Forensic readiness capability for cloud computing

Files in This Item:
File Description SizeFormat 
DeMarco_ucd_5090D_10086.pdf3.14 MBAdobe PDFDownload
Title: Forensic readiness capability for cloud computing
Authors: De Marco, Lucia
Advisor: Kechadi, Tahar
Ferrucci, Filomena
Permanent link:
Date: 2015
Abstract: Cloud computing services represent the actual computation delivery to the mostof customer communities. Such services are regulated by a contract called ServiceLevel Agreement (SLA), cosigned between customers and providers. During itsvalidity time several contractual constraints have to be respected by the involvedparties. Due to their popularity, cloud services are enormously used and unfortunatelyalso abused, especially by cyber-criminals. A manner for guaranteeing andenhancing cloud service security is the provisioning of a forensic readiness capabilityto them. Such a capability is responsible to perform some activities aimed toprepare the services for a possible forensic investigation. Sometimes, the crimesare related to some contractual constraint violations without the parties are awareof. Thus, a dedicated forensic readiness capability interacting with cloud servicesand detecting the SLA violations by analysing some cloud log files can guaranteemore control on such contracts. In this dissertation, a formal model aimed torepresent a forensic readiness capability for the cloud that detects contractual violationsis presented, together with a prototype system running on a specific casestudy.
Type of material: Doctoral Thesis
Publisher: University College Dublin. School of Computer Science  
Qualification Name: Ph.D.
Copyright (published version): 2015 the author
Other versions:
Language: en
Status of Item: Peer reviewed
Appears in Collections:Computer Science Theses

Show full item record

Download(s) 50

checked on May 25, 2018

Google ScholarTM


This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.