{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T15:12:32Z","timestamp":1654096352640},"reference-count":20,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7,1]]},"abstract":"<p>This paper examines the feasibility of developing a forensic acquisition tool in a distributed file system. Using GFS and KFS distributed file systems as vehicles and through representative scenarios and examples, the authors develop forensic acquisition processes and examine both the requirements of the tool and the distributed file system must meet in order to facilitate the acquisition. The authors conclude that cloud storage has features that can be leveraged to perform acquisition (such as redundancy and replication triggers) but also maintains a complexity, which is higher than traditional storage systems leading to a need for forensic-readiness-by-design.<\/p>","DOI":"10.4018\/jdcf.2011070102","type":"journal-article","created":{"date-parts":[[2011,10,20]],"date-time":"2011-10-20T14:38:19Z","timestamp":1319121499000},"page":"19-36","source":"Crossref","is-referenced-by-count":12,"title":["Requirements for a Forensically Ready Cloud Storage Service"],"prefix":"10.4018","volume":"3","author":[{"given":"Theodoros","family":"Spyridopoulos","sequence":"first","affiliation":[{"name":"Democritus University of Thrace, Greece"}]},{"given":"Vasilios","family":"Katos","sequence":"additional","affiliation":[{"name":"Democritus University of Thrace, Greece"}]}],"member":"2432","reference":[{"key":"jdcf.2011070102-0","unstructured":"Association of Chief Police Officers (ACPO). (2010). Good practice guide for computer-based electronic evidence, version 4. Retrieved from http:\/\/7safe.com\/electronic_evidence\/ACPO_guidelines_computer_evidence_v4_web.pdf"},{"key":"jdcf.2011070102-1","unstructured":"Cloudstore. (n. d.). Kosmos distributed file system. Retrieved from http:\/\/code.google.com\/p\/kosmosfs\/"},{"issue":"54","key":"jdcf.2011070102-2","article-title":"Directive 2006\/24\/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002\/58\/EC.","volume":"L105","year":"2006","journal-title":"Official Journal of the European Union. L&C"},{"key":"jdcf.2011070102-3","author":"C.Garrison","year":"2010","journal-title":"Digital forensics for network, internet, and cloud computing"},{"key":"jdcf.2011070102-4","doi-asserted-by":"crossref","unstructured":"Ghemawat, S., Gobioff, H., & Leung, S. (2003, October 19-22). The Google file system. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY.","DOI":"10.1145\/945445.945450"},{"key":"jdcf.2011070102-5","doi-asserted-by":"crossref","unstructured":"Grobauer, B., & Schreck, T. (2010). Towards incident handling in the cloud: Challenges and approaches. In Proceedings of the ACM Workshop on Cloud Computing Security Workshop (pp. 77-86).","DOI":"10.1145\/1866835.1866850"},{"key":"jdcf.2011070102-6","doi-asserted-by":"crossref","unstructured":"Grobler, T., & Louwrens, B. (2007). New approaches for security, privacy and trust in complex environments. In Proceedings of the IFIP TC 11 22nd International Information Security Conference (pp. 13-24).","DOI":"10.1007\/978-0-387-72367-9_2"},{"key":"jdcf.2011070102-7","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2009.0053"},{"key":"jdcf.2011070102-8","unstructured":"Hadoop. (n. d.). Distributed file system. Retrieved from http:\/\/hadoop.apache.org\/hdfs"},{"key":"jdcf.2011070102-9","author":"P.Mell","year":"2009","journal-title":"The NIST definition of cloud computing"},{"issue":"2","key":"jdcf.2011070102-10","first-page":"1","article-title":"Computer forensics: The need for standardization and certification.","volume":"3","author":"M.Meyers","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"jdcf.2011070102-11","unstructured":"National Institute of Standards and Technology. (2004). Digital data acquisition tool specification. Retrieved from http:\/\/www.cftt.nist.gov\/Pub-Draft-1-DDA-Require.pdf"},{"key":"jdcf.2011070102-12","doi-asserted-by":"crossref","unstructured":"Patzakis, J. (2003). Computer forensics as an integral component of information security enterprise. Retrieved from http:\/\/www1.stpt.usf.edu\/gkearns\/Articles_Fraud\/computerforensics.pdf","DOI":"10.1016\/S1361-3723(03)06001-9"},{"key":"jdcf.2011070102-13","doi-asserted-by":"crossref","unstructured":"Ruan, K., Carthy, J., Kechadi, T., & Crosbie, M. (2011). Cloud forensics: An overview. In Proceedings of the 7th IFIP International Conference on Digital Forensics, Orlando, FL.","DOI":"10.1007\/978-3-642-24212-0_3"},{"key":"jdcf.2011070102-14","unstructured":"Shipley, T. (2009a). Collection of evidence from the Internet: Part 1. A basic methodology. Retrieved from http:\/\/www.dfinews.com\/article\/collection-evidence-internet-part-1"},{"key":"jdcf.2011070102-15","unstructured":"Shipley, T. (2009b). Collection of evidence from the Internet, Part 2: The cloud. Retrieved from http:\/\/www.dfinews.com\/article\/collection-evidence-internet-part-2"},{"key":"jdcf.2011070102-16","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2010.03.002"},{"key":"jdcf.2011070102-17","doi-asserted-by":"crossref","unstructured":"Thanh, T., Mohan, S., Choi, E., Kim, S., & Kim, P. (2008). A taxonomy and survey on distributed file systems. In Proceedings of the Fourth International Conference on Networked Computing and Advanced Information Management (Vol. 1, pp. 144-149).","DOI":"10.1109\/NCM.2008.162"},{"key":"jdcf.2011070102-18","unstructured":"U.S. Internet Service Provider Association. (2003). Electronic evidence compliance\u2013A guide for internet service providers. Retrieved from http:\/\/info.publicintelligence.net\/USISPAelectronicevidence.pdf"},{"key":"jdcf.2011070102-19","unstructured":"Weil, S., Brandt, S., & Miller, E. Long, D., & Maltzahn, C. (2006). Ceph: A scalable, high-performance distributed file system. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (pp. 307-320)."}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=58406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T14:32:08Z","timestamp":1654093928000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2011070102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,7,1]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2011070102","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,1]]}}}