www.techtarget.com\/searchcloudcomputing\/definition\/Microsoft-Azure-Security-Center."},{"key":"ref_105","unstructured":"Amazon Web Services (2023, November 01). AWS CloudTrail. Available online: https:\/\/aws.amazon.com\/cloudtrail\/."},{"key":"ref_106","first-page":"19","article-title":"Cloud forensic challenges and recommendations: A review","volume":"2","author":"Yassin","year":"2020","journal-title":"OIC-CERT J. Cyber Secur."},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Zawoad, S., Dutta, A.K., and Hasan, R. (2013, January 8\u201310). SecLaaS: Secure logging-as-a-service for cloud forensics. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China.","DOI":"10.1145\/2484313.2484342"},{"key":"ref_108","doi-asserted-by":"crossref","unstructured":"Damshenas, M., Dehghantanha, A., Mahmoud, R., and bin Shamsuddin, S. (2012, January 26\u201328). Forensics investigation challenges in cloud computing environments. Proceedings of the 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Kuala Lumpur, Malaysia.","DOI":"10.1109\/CyberSec.2012.6246092"},{"key":"ref_109","doi-asserted-by":"crossref","unstructured":"Alobaidli, H., Nasir, Q., Iqbal, A., and Guimaraes, M. (2017, January 2). Challenges of cloud log forensics. Proceedings of the SouthEast Conference, Atlanta, GA, USA.","DOI":"10.1145\/3077286.3077302"},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Marty, R. (2011, January 21\u201324). Cloud application logging for forensics. Proceedings of the 2011 ACM Symposium on Applied Computing, Taichung, Taiwan.","DOI":"10.1145\/1982185.1982226"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Birk, D., and Wegener, C. (2011, January 26). Technical issues of forensic investigations in cloud computing environments. Proceedings of the 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, USA.","DOI":"10.1109\/SADFE.2011.17"},{"key":"ref_112","unstructured":"Poisel, R., and Tjoa, S. (2012, January 20\u201324). Discussion on the challenges and opportunities of cloud forensics. Proceedings of the Multidisciplinary Research and Practice for Information Systems: IFIP WG 8.4, 8.9\/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, CD-ARES 2012, Prague, Czech Republic. Proceedings 7."},{"key":"ref_113","unstructured":"Zawoad, S., and Hasan, R. (2013). Cloud forensics: A meta-study of challenges, approaches, and open problems. arXiv."},{"key":"ref_114","first-page":"4","article-title":"Cyber forensics in the cloud","volume":"14","author":"Zimmerman","year":"2011","journal-title":"IA Newsl."},{"key":"ref_115","unstructured":"Adams, R. (2013). Cybercrime and Cloud Forensics: Applications for Investigation Processes, IGI Global."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.diin.2015.03.002","article-title":"Cloud forensics: Technical challenges, solutions and comparative analysis","volume":"13","author":"Pichan","year":"2015","journal-title":"Digit. Investig."},{"key":"ref_117","doi-asserted-by":"crossref","unstructured":"Chen, L., Xu, L., Yuan, X., and Shashidhar, N. (2015, January 16\u201319). Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges. Proceedings of the 2015 International Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, USA.","DOI":"10.1109\/ICCNC.2015.7069509"},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Aydin, M., and Jacob, J. (2013, January 9\u201312). A comparison of major issues for the development of forensics in cloud computing. Proceedings of the 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), London, UK.","DOI":"10.1109\/ICITST.2013.6750166"},{"key":"ref_119","unstructured":"Orton, I., Alva, A., and Endicott-Popovsky, B. (2013). Cybercrime and Cloud Forensics: Applications for Investigation Processes, IGI Global."},{"key":"ref_120","unstructured":"Ruan, K., Carthy, J., Kechadi, T., and Crosbie, M. (February, January 31). Cloud forensics. Proceedings of the Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA. Revised Selected Papers 7."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Chen, G., Du, Y., Qin, P., and Du, J. (2012, January 21\u201323). Suggestions to digital forensics in Cloud computing ERA. Proceedings of the 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content, Beijing, China.","DOI":"10.1109\/ICNIDC.2012.6418812"},{"key":"ref_122","unstructured":"(2023, October 30). Computer Forensics Tool Testing (CFTT), Available online: https:\/\/www.cftt.nist.gov\/."},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Thorpe, S., Grandison, T., Campbell, A., Williams, J., Burrell, K., and Ray, I. (July, January 28). Towards a forensic-based service oriented architecture framework for auditing of cloud logs. Proceedings of the 2013 IEEE Ninth World Congress on Services, Santa Clara, CA, USA.","DOI":"10.1109\/SERVICES.2013.76"},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.diin.2014.09.002","article-title":"Impacts of increasing volume of digital forensic data: A survey and future research challenges","volume":"11","author":"Quick","year":"2014","journal-title":"Digit. Investig."},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Almulla, S., Iraqi, Y., and Jones, A. (2013, January 17\u201319). Cloud forensics: A research perspective. Proceedings of the 2013 9th International Conference on Innovations in Information Technology (IIT), Al Ain, United Arab Emirates.","DOI":"10.1109\/Innovations.2013.6544395"},{"key":"ref_126","unstructured":"Sibiya, G., Venter, H.S., and Fogwill, T. (2012). IST-Africa 2012 Conference Proceedings, International Information Management Corporation (IIMC)."},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"301186","DOI":"10.1016\/j.fsidi.2021.301186","article-title":"How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts","volume":"37","author":"Kanta","year":"2021","journal-title":"Forensic Sci. Int. Digit. Investig."},{"key":"ref_128","doi-asserted-by":"crossref","unstructured":"Ruan, K. (2013). Cybercrime and Cloud Forensics: Applications for Investigation, IGI Global.","DOI":"10.4018\/978-1-4666-2662-1"},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.diin.2012.07.001","article-title":"An integrated conceptual digital forensic framework for cloud computing","volume":"9","author":"Martini","year":"2012","journal-title":"Digit. Investig."},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Santhy, D.K., and Padmanabhan, A.S. (2023). A Review on the Changing Dimensions of Digital Forensics in Criminal Investigations. SVP Natl. Police Acad. J. Forthcom.","DOI":"10.2139\/ssrn.4329086"},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"28","DOI":"10.4018\/jdcf.2012040103","article-title":"Calm before the storm: The challenges of cloud computing in digital forensics","volume":"4","author":"Grispos","year":"2012","journal-title":"Int. J. Digit. Crime Forensics (IJDCF)"},{"key":"ref_132","first-page":"2016","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council","volume":"679","author":"Regulation","year":"2016","journal-title":"Regulation (EU)"},{"key":"ref_133","unstructured":"FMI (2022). Digital Forensics Market, FMI."},{"key":"ref_134","unstructured":"(2023, October 11). Growth Market Reports. Digital Forensics Market-Global Industry Analysis. Available online: https:\/\/growthmarketreports.com\/report\/digital-forensics-market-global-industry-analysis."},{"key":"ref_135","unstructured":"Globe Newswire (2023, October 11). Digital Forensics Market to Surpass USD 24.86 Billion by 2030: Driven by Rising Cybercrime Rates and Major Digital Transformation Research by SNS Insider. Available online: https:\/\/www.globenewswire.com\/news-release\/2023\/10\/06\/2756125\/."},{"key":"ref_136","unstructured":"Statista (2023, October 11). Worldwide Market Share of Leading Cloud Infrastructure Service Providers. Available online: https:\/\/www.statista.com\/chart\/18819\/worldwide-market-share-of-leading-cloud-infrastructure-service-providers\/."},{"key":"ref_137","doi-asserted-by":"crossref","unstructured":"Prakash, V., Williams, A., Garg, L., Savaglio, C., and Bawa, S. (2021). Cloud and edge computing-based computer forensics: Challenges and open problems. Electronics, 10.","DOI":"10.3390\/electronics10111229"},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Alqahtany, S., Clarke, N., Furnell, S., and Reich, C. (2015, January 26\u201329). Cloud forensics: A review of challenges, solutions and open problems. Proceedings of the 2015 International Conference on Cloud Computing (ICCC), Riyadh, Saudi Arabia.","DOI":"10.1109\/CLOUDCOMP.2015.7149635"},{"key":"ref_139","unstructured":"Basilakis, J. (2020). Cloud-Based Homomorphic Encryption for Privacy-Preserving Machine Learning in Clinical Decision Support, Western Sydney University."},{"key":"ref_140","unstructured":"Alexandru, A.B., and Pappas, G.J. (2020). Privacy in Dynamical Systems, Springer."},{"key":"ref_141","doi-asserted-by":"crossref","first-page":"911","DOI":"10.1109\/TIFS.2019.2929409","article-title":"Verifynet: Secure and verifiable federated learning","volume":"15","author":"Xu","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"3312","DOI":"10.1016\/j.matpr.2021.10.124","article-title":"A review on investigating the role of block-chain in cyber security","volume":"56","author":"Aggarwal","year":"2022","journal-title":"Mater. Today Proc."},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Jambunathan, B., and Yoganathan, K. (2018, January 1\u20133). Architecture decision on using microservices or serverless functions with containers. Proceedings of the 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT), Coimbatore, India.","DOI":"10.1109\/ICCTCT.2018.8551035"},{"key":"ref_144","unstructured":"Ahmed, S.F., Shuravi, S., Afrin, S., Rafa, S.J., Hoque, M., and Gandomi, A.H. (2023). The Power of Internet of Things (IoT): Connecting the Dots with Cloud, Edge, and Fog Computing. arXiv."},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"100207","DOI":"10.1016\/j.array.2022.100207","article-title":"CE-Fed: Communication efficient multi-party computation enabled federated learning","volume":"15","author":"Kanagavelu","year":"2022","journal-title":"Array"},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"Natarajan, H., Krause, S., and Gradstein, H. (2017). Distributed Ledger Technology and Blockchain, World Bank. Technical Report.","DOI":"10.1596\/29053"},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Montasari, R., and Hill, R. (2019, January 16\u201318). Next-generation digital forensics: Challenges and future paradigms. Proceedings of the 2019 IEEE 12th International conference on global security, safety and sustainability (ICGS3), London, UK.","DOI":"10.1109\/ICGS3.2019.8688020"},{"key":"ref_148","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1186\/s13677-019-0133-z","article-title":"Experts reviews of a cloud forensic readiness framework for organizations","volume":"8","author":"Alenezi","year":"2019","journal-title":"J. Cloud Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/2\/433\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:43:59Z","timestamp":1760103839000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/2\/433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,10]]},"references-count":148,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["s24020433"],"URL":"https:\/\/doi.org\/10.3390\/s24020433","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,10]]}}}