Skip to main content

Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7482))

Abstract

In this position paper, the authors present some of the concerns with respect to monitoring and managing the behavioral trust of participants in a forensic cloud data center environment. The basic idea of the approach is to view the interaction process of collaborating forensic cloud data centers overseeing an existing investigation or a set of such investigations across distinct jurisdictions. This work is an important first step to support the need for enabling trustable cloud digital investigations among participating law enforcement agencies.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mell, P., Grance, T.: NIST Definition of Cloud Computing, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf (retrieved from: September 2009)

  2. Casey, E.: Digital Evidence and Computer Crime, 2nd edn. Academic Press, San Diego (2004)

    Google Scholar 

  3. Papalilo, E., Friese, T., Smith, M., Freisleben, B.: Trust Shaping: Adapting Trust Establishment and Management to Application Requirements in a Service-Oriented Grid Environment. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol. 3795, pp. 47–58. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. GridSim, http://www.gridbus.org/gridsim

  5. Foster, I., Kesselman, C.: The Grid2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann (2004)

    Google Scholar 

  6. Ali, A.S., Rana, O., Walker, D.W.: WS-QoC: Measuring Quality of Service Compliance. In: Proceeding of the Second International Conference on Service-Oriented Computing Short Papers (ICSOC), New York, USA, pp. 16–25 (2004)

    Google Scholar 

  7. Lindstrom, P.: Attacking and Defending Web Service (2004), http://www.forumsystems.com/papers/AttackingandDefending_WS.pdf

  8. De Roure, D., Jennings, N., Shadbolt, N.: Research Agenda for the Semantic Grid: A Future E-Science Infrastructure (2001), http://www.semanticgrid.org/v1.9/semgrid.pdf

  9. Foster, I., Kishimoto, H., Savva, A., Berry, D., Djaoui, A., Grimshaw, A., Horn, B., Maciel, F., Siebenlist, F., Subramaniam, R., Treadwell, J., Von Reich, J.: The Open Grid Services Architecture (2005), http://www.gridforum.org/documents/GWD-I-E/GFDI.030.pdf

  10. Papalilo, E., Freisleben, B.: Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1264–1279. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Thorpe, S.: Modeling Trust in a Cloud Computing Context. In: Proceedings of the ACM CIKM/PIKM (October 2010)

    Google Scholar 

  12. Thorpe, S., Ray, I.: Detecting Temporal Inconsistency in Virtual Machine Activity Timelines. Proceedings of Journal of Information Assurance and Security (JIAS) 7(1) (May 2012)

    Google Scholar 

  13. Thorpe, S., Ray, I.: File Timestamps in a Cloud Digital Investigation. Journal of Information Assurance and Security 6(2), 495–502 (2011) ISSN1554-1010

    Google Scholar 

  14. Grandison, T., Sloman, M.: A survey of trust in Internet applications. IEEE Communications Surveys& Tutorials 3(4) (2000)

    Google Scholar 

  15. Riley, D., Wren, C., Berry, T.: Cloud Forensic Challenges for Law Enforcement proceedings. In: Proceedings of the International Conference for Internet Technology and Secured Transactions, London, UK (November 2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Thorpe, S., Grandison, T., Ray, I., Barbir, A. (2012). Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2012. Lecture Notes in Computer Science, vol 7482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32873-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32873-2_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32872-5

  • Online ISBN: 978-3-642-32873-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics