Locating and collecting cybercrime evidences on cloud storage: review
Despite the advancement of cloud storage and the benefits it brings to computer users, it cannot be denied that cloud storage is still subject to misuse by malicious users and cyber criminals. This includes the cases where criminals use cloud storage for storing and exchanging illegal material and f...
Main Authors: | Ahmed, Abdulghani Ali, Li, Chua Xue |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
IEEE
2017
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/18234/ http://umpir.ump.edu.my/id/eprint/18234/ http://umpir.ump.edu.my/id/eprint/18234/1/Locating%20and%20Collecting%20Cybercrime%20Evidences%20on%20Cloud%20Storage-%20Review.pdf http://umpir.ump.edu.my/id/eprint/18234/2/Locating%20and%20Collecting%20Cybercrime%20Evidences%20on%20Cloud%20Storage-%20Review%201.pdf |
Similar Items
-
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2017) -
Investigation model for locating data remnants on cloud storage
by: Khalid, Abdulrahman, et al.
Published: (2019) -
Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment
by: Ahmed, Abdulghani Ali, et al.
Published: (2018) -
Review of access control mechanisms in cloud computing
by: Muhammad Rizwan, Ghori, et al.
Published: (2018) -
MICIE: A model for identifying and collecting intrusion evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)